Pearl Software Blog

Internet Monitoring and Web Filtering Topics

Safe Search Enforcement

We've added Safe Search enforcement to Echo's extended filtering strategies.  Safe Search is a feature offered by the major search engines that helps filter potentially offensive content.

Normally, users can set or remove the Safe Search setting in their browser.  Because Pearl Echo does its work way down low at the network layer, Pearl Echo can override the user's settings ensuring that Safe Search enforcement remains in place.

Safe Search enforcement is accessed in a Profile's security settings.

Pearl Echo Tips and Tricks - Shortcuts

Shortcuts

You can right-click on any entry in a Pearl Echo Log Window to link to and view a site, restore data like email content and chat, update a control list or decode email attachments. 

For Web sites you can also view the Echo.Filters category to which the web site belongs.

Pearl Echo Tips and Tricks - Auto Refresh

Auto-Refresh the Activity Log

To automatically update the Pearl Echo Activity Log, select "Auto-Refresh" from the File menu. While in Auto-Refresh mode other Pearl Echo console features are unavailable. Press Alt+F5 to escape Auto-Refresh mode.

Pearl Echo Tips and Tricks - AUP

Internet Acceptable Use Policy

You can inform users of your Acceptable Use Policy by summarizing it in the Warning message box in the Options menu. Your message can be a maximum of 256 characters.

You can also set you user's browser to redirect to an web page that hosts your AUP.

Tips to Avoid Phishing Scams

The year-end saw an unprecedented number of emails from retailers and businesses looking for you to visit them and make a purchase.  Unfortunately, this time of year also brings a large increase in spam and hack attempts that arrive in your inbox alongside the overflow of retailer emails. These emails are also known as “Phishing” emails.

Whether you're on a corporate network or personal network you will be putting yourself at risk by opening these fraudulent emails. Phishing emails are getting harder and harder to differentiate from legitimate emails and when opened on a network can cause major havoc and security issues for your business data. So how do you know whether an email is legitimate or a “Phishing” email?

The tips below will help you identify and avoid falling prey to a phishing email: More...