This section helps you secure your network with Kerio Control.
Configuring 2-step verification
Blocking incoming connections by country
Configuring connection limits
Configuring intrusion prevention system
Filtering MAC addresses
Protecting users against password guessing attacks
Protocol inspection in Kerio Control
Encrypting User Data