Kerio Tech Network Monitor Computer Monitor User Manual


 
Chapter 6 Configuration
38
Warning: Keep in mind that monitoring the contents of E-mail violates user privacy!
If this option is not enabled, all the users should be informed that theirs mail is
monitored!
ICQ privacy Use this option to define how communication through ICQ and ICQ2Go
protocols will be monitored:
No privacy all transferred data will be monitored (ICQ numbers, nicknames,
message bodies)
Do not save text of messages Kerio Network Monitor will not store content of
individual messages (only ICQ numbers and nicknames will be monitored)
Disable ICQ analysator data transferred through ICQ and ICQ2Go will not be
analysed.
Note: This can be also done by disabling detailed protocol analysis in ICQ defini-
tion (see chapter 6.2). This implies that monitoring is enabled only if either the
No privacy or the Do not save text of messages is used and if detailed protocol
analysis is not enabled in ICQ configuration.
Do NOT save tapped HTTP data Kerio Network Monitor will not store the content of
the captured WWW pages. Enabling this option can radically save disk space of the
computer. The option HTTP will not be available in the Tapped data window(it will
not be possible to view pages visited by individual users).
Note: Monitored and stored can be only pages, which are not transferred using en-
crypted protocol HTTPS (in the other case it is possible only to measure the volume
of the transferred data).
Do NOT log HTTP requests for images... When opening the WWW pages in the brows-
er, an HTTP request must be send for each object contained in the page (picture,
script, etc.). In the HTTP Log are by default logged all the HTTP requests. Enabling
this option makes only the pages themselves to be logged HTTP Log will be much
shorter and easier to read. Such HTTP log is sufficient enough in the majority of
cases.
Note: The log of requests to window / file HTTP Log can be done only if the commu-
nication is via the HTTP protocol. In case of the encrypted HTTPS protocol only the
volume of transferred data is logged.
Include IP packet headers... Enabling this option causes the total size of transferred
data to be counted from whole IP packets including the headers. Its use depends on
the data you want to get.