Pearl Software Blog

Internet Monitoring and Web Filtering Topics


Pearl Echo 12 Monitors and Controls Encrypted Communications

Philadelphia, PA – June 15, 2016 - Pearl Software released Echo Crypto.View™ as part of its latest line of Internet monitoring and web filtering products. Echo Crypto.View provides administrators with full insight into encrypted communications including secure web (HTTPS) as well as secure email (SSL).  Pearl’s real-time and remote endpoint security suite includes the ability to safely monitor and control communications that have been protected with encryption without the use of complicated proxy servers or Internet traffic redirection. More...

Managing Control Lists

Extensive Pearl Echo Block and Allow lists are typically not necessary when using Echo.Filters, our URL categorization database.  Despite the size of your control lists, it’s advisable to properly format and maintain control lists to ensure peak efficiency at your managed endpoints. 

The following brief video discusses managing your lists including proper use of wild cards: Managing Control Lists

Ref: All Tutorials

Lookout Overhead

Pearl Echo is not a proxy server.  Internet traffic will flow via the path that it normally does when Pearl Echo is not installed.  The Pearl Echo workstation agent resident on an endpoint will only “echo” back data necessary for reporting; it also periodically gathers Internet access rules set for the user at the Pearl Echo server.
As an example of overhead, will deliver over 10.5MB in content and images from their web page.  Pearl Echo will log 9800 bytes to the Pearl Echo server.  That’s less than 0.09% overhead!  This is described pictorially in this video.

Pearl Echo Tips and Tricks - Shortcuts


You can right-click on any entry in a Pearl Echo Log Window to link to and view a site, restore data like email content and chat, update a control list or decode email attachments. 

For Web sites you can also view the Echo.Filters category to which the web site belongs.

Pearl Echo Tips and Tricks - Auto Refresh

Auto-Refresh the Activity Log

To automatically update the Pearl Echo Activity Log, select "Auto-Refresh" from the File menu. While in Auto-Refresh mode other Pearl Echo console features are unavailable. Press Alt+F5 to escape Auto-Refresh mode.

Pearl Echo Tips and Tricks - AUP

Internet Acceptable Use Policy

You can inform users of your Acceptable Use Policy by summarizing it in the Warning message box in the Options menu. Your message can be a maximum of 256 characters.

You can also set you user's browser to redirect to an web page that hosts your AUP.

Pearl Echo Tips and Tricks - Category Block


If a web site is blocked due to an Echo.Filters rule that you have set, you can right-click on the violation entry in the Pearl Echo Log Window to view the category to which the web site belongs.

Pearl Echo Tips and Tricks - Email Attachements

View E-mail Attachments

You can decode and read any E-mail attachment by right clicking on the desired entry in the Pearl Echo Log Window and selecting 'Decode Attachments' from the shortcut menu. All attachments users send and receive will be saved.  You will need the file's associated application or viewer to open or run the attachments.

Pearl Echo Tips and Tricks - Overrides

Allow List Override

Entries in your allow list take precedence over all other controls with the exception of time controls. You can add an entry in your Allow List if you would like to override blocks caused by settings in your keywords, Ratings or Echo Filters. You do not need to have your Custom Controls set to Allow Listed for this override work.