How to trace lost mobile with K7 Mobile Security? 0 (0)

Please visit the website https://k7tracker.in/ and click on Login. Once the page got open please Login using your wp-signup.phped Email address and password. After successful login please tap to ‘Trace’ and click on ‘Trace Again’ Note: K7 Tracker will work only if the Mobile phone connected with Internet. Source : Official K7 Computing Brand Editor by : BEST Antivirus […]

Read More

What to do if the Dashboard shows (K7 computing) 0 (0)

K7 Mobile Security will report Device is not secure in the Dashboard in case: The Virus Definition is not up to date – Execute the Malware update definitions through Update option. The product is not activated/wp-signup.phped – wp-signup.php/activate the product using valid credentials. A Malware is found – K7 Mobile Security has identified a Malware and is waiting for […]

Read More

What is App Resource Manager? (K7 computing) 0 (0)

Choosing an app from the list will show the app’s current resource usage details such as size, CPU usage, memory usage, etc. App’s network usage history is also tracked which includes data usage statistics on 3G, Wi-Fi and separate data usage statistics on roaming details. Source : Official K7 Computing Brand Editor by : BEST […]

Read More

K7 Mobile Security Activation Window Shows Blank 0 (0)

Scenario:- While activating the K7 Mobile Security License key, you may get blank screen in K7 Mobile Security app rather than the column to enter details. This happens because of font size is set to large. Steps to follow: Step 1 – Open Mobile “Settings”. Step 2 – Click / Tap on Display Option. Step 3 […]

Read More

How to Activate K7 Mobile Security for IOS 0 (0)

Description : Activation is essential to keep your product up-to-date to protect your computer and the software must be updated frequently. To receive updates and support from K7 Computing, you must activate your product. Kindly follow the below steps to activate: Step 1: Kindly install K7 Mobile Security in your apple device from AppStore or […]

Read More

How to Configure the IP sec VPN (K7 computing) 0 (0)

Steps to be followed:  Login to K7 Security UTM, Click on Configuration  Click on the VPN Navigate to IPSec-VPN  Provide the Name and description for desired VPN  Provide the IPsec Mode as Main  Mention the local IP needs to route to branch as same in the Remote side  Disable the Nat Traversal and select the Local […]

Read More

How to configure the SSL Server (K7 computing) 0 (0)

Steps to be followed: 1: Login to K7 Security UTM, Click on Configuration 2: Click on the VPN Navigate to SSL-VPN Server 3: Click On Add server Give description 4: Select the interface name for eg : VST1 5: Select the protocol where the VPN access via UDP /TCP and provide the port number For […]

Read More

How to configure the SSL-VPN Client (K7 computing) 0 (0)

Steps to be followed: 1: Login to K7 Security UTM, Click on Configuration 2: Click on the VPN > SSL-VPN Client > Add > select the operation mode and mention the Client Name and description. 3: Select the Algorithm and cipher type as mention in the server. 4: Certificate > Select upload zip file where […]

Read More

How to add the other ports in web security except 80 port (K7 computing) 0 (0)

Steps to be followed: 1. Login to K7 Security UTM 2. Click on Configuration 3. Navigate to Firewall/NAT 4. Select Filter Rule and choose LAN2WAN Firewall Access. 5. Under Destination Zone Add the required ports under Port Number. 6. After making the necessary configuration, Click Save and Restart Service. Note:If the issue persists or you need any assistance, you may raise ticket at Submit a Ticket and Our […]

Read More

How to bypass IP address under the Web security (K7 computing) 0 (0)

Steps to be followed: 1. Log in to K7 Security UTM Page 2. Click the Configuration and select Web Security tab 3.  Navigate to, HTTP/S Proxy and Enable the service by configuring the Operation Mode as Transparent 4. Navigate to Firewall internet access control. Select HTTPS Access as Tunnel mode 5. In Http/Https proxy bypass, Configure Bypass source as Specify IP and provide the IP address (eg: 192.168.1.2) in Bypass Source IP […]

Read More