Symantec Web Security Service Access Method

Total Page:16

File Type:pdf, Size:1020Kb

Symantec Web Security Service Access Method Web Security Service Registration and Admin Guide Revision: NOV.07.2020 Symantec Web Security Service/Page 2 Page 3 Copyrights Broadcom, the pulse logo, Connecting everything, and Symantec are among the trademarks of Broadcom. The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries. Copyright © 2020 Broadcom. All Rights Reserved. The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries. For more information, please visit www.broadcom.com. Broadcom reserves the right to make changes without further notice to any products or data herein to improve reliability, function, or design. Information furnished by Broadcom is believed to be accurate and reliable. However, Broadcom does not assume any liability arising out of the application or use of this information, nor the application or use of any product or circuit described herein, neither does it convey any license under its patent rights nor the rights of others. WSS Admin Guide/Page 5 WSS Admin Guide The Symantec Web Security Service solutions provide real-time protection against web-borne threats. As a cloud-based product, the Web Security Service leverages Symantec's proven security technology, including the WebPulse™ cloud community. With extensive web application controls and detailed reporting features, IT administrators can use the Web Security Service to create and enforce granular policies that are applied to all covered users, including fixed locations and roaming users. Symantec Web Security Service/Page 6 Table Of Contents Copyrights 3 WSS Admin Guide 5 Table Of Contents 6 Register Your Web Security Service Portal 8 Technical Requirements 8 Procedure 8 Manage Service Access 16 Allow Access to Outside Personnel 16 Manage Other Admins and Roles 17 Add Service User in the Administrator Role 18 Procedure 18 Add Service User in the Reporting Only Role 20 Procedure 20 Add Service User in a Reviewer Role 23 Procedure 23 Assign Service User Based on Role 25 Switch Roles 26 Assign Roles 26 Change the Role of a Current Service User 28 Disable or Enable Current Service Users 30 Edit Information for a Current Service User 31 User: Change Your Personal Information 32 Reference: Role-Based Access Fields 33 Review Web Security Service User Access 34 XFF Header Controls 35 Generate API Credentials 36 WSS Admin Guide/Page 7 Procedure 36 Download Audit Logs with REST API 38 Step 1—Generate WSS API Credentials 38 Step 2—Use the REST API 38 Filter Options 38 Admin Reference Topics 40 Reference: Required Locations, Ports, and Protocols 41 Symantec Resource 41 Connectivity Methods 41 Authentication 43 Reference: Web Security Service Data Center Ingress IPs 45 Reference: Authentication IP Addresses 46 Reference: Updated Content Filtering Categories 47 Generate API Credentials 52 Procedure 52 Reference: File Types Detected by Advanced Policy 54 Reference: Supported Cipher Suites (Datapath) 87 Reference: Supported Cipher Suites (Portal) 89 Symantec Web Security Service/Page 8 Register Your Web Security Service Portal When you access the Web Security Service for the first time, the browser displays the first page of the Initial Configuration Wizard. The only required tasks are to define the administrator credentials and set an initial default policy template. You can perform all connection configurations and custom policy definitions at a later time. Technical Requirements Before beginning, you must have: n A Subscription ID, which was sent in a Welcome email by Symantec. n A Primary Administrator email address. Your WSS portal account will be tied to this address. n The WSS uses the Okta Identity Provider (IdP) to authorize Admin access. o If you had a Symantec NSL account before the migration to Okta, Symantec Enterprise sent you (the Admin address on record) an email that describes how to activate your new Okta account. o If access to your portal account requires access through a SAML IdP, Symantec Enterprise sent an additional email that provides assertions required to configure the IdP. Procedure Tip: Certain wizard pages provide configuration options, such as adding a location or adding the Auth Connector. No such configurations are required to complete the initial registration process. You can perform these specific connectivity tasks from within the portal at any time following registration. Some methods require considerable planning. The options are provided for experienced WSS users who already know this information and require a quicker deployment process. 1. In a browser, enter https://portal.threatpulse.com/register. Register Your Web Security Service Portal/Page 9 a. Enter the Email Address and name of who will be the primary WSS administrator. b. Enter your Subscription ID. c. Attest that you have read the EULA. d. Click Register. The portal displays a dialog informing you to check the newly-registered email account. Symantec Web Security Service/Page 10 e. In that mail, click the link to create your Broadcom password. f. Close the dialog. g. Understand and accept the terms. h. Log in. 2. If your company requires multiple-factor authentication (MFA), you are prompted to complete that setup. Register Your Web Security Service Portal/Page 11 Tip: To perform post-registration MFA changes, access https://avagoext.okta.com/. 3. WSS begins the second initial configuration phase, the first of which is Product Configuration. Symantec Web Security Service/Page 12 Locate the Web Security product line and click the Configure link, which is in the Action column. 4. WSS displays the Default Policy page. Register Your Web Security Service Portal/Page 13 a. Select the Policy Source. n Select WSS Portal, which is the cloud security service default. n The Management Center option applies only to the Unified Policy Enforcement solution, which uses Symantec (Symantec) Management Center to implement Blue Coat ProxySG appliance-defined policies in the portal. See the Symantec Unified Policy Enforcement Solution documentation. b. Default Policy—By default and unchangeable, WSS blocks access to known malware sources and some inappropriate content. n Liability Concerns n Child pornography n Security Concerns n Spam n Security Threats n Malicious Outbound Data/Botnets n Malicious Sources n Phishing n Proxy Avoidance The following policy controls provide a baseline policy against all other transactions: n Monitor—Provides only malware scanning. Users are allowed to browse anywhere. n Child pornography n Malicious Outbound Data/Botnets n Malicious Sources n Phishing n Proxy Avoidance n Spam n Standard— In addition to the Monitor categories, provides malware scanning plus blocks access to the most common questionable content, such as mature. n Adult/Mature Content n Controlled Substances n Gambling n Hacking Symantec Web Security Service/Page 14 n Nudity n Peer-to-Peer (P2P) n Piracy/Copyright Concerns n Placeholders n Pornography n Potentially Unwanted Software n Remote Access Tools n Scam/Questionable/Illegal n Suspicious n High—In addition to the Monitor and Standard categories, provides malware scanning plus blocks access to the most common questionable content and common categories that are not work-related, such as social networking sites. n Dynamic DNS Host n Extreme n Intimate Apparel/Swimsuit n Mixed Content/Potentially Adult n Sex Education n Sexual Expression n Software Downloads n Violence/Hate/Racism n Weapons Regardless of this selection, you can further modify policy from the WSS portal after completing the registration process. c. Click Next. 5. Privacy— n WSS reports are generated from data in access logs, which are populate by employee web use. Your organization might require stricter privacy concerns. You can suppress information such as usernames from reports. 6. The wizard progresses through three more screens: Mobile Users, Static Location, and Auth ConnectorSetup, with each providing an option and/or configure additional components. Advanced WSS admins will understand what these configurations are, but you can configure these connectivity and authentication methods at a later time. For each of these screens, click Next. 7. The final wizard screens confirms that you have completed the registration process. Click Go To Product Setup (lower- right corner). Register Your Web Security Service Portal/Page 15 8. WSS returns to the Product Configuration screen; the Web Security product line now displays Configured as the Configuration Status. Click Continue (lower-right corner). WSS portal loads and displays the Overview Dashboard landing page. These reports are not populated as you have yet to have clients sending traffic to the service. Next Step You are ready to configure an connectivity method—that is, configure your network assets to route traffic to the service for threat protection and content policy checks. Symantec Web Security Service/Page 16 Manage Service Access Only Admin Users can modify other Web Security Service users. For example, change the default role or temporarily disable a user's access. Allow Access to Outside Personnel As you work with Symantec Technical Support or your partner provider, personnel can assist with issues by logging into your portal account through WSS Operations. You must grant permission to allow access. You can set your account to always allow, never allow, or temporarily allow. Tip: Customer accounts created after the July 26, 2019 service update have the option in the configuration wizard to set the initial access setting. For example, access is set to deny, but you use this feature to allow temporary access as required. 1. Navigate to Account Configuration > Administrators. 2. The first row in the table (Support Operators) contains the option. Select it and click Edit. The portal displays the Edit Support Access dialog. a. Allow Support Operators to access my account is the master setting. Clearing the toggle means your account cannot be accessed. Enabling it allows access. b. If you allow access, select if the access is Permanent or Temporary. Manage Service Access/Page 17 c. If Temporary, specify the Expiry date and time when portal access returns to denied. For example, a Support person asks for access until the end of the business day.
Recommended publications
  • Translators' Tool
    The Translator’s Tool Box A Computer Primer for Translators by Jost Zetzsche Version 9, December 2010 Copyright © 2010 International Writers’ Group, LLC. All rights reserved. This document, or any part thereof, may not be reproduced or transmitted electronically or by any other means without the prior written permission of International Writers’ Group, LLC. ABBYY FineReader and PDF Transformer are copyrighted by ABBYY Software House. Acrobat, Acrobat Reader, Dreamweaver, FrameMaker, HomeSite, InDesign, Illustrator, PageMaker, Photoshop, and RoboHelp are registered trademarks of Adobe Systems Inc. Acrocheck is copyrighted by acrolinx GmbH. Acronis True Image is a trademark of Acronis, Inc. Across is a trademark of Nero AG. AllChars is copyrighted by Jeroen Laarhoven. ApSIC Xbench and Comparator are copyrighted by ApSIC S.L. Araxis Merge is copyrighted by Araxis Ltd. ASAP Utilities is copyrighted by eGate Internet Solutions. Authoring Memory Tool is copyrighted by Sajan. Belarc Advisor is a trademark of Belarc, Inc. Catalyst and Publisher are trademarks of Alchemy Software Development Ltd. ClipMate is a trademark of Thornsoft Development. ColourProof, ColourTagger, and QA Solution are copyrighted by Yamagata Europe. Complete Word Count is copyrighted by Shauna Kelly. CopyFlow is a trademark of North Atlantic Publishing Systems, Inc. CrossCheck is copyrighted by Global Databases, Ltd. Déjà Vu is a trademark of ATRIL Language Engineering, S.L. Docucom PDF Driver is copyrighted by Zeon Corporation. dtSearch is a trademark of dtSearch Corp. EasyCleaner is a trademark of ToniArts. ExamDiff Pro is a trademark of Prestosoft. EmEditor is copyrighted by Emura Software inc. Error Spy is copyrighted by D.O.G. GmbH. FileHippo is copyrighted by FileHippo.com.
    [Show full text]
  • Corel Wordperfect Office X7 R
    Contents 1 | Introducing Corel WordPerfect Office X7 ................................ 1 2 | Customer profiles .................................................................... 3 3 | What’s included in the Standard Edition?............................... 5 4 | Key features ............................................................................. 9 Productivity.......................................................................................................... 9 Power ................................................................................................................ 12 Collaboration ..................................................................................................... 15 Value ................................................................................................................. 16 1 Introducing Corel® WordPerfect® Office X7 WordPerfect® Office X7 is a powerful, intuitive, and Collaboration highly compatible office suite that helps you do more with documents, spreadsheets, and presentations. WordPerfect Office has always been built to ensure More than 30 years since it first took the computing that you can easily collaborate and exchange your files world by storm, the legendary WordPerfect continues with others. to be trusted by governments, law firms, educational To that end, WordPerfect Office X7 offers extensive institutions, businesses, and consumers. support for more than 60 file formats, including the latest versions of Microsoft Office. Plus, its robust PDF Productivity import and
    [Show full text]
  • ACS – the Archival Cytometry Standard
    http://flowcyt.sf.net/acs/latest.pdf ACS – the Archival Cytometry Standard Archival Cytometry Standard ACS International Society for Advancement of Cytometry Candidate Recommendation DRAFT Document Status The Archival Cytometry Standard (ACS) has undergone several revisions since its initial development in June 2007. The current proposal is an ISAC Candidate Recommendation Draft. It is assumed, however not guaranteed, that significant features and design aspects will remain unchanged for the final version of the Recommendation. This specification has been formally tested to comply with the W3C XML schema version 1.0 specification but no position is taken with respect to whether a particular software implementing this specification performs according to medical or other valid regulations. The work may be used under the terms of the Creative Commons Attribution-ShareAlike 3.0 Unported license. You are free to share (copy, distribute and transmit), and adapt the work under the conditions specified at http://creativecommons.org/licenses/by-sa/3.0/legalcode. Disclaimer of Liability The International Society for Advancement of Cytometry (ISAC) disclaims liability for any injury, harm, or other damage of any nature whatsoever, to persons or property, whether direct, indirect, consequential or compensatory, directly or indirectly resulting from publication, use of, or reliance on this Specification, and users of this Specification, as a condition of use, forever release ISAC from such liability and waive all claims against ISAC that may in any manner arise out of such liability. ISAC further disclaims all warranties, whether express, implied or statutory, and makes no assurances as to the accuracy or completeness of any information published in the Specification.
    [Show full text]
  • Scene Graph Adapter
    Scene Graph Adapter: An efficient Architecture to Improve Interoperability between 3D Formats and 3D Application Engines Rozenn Bouville Berthelot, Jérôme Royan, Thierry Duval, Bruno Arnaldi To cite this version: Rozenn Bouville Berthelot, Jérôme Royan, Thierry Duval, Bruno Arnaldi. Scene Graph Adapter: An efficient Architecture to Improve Interoperability between 3D Formats and 3D Application Engines. Web3D 2011 (16th International Conference on 3D Web technology), Jun 2011, Paris, France. pp.21- 30. inria-00586161 HAL Id: inria-00586161 https://hal.inria.fr/inria-00586161 Submitted on 6 Apr 2014 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Scene Graph Adapter: An efficient Architecture to Improve Interoperability between 3D Formats and 3D Applications Engines Rozenn Bouville Berthelot∗ Jérôme Royan† Thierry Duval‡ Bruno Arnaldi§ Orange Labs and IRISA, Rennes, France Orange Labs France IRISA, Rennes, France IRISA, Rennes, France Figure 1: Our architecture allows the loading of any 3D graphics format simultaneously in any available rendering engine. The scene graph adapter is an interface that adapts a scene graph (SG) of a given format into a renderer scene graph and which also allows the rendering part to request this scene graph.
    [Show full text]
  • Openoffice.Org News Highlights Table of Contents Octo Ber 2004
    OpenOffice.org News Highlights Table of Contents Octo ber 2004 ................................................................................................ R eplacing FrameMaker with OOo Writer ............................................................................................. Ger mans claim Linux lowers costs ......................................................................................................... Ope n approach offers Mindef more choice ............................................................................................ Ball mer calls for horse-based attack on Star Office ............................................................................... Ope n for Business - The 2004 OfB Choice Awards .............................................................................. Sep tember 2004 ............................................................................................ Ope nOffice.org reveals marketing ambitions ......................................................................................... No nprofit brings Linux and open source to Hawaii ............................................................................... UK charity builds Linux network on a shoestring .................................................................................. N SW opens door to Linux offers ............................................................................................................ L eading Edge Forum Report 2004 - Open Source: Open for Business .................................................
    [Show full text]
  • Visualisation and Generalisation of 3D City Models
    Visualisation and Generalisation of 3D City Models Bo Mao August 2010 TRITA SoM 2010-08 ISSN 1653-6126 ISRN KTH/SoM/-10/08/-SE ISBN 978-91-7415-715-4 © Bo Mao 2010 Licentiate Thesis Geoinformatics Division Department of Urban Planning and Environment Royal Institute of Technology (KTH) SE-100 44 STOCKHOLM, Sweden ii Abstract 3D city models have been widely used in different applications such as urban planning, traffic control, disaster management etc. Effective visualisation of 3D city models in various scales is one of the pivotal techniques to implement these applications. In this thesis, a framework is proposed to visualise the 3D city models both online and offline using City Geography Makeup Language (CityGML) and Extensible 3D (X3D) to represent and present the models. Then, generalisation methods are studied and tailored to create 3D city scenes in multi- scale dynamically. Finally, the quality of generalised 3D city models is evaluated by measuring the visual similarity from the original models. In the proposed visualisation framework, 3D city models are stored in CityGML format which supports both geometric and semantic information. These CityGML files are parsed to create 3D scenes and be visualised with existing 3D standard. Because the input and output in the framework are all standardised, it is possible to integrate city models from different sources and visualise them through the different viewers. Considering the complexity of the city objects, generalisation methods are studied to simplify the city models and increase the visualisation efficiency. In this thesis, the aggregation and typification methods are improved to simplify the 3D city models.
    [Show full text]
  • Symantec Web Security Service Policy Guide
    Web Security Service Policy Guide Version 6.10.4.1/OCT.12.2018 Symantec Web Security Service/Page 2 Policy Guide/Page 3 Copyrights Copyright © 2018 Symantec Corp. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, Blue Coat, and the Blue Coat logo are trademarks or registered trademarks of Symantec Corp. or its affiliates in the U.S. and other coun- tries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE. Symantec Corporation 350 Ellis Street Mountain View, CA 94043 www.symantec.com Policy Guide/Page 4 Symantec Web Security Service Policy Guide The Symantec Web Security Service solutions provide real-time protection against web-borne threats. As a cloud-based product, the Web Security Service leverages Symantec's proven security technology as well as the WebPulse™ cloud com- munity of over 75 million users.
    [Show full text]
  • CAD-To-X3D Conversion with Product Structure and External Geometry Referencing
    CAD-to-X3D Conversion with product structure and external geometry referencing Hyokwang Lee PartDB Co., Ltd. and Web3D Korea Chapter [email protected] Engineering IT & VR solutions based on International Standards CATIA Hub_Assembly model Hub_AssemblyH (1) disc_with_holes(2) cap(3) sleeve_sub_assemblyH (4) gasket(5) cylinder(6) CATIA Hub Assembly (6 Files) Simple Conversion of Hub_Assembly into X3D Save as VRML/X3D http://web3d.org/x3d/content/examples/Basic/CAD/ Simple Conversion of Hub_Assembly into X3D Save as VRML/X3D Simple Conversion of Hub_Assembly into X3D Save as VRML Product Structure disappeared!! Representing a CAD assembly in X3D . Hub_Assembly represented in a single X3D file . Assembly structure : CADAssembly, CADPart . Geometry : CADFace CatiaHubAssembly.X3D Hub_AssemblyH (1) <CADAssembly name=“Hub_Assembly”> (1) T disc_with_holes(2) <CADPart name=“disc_with_holes” ...> <CADFace> ... </CADFace> cap(3) </CADPart> <CADPart name=“cap” ...> sleeve_sub_assemblyH (4) T(2) <CADFace> ... </CADFace> (3) T(4) </CADPart> T gasket(5) CAD2X3D cylinder(6) conversion <CADAssembly name=“sleeve_sub_assembly”> <CADPart name=“gasket” ...> T(6) T(5) <CADFace> ... </CADFace> </CADPart> . Transform information is applied to the leaf node <CADPart name=“cylinder” ...> which includes geometry. <CADFace> ... </CADFace> CATIA Hub Assembly ex) Tcylinder = T(1)*T(4)*T(6) </CADPart> (6 Files) </CADAssembly> </CADAssembly> Representing a CAD assembly in X3D . Hub_Assembly represented in a single X3D file . Assembly structure : CADAssembly, CADPart . Geometry : CADFace CatiaHubAssembly.X3D Hub_AssemblyH (1) <CADAssembly name=“Hub_Assembly”> (1) T disc_with_holes(2) <CADPart name=“disc_with_holes” ...> • Partial change <CADFace > ... </CADFace> cap(3) </CADPart> • Reusability <CADPart name=“cap” ...> sleeve_sub_assemblyH (4) T(2) <CADFace> ... </CADFace> (3) T(4) </CADPart> T gasket(5) CAD2X3D cylinder(6) conversion <CADAssembly name=“sleeve_sub_assembly”> <CADPart name=“gasket” ...> T(6) T(5) <CADFace> ..
    [Show full text]
  • 3D PDF Converter™ Detailing New Features, Bug Fixes and Updated Format Support
    Version 4.1 Release Notes Release notes for 3D PDF Converter™ detailing new features, bug fixes and updated format support. 3D PDF Converter Version 4.1 Table of Contents OVERVIEW................................................................................................................................................... 2 Version Information ............................................................................................................................ 2 Language Support Overview ................................................................................................................ 2 Definition of Release Types ................................................................................................................. 2 Acrobat Pro Compatibility ........................................................................................................................... 3 Licensing Changes ....................................................................................................................................... 3 New 3D PDF Converter License Key Required .................................................................................... 3 4.1 Improvements ....................................................................................................................................... 4 Format Updates .................................................................................................................................. 4 New Features/Enhancements ...........................................................................................................
    [Show full text]
  • Download the Pdf Here
    of people who got together through Bulletin Board Systems, THE PORTUGUESE DEMOSCENE Reckless Life BBS and Infinity BBS run by the infamous Captain Hook. The scene thrived through the nineties with the uprising HISTORY of IRC and the two issues of the diskmag, Infinity, put together BY PS OF TPOLM by Garfield, VAngel and Spellcaster if my memory serves me correctly. The first documented demoscene event in Portugal The Portuguese demoscene, as most Portuguese technology, ducing cheap labour for English-owned factories of the ZX Sin- was organized in 1996 and was called the Virtual Music Con- is a fluke of chance. For many years, Portugal held last place clair Spectrum family of machines. While kids in Central and test. It was just a simple tracking competition. Groups formed among Europe’s nations in iliteracy per capita and emigration. Northern Europe were playing with their Commodores and around this time were Radioactive Design (RD) with Garfield, Certified higher education for new technologies and arts has Ataris during the late eighties, in Portugal we were consuming only been institutionalized within the last 10 years. Even large Spectrum magnetic tapes. WHILE KIDS IN CENTRAL volume capitalist markets, such as the videogame industry, AND NORTHERN EUROPE are still in their infancy in Portugal. It has only been six years, THE BIRTH OF THE PORTUGUESE at most, since serious full time jobs became available in the WERE PLAYING WITH THEIR business. In fact Portugal is a country that mostly imports and DEMOSCENE COMMODORES AND ATARIS, IN consumes technology (2.5 cellphones per person on average) The first known demo made by a Portuguese demoscener was PORTUGAL WE WERE CONSUMING instead of developing and exporting it.
    [Show full text]
  • V1.0 PDF Manual
    Anim8or® User Guide Version 1.00 29-May-17 R. Steven Glanville © 1999 - 2017 R. Steven Glanville. All rights reserved. http://www.anim8or.com Table Of Contents Introduction 9 What's New in v1.0 10 User Interface 10 Modeling 10 Animation 11 Basics 12 Mouse Usage 12 Keyboard Shortcuts 12 Undo and Redo 12 Tool Tips 13 Toolbars and Menus 13 Common Button Meanings 13 Top Toolbar 15 Arc Rotate 16 Editing Widgets 16 Grid Control 17 Material Editor 17 Anim8or Object Libraries 18 Visual Quality 18 OpenGL Workspace 19 File Output 20 User Attributes 20 Printing 20 Auto Save 20 Configuration 21 Version 1.00 29-May-17 2 © 1999 - 2017 R. Steven Glanville Table Of Contents User Interface Configuration 22 Object Editor - Basics & Object/Edit Mode 24 Object/Edit Tools 25 Basic Objects 25 Mesh vs. Parametric Components 27 Object Materials 28 Plug-in Shapes 28 Splines 29 True Type Fonts 29 Extrusion 30 Lathing 31 Modifiers 32 Mirror Image 33 Morph Targets 34 Continuously Mirrored Meshes 35 Reference Image 35 Object Editor - Object/Point Mode 37 Object/Point Operations 37 Point Editing 37 Edge Editing 38 Face Editing 39 Applying Multiple Materials 39 A Note on Selecting Faces 40 Adding Points and Edges 40 Adding Faces 41 Connecting Meshes 41 Merging Points 42 Version 1.00 29-May-17 3 © 1999 - 2017 R. Steven Glanville Table Of Contents Connecting Meshes (2) 42 Connecting Meshes (3) 42 Point and Line Parameters 43 Face Extrusion and Manipulation Tools 43 Topographical Knife 46 Face Editing Commands 47 Miscellaneous Commands 49 Selection Commands 49 Editing Commands 49 Figure Editor 51 Figure Basics 52 Figure/Edit Operations 52 Visibility 54 Building a Skeleton 55 Flexible Joints 56 Adding Body Parts 57 Skinning 57 Influence Volumes 58 Skinning Weights 59 Sequence Editor 61 Time Track 61 Scrubber Bar 62 Sequence Basics 62 Edit Operations 63 Visibility Options 63 Animate Button 64 What is a Key? 64 Version 1.00 29-May-17 4 © 1999 - 2017 R.
    [Show full text]
  • Lilypond Cheatsheet
    LilyPond-MusicTypesetting Basic usage - LilyPond Version 2.14 and above Cheatsheet by R. Kainhofer, Edition Kainhofer, http://www.edition-kainhofer.com/ Command-line usage General Syntax lilypond [-l LOGLEVEL] [-dSCMOPTIONS] [-o OUTPUT] [-V] FILE.ly [FILE2.ly] \xxxx function or variable { ... } Code grouping Common options: var = {...} Variable assignment --pdf, --png, --ps Output file format -dpreview Cropped “preview” image \version "2.14.0" LilyPond version -dbackend=eps Use different backend -dlog-file=FILE Create .log file % dots Comment -l LOGLEVEL ERR/WARN/PROG/DEBUG -dno-point-and-click No Point & Click info %{ ... %} Block comment -o OUTDIR Name of output dir/file -djob-count=NR Process files in parallel c\... Postfix-notation (notes) -V Verbose output -dpixmap-format=pngalpha Transparent PNG #'(..), ##t, #'sym Scheme list, true, symb. -dhelp Help on options -dno-delete-intermediate-files Keep .ps files x-.., x^.., x_.. Directions Basic Notation Creating Staves, Voices and Groups \version "2.15.0" c d e f g a b Note names (Dutch) SMusic = \relative c'' { c1\p } Alterations: -is/-es for sharp/flat, SLyrics = \lyricmode { Oh! } cis bes as cisis beses b b! b? -isis/-eses for double, ! forces, AMusic = \relative c' { e1 } ? shows cautionary accidental \relative c' {c f d' c,} Relative mode (change less than a \score { fifth), raise/lower one octave \new ChoirStaff << \new Staff { g1 g2 g4 g8 g16 g4. g4.. durations (1, 2, 4, 8, 16, ...); append “.” for dotted note \new Voice = "Sop" { \dynamicUp \SMusic
    [Show full text]