Chapter 6 configuration 38 – Kerio Tech Network Monitor User Manual

Page 38

Advertising
background image

Chapter 6

Configuration

38

Warning:

Keep in mind that monitoring the contents of E-mail violates user privacy!

If this option is not enabled, all the users should be informed that theirs mail is

monitored!

ICQ privacy

Use this option to define how communication through ICQ and ICQ2Go

protocols will be monitored:

No privacy

— all transferred data will be monitored (ICQ numbers, nicknames,

message bodies)

Do not save text of messages

Kerio Network Monitor will not store content of

individual messages (only ICQ numbers and nicknames will be monitored)

Disable ICQ analysator

— data transferred through ICQ and ICQ2Go will not be

analysed.

Note:

This can be also done by disabling detailed protocol analysis in ICQ defini-

tion (see chapter

6.2

). This implies that monitoring is enabled only if either the

No privacy

or the Do not save text of messages is used and if detailed protocol

analysis is not enabled in ICQ configuration.

Do NOT save tapped HTTP data

Kerio Network Monitor

will not store the content of

the captured WWW pages. Enabling this option can radically save disk space of the

computer. The option HTTP will not be available in the Tapped data window(it will

not be possible to view pages visited by individual users).

Note:

Monitored and stored can be only pages, which are not transferred using en-

crypted protocol HTTPS (in the other case it is possible only to measure the volume

of the transferred data).

Do NOT log HTTP requests for images...

When opening the WWW pages in the brows-

er, an HTTP request must be send for each object contained in the page (picture,

script, etc.). In the HTTP Log are by default logged all the HTTP requests. Enabling

this option makes only the pages themselves to be logged — HTTP Log will be much

shorter and easier to read. Such HTTP log is sufficient enough in the majority of

cases.

Note:

The log of requests to window / file HTTP Log can be done only if the commu-

nication is via the HTTP protocol. In case of the encrypted HTTPS protocol only the

volume of transferred data is logged.

Include IP packet headers...

Enabling this option causes the total size of transferred

data to be counted from whole IP packets including the headers. Its use depends on

the data you want to get.

Advertising