How to configure the FTP (K7 computing) 0 (0)

Steps to be followed to achieve Log Backup Login to K7 Security UTM Click on Configuration Select Alert/Logs/Report Click on Ftp Log Export and Enable the Services In Configuration Tab provide the Custom Name Configure the Backup Frequency as Daily In Backup Start /End Time provide the time to export the log to the FTP server from firewall […]

Read More

How to create Admin User in Firewall (K7 computing) 0 (0)

Steps to be Followed: Login to K7 Security UTM Click on Administration and navigate to Admin user Management and Choose Add Select the Account Type from the list (Local Admin/Read user/ Administrator) Configure the User ID, Password and Name. In Page Access configure it as specify and Drag the pages which only needs to be accessed After making the necessary configuration, Click […]

Read More

How to Export and Import Configuration (K7 computing) 0 (0)

Steps to be followed: 1: Login to K7 Security UTM. 2: Click the Administration and navigate to configuration Management 3: Export the file manually > Click on download to export the file. 4: To Import the setting Click on Import Settings 5: We can also restore or download daily backup. 6: After Import/restore you must need to reboot the system now. Step 7: For reboot system […]

Read More

How to configure the POP3 server (K7 computing) 0 (0)

Description: POP3 Server is used to enable virus and spam filtering on incoming emails. Which is in need to have a Firewall rule that redirects the pop3 requests to the port number specified in the pop3 proxy configuration. Steps to be followed:  Log in to K7 Security    Click on the Configuration tab and Navigate to Email security  Choose Pop3 […]

Read More

How to configure the SMTP Server (K7 computing) 0 (0)

Description: This is used to enable virus and spam filtering on outgoing emails. You must have a Firewall rule that redirects SMTP requests to the port number specified in the SMTP proxy configuration. Steps to be followed: 1: Login to K7 Security UTM, Click on Configuration 2: Click on the Email Security > SMTP proxy > enable the […]

Read More

How to configure the Spam Mail Server. (K7 computing) 0 (0)

Steps to be followed: Login to K7 Security UTM Click the Configuration and navigate Email security Choose SPAM server setting and Enable the services Provide the Description and Subject on the prefix on the mail Spam score refers the score given to an email by applying a set of rules. The higher the score, the higher is the likelihood for […]

Read More

How to allow Anydesk under K7 Security UTM 0 (0)

Steps to add new rule: 1. Login to K7 Security UTM 2. Click the Configuration and navigate to Firewall/NAT tab 3. Choose the Filter Rules and select Add 4. Provide Rule Name to identify the rules easily 5. In Protocol Action select Accept 6. In Protocol configure TCP & UDP 7. Choose Source Zone as LAN […]

Read More

Installation window disappears during installation (K7 computing) 0 (0)

1. Run the K7ESRT removal tool and then try installing the product. 2. If the issue persist Click on Run->Type regedit and enter 3. Go to the Location HKEY_LOCAL_MACHINESoftwareK7 Computing and Delete the key K7tssetup only. 4. If the OS is 64 bit delete the K7tssetup key under HKEY_LOCAL_MACHINESoftwareWow64NodeK7 Computing and then try installing the K7 Console. Note: In case of […]

Read More