We've added Safe Search enforcement to Echo's extended filtering strategies. Safe Search is a feature offered by the major search engines that helps filter potentially offensive content.
Normally, users can set or remove the Safe Search setting in their browser. Because Pearl Echo does its work way down low at the network layer, Pearl Echo can override the user's settings ensuring that Safe Search enforcement remains in place.
Safe Search enforcement is accessed in a Profile's security settings.
Those Famous Dirty Words
By pressing the "F3" key, Pearl Echo automatically searches the active log based on George Carlin's "Seven Dirty Words". For more information on this topic see http://www.pearlsoftware.com/help/carlin.htm.
You can right-click on any entry in a Pearl Echo Log Window to link to and view a site, restore data like email content and chat, update a control list or decode email attachments.
For Web sites you can also view the Echo.Filters category to which the web site belongs.
Auto-Refresh the Activity Log
To automatically update the Pearl Echo Activity Log, select "Auto-Refresh" from the File menu. While in Auto-Refresh mode other Pearl Echo console features are unavailable. Press Alt+F5 to escape Auto-Refresh mode.
Internet Acceptable Use Policy
You can inform users of your Acceptable Use Policy by summarizing it in the Warning message box in the Options menu. Your message can be a maximum of 256 characters.
You can also set you user's browser to redirect to an web page that hosts your AUP.
The year-end saw an unprecedented number of emails from retailers and businesses looking for you to visit them and make a purchase. Unfortunately, this time of year also brings a large increase in spam and hack attempts that arrive in your inbox alongside the overflow of retailer emails. These emails are also known as “Phishing” emails.
Whether you're on a corporate network or personal network you will be putting yourself at risk by opening these fraudulent emails. Phishing emails are getting harder and harder to differentiate from legitimate emails and when opened on a network can cause major havoc and security issues for your business data. So how do you know whether an email is legitimate or a “Phishing” email?
The tips below will help you identify and avoid falling prey to a phishing email: More...