Kerio Tech Network Monitor Computer Monitor User Manual


 
5
Chapter 1
Introduction
Kerio Network Monitor is a small, though powerful tool for online monitoring of network
traffic. It offers a whole set of choices which activities and events can be monitored.
Line load chart The online display of the Internet connection load (incoming and out-
going traffic) in the time range from 1 minute and 1 year. The average transfer speeds
are shown for 3 seconds (1 minute graph) up to for 3 days intervals (for 1 year graph).
Both the total traffic and the traffic for particular users (workstations in the network)
can be displayed at once. This way, you can quickly find out the workstation gener-
ating the biggest load on the Internet connection.
By default, the traffic for all available services (e.g. WWW, FTP, TELNET etc.) is dis-
played. Besides, the traffic for particular services (predefined or custom deter-
mined by a protocol and a port number) can be displayed and their traffic can be
watched separately. The traffic is shown for particular IP addresses which can be
translated into the names of computers (taken from DNS or entered manually).
Total volume of data within a given time period From acquired data you can identi-
fy, who in your network uses the Internet in the most intensive way. It is possible to
create statistics with a day, week or month increments (e.g. the last 2 months with
week increments for all or only some selected computers).
Current connections It is possible to watch a in special window in (almost) real time,
which connections have the particular stations opened. The history of those connec-
tions is recorded in the (Connection Log).
Tree of captured data Kerio Network Monitor is able to store detail data of certain pro-
tocols (e.g. SMTP, POP3, IMAP, HTTP, etc.). The data is displayed as a neat tree, where
it can be sorted according to the stations (IP addresses) or the protocols. Optionally,
it is possible to store also the content of the sent E-mail and the visited WWW pages
(if they are not transferred using encrypted protocols).
Log of visited WWW pages The HTTP Log window records all the captured HTTP re-
quests. The selection of a computer from the list is differentiated by color all request
generated by this particular station.
E-mail log Window Mail Log stores information about all E-mail messages; both sent via
the SMTP protocol, as well as downloaded via the POP3 or the IMAP (if they were not