Symantec Web Security Service Policy Guide

Total Page:16

File Type:pdf, Size:1020Kb

Symantec Web Security Service Policy Guide Web Security Service Policy Guide Version 6.10.4.1/OCT.12.2018 Symantec Web Security Service/Page 2 Policy Guide/Page 3 Copyrights Copyright © 2018 Symantec Corp. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, Blue Coat, and the Blue Coat logo are trademarks or registered trademarks of Symantec Corp. or its affiliates in the U.S. and other coun- tries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE. Symantec Corporation 350 Ellis Street Mountain View, CA 94043 www.symantec.com Policy Guide/Page 4 Symantec Web Security Service Policy Guide The Symantec Web Security Service solutions provide real-time protection against web-borne threats. As a cloud-based product, the Web Security Service leverages Symantec's proven security technology as well as the WebPulse™ cloud com- munity of over 75 million users. With extensive web application controls and detailed reporting features, IT administrators can use the Web Security Service to create and enforce granular policies that are instantly applied to all covered users, including fixed locations and roaming users. If the Web Security Service is the body, then the policy engine is the brain. While the Web Security Service by default provides malware protection (blocks four categories: Phishing, Proxy Avoidance, Spyware Effects/Privacy Concerns, and Spyware/Malware Sources, the additional policy rules and options you create dictate exactly what content your employees can and connot access—from global allows/denials to individual users at specific times from specific locations. This document provides policy concepts and describes how to use the Web Security Service portal to define policies. It includes high-level and use case examples. The document breaks out information in three areas. n "About Web Security Service Policy" on page 11 n "Filter Content" on page 14 n "Malware Policy" on page 31 n "Web Application Policy" on page 58 n "SSL Policy" on page 78 n "Policy: How Do I?" on page 96 n "Policy Reference" on page 126 This document contains topics collected from the Web Security Service online documentation. For the complete doc set, see: Symantec Support Site > WSS Documentation Table Of Contents Copyrights 3 Symantec Web Security Service Policy Guide 4 Table Of Contents 4 About Web Security Service Policy 11 About Geolocation Policies 12 Supported Methods 12 Reporting 12 Exception Pages 12 User Privacy 13 Define Policies? 13 Symantec Web Security Service/Page 5 Filter Content 14 About Content Filtering 15 Control User Access to Web Content 17 About the Default Policies 17 Step 1—Review the current Content Filtering policies and adjust if necessary. 18 Step 2—After the Web Security Service begins processing data, monitor employee web use activity. 18 Step 3—(Optional) Configure an exception page that users see when they browse to a blocked web des- tination. 18 About the Content Filtering Rule Editor 19 Content Filter Policy Construct 19 Group and Global Rows 20 Create a new rule? 22 Create Custom Content Filtering Rules 23 Construct and Editor Tutorials 23 Create a List 26 Conflicts with Actions and File Types 27 Allow 27 Activate Policy 28 Exempt URLs from Permanently Blocked Categories 29 Malware Policy 31 About Malware Scanning 32 Base Level 32 Malware Analysis Standard Service 34 Malware Analysis Advanced Service 34 Protect Your Network From Web Threats 36 Content Analysis 36 Malware Analysis 36 Malware Exemptions and Policy 37 Geolocation-Based Polices 37 Web Isolation 37 Threat Protection Policy Editor 38 Malware Policy From Risk Score 40 Web Isolation Policy Based on Risk Score 41 Policy Guide/Page 6 Risk Score Reporting 41 Exempt a Source From Malware Scan 43 Exemptable Sources 43 Exemption Levels 43 Procedure 43 Change Exemption Scanning Level 45 Next Step 46 Exempt a Destination From Malware Scan 47 Exemptable Destinations 47 Exemption Levels 47 Procedure 47 Next Step 49 About Web Isolation 50 What is Web Isolation? 50 Protect Endpoints from Attack 50 Topography 51 About the Two Web Isolation License Types 52 Geolocation—The Advanced Web Security Add-On 52 About Web Isolation Operations 52 Enable Web Isolation 54 Step 1—Enable Web Isolation 54 Step 2—Define an Isolation Policy Rule 54 Isolation Based on Risk Scores 56 Monitor Licensed Capacity 57 Web Isolation Reporting 57 Skype for Business Issue 57 Web Application Policy 58 About Controlling Web Application Access 59 Web Application Category Reference 61 Set Default Web Application Policy to Allow 62 Reference 62 Procedure 62 Set Default Web Application Policy to Block 64 Symantec Web Security Service/Page 7 Reference 64 Procedure 64 Define a User-Based Web Applications Policy 66 Use Case 66 Example Policy 66 Connect to the CASB Audit Service 70 Audit Service Topography 70 Access the CASB Audit App 72 Reference: Supported Web Applications 73 Web Application Policy 73 Add Reporting Users 73 CASB Policy and Reports 74 Reference: Supported Web Applications 74 Take Action on Specific Web Applications 74 View CASB Reports 77 SSL Policy 78 About Scanning Encrypted Traffic 79 Next Step 82 Examine Encrypted (HTTPS) Traffic 83 About the Root Certificate Recommendation 83 Procedure 83 Install Encrypted Traffic Certificates 88 Install SSL Root Certificate for Chrome Browsers 89 Install SSL Root Certificate for Mozilla Firefox Browsers 91 Install SSL Root Certificate for Microsoft Internet Explorer Browsers 93 Install SSL Root Certificate for Safari Browsers 94 Troubleshoot Dropped SSL Connections 95 Dropped SSL Connections 95 Policy: How Do I? 96 Define Object Lists to Use in Custom Policy 97 Use Case Procedure 97 Geolocation Objects 100 Modify the Default Exception Notifications 101 Policy Guide/Page 8 Customize the User Notification Template 105 Tips 105 Use Cases 105 The Editor 105 Examples 106 Best Practices 108 Provide Browsing Coaching to Users 109 Policy Example—Prevent Unauthenticated User Access to Content 110 Allow Individuals Access to Blocked Content 112 Create Policy From a Reported User 114 Create Policy Based on Reporting Usernames 118 Create A Reporting Username Policy 118 Advanced Policy Example—Set Web Access Times 119 Policy Example—Define Policy For Mobile Users 121 Policy Example—Block Application Actions 122 Force Safe Searches 124 Policy Reference 126 Reference: Updated Content Filtering Categories 127 Reference: Role-Based Access Fields 130 Reference: File Types Detected by Advanced Policy 131 Lossless Audio 133 Lossy Audio 133 Other Music Formats 134 Playlist Formats 135 Audio Editing and Music Production Formats 135 HTTP File Extensions 140 HTTP Response Headers 140 Content Dispositions 140 HALO Engine 141 TrackMania United/Nations Forever Engine 141 DOOM Engine 141 Quake Engine 141 Unreal Engine 142 Symantec Web Security Service/Page 9 Duke Nukem 3D Engine 142 Diablo Engine 142 Other Formats 142 Color Palettes 143 Raster Graphics 143 Vector graphics 145 3D graphics 146 Other 147 Cursors 148 Financial Records 148 Documents 149 Mathematical Markup Language (MML) 150 Page Description Language 150 Personal Information Manager 151 Presentation 151 Project Management Software 151 Formats of files used in software for bibliographic information (citation) management. 151 Spreadsheet 151 Tabulated data 152 Object Code, Executable Files, Shared and Dynamically-Linked Libraries 154 Object Extensions 155 Source Code for Computer Programs 155 Video File Formats 157 Video Editing & Production formats 158 Microsoft Virtual PC/Virtual Server 159 EMC VMware ESX/GSX/Workstation/Player 159 Virtualbox 159 Parallels Workstation 159 Policy Guide/Page 11 About Web Security Service Policy For the Symantec Web Security Service solution, policy refers to configuration controls that restrict or allow network and web elements such as IP addresses and content filtering categories. Only Web Security Service users in the Admin Role can define the policies that comprise a Secure Web Gateway solution. Policy controls are flexible and allow you to apply global settings (basic policy) or granular rules (advanced policy, Content Filtering only). For example, you can determine what happens to requests based on the role of requester. In the above example, Web Security Service policy is defined to achieve the following: n A—Allow a network subnet, which requires the highest performance level possible, to bypass Web Security Service malware scanning, but explicitly block another specific destination. For example, you do not want Group B allowed access to sensitive locations that have company IP. n B—Allow the Sports website category, but deny Gambling sites. n C—Allow access the Facebook social networking web application but within Facebook block games; allow webmail
Recommended publications
  • Learn Python the Hard Way
    ptg11539604 LEARN PYTHON THE HARD WAY Third Edition ptg11539604 Zed Shaw’s Hard Way Series Visit informit.com/hardway for a complete list of available publications. ed Shaw’s Hard Way Series emphasizes instruction and making things as ptg11539604 Zthe best way to get started in many computer science topics. Each book in the series is designed around short, understandable exercises that take you through a course of instruction that creates working software. All exercises are thoroughly tested to verify they work with real students, thus increasing your chance of success. The accompanying video walks you through the code in each exercise. Zed adds a bit of humor and inside jokes to make you laugh while you’re learning. Make sure to connect with us! informit.com/socialconnect LEARN PYTHON THE HARD WAY A Very Simple Introduction to the Terrifyingly Beautiful World of Computers and Code Third Edition ptg11539604 Zed A. Shaw Upper Saddle River, NJ • Boston • Indianapolis • San Francisco New York • Toronto • Montreal • London • Munich • Paris • Madrid Capetown • Sydney • Tokyo • Singapore • Mexico City Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and the publisher was aware of a trademark claim, the designations have been printed with initial capital letters or in all capitals. The author and publisher have taken care in the preparation of this book, but make no expressed or implied warranty of any kind and assume no responsibility for errors or omissions. No liability is assumed for incidental or consequential damages in connection with or arising out of the use of the information or programs contained herein.
    [Show full text]
  • Scene Graph Adapter
    Scene Graph Adapter: An efficient Architecture to Improve Interoperability between 3D Formats and 3D Application Engines Rozenn Bouville Berthelot, Jérôme Royan, Thierry Duval, Bruno Arnaldi To cite this version: Rozenn Bouville Berthelot, Jérôme Royan, Thierry Duval, Bruno Arnaldi. Scene Graph Adapter: An efficient Architecture to Improve Interoperability between 3D Formats and 3D Application Engines. Web3D 2011 (16th International Conference on 3D Web technology), Jun 2011, Paris, France. pp.21- 30. inria-00586161 HAL Id: inria-00586161 https://hal.inria.fr/inria-00586161 Submitted on 6 Apr 2014 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Scene Graph Adapter: An efficient Architecture to Improve Interoperability between 3D Formats and 3D Applications Engines Rozenn Bouville Berthelot∗ Jérôme Royan† Thierry Duval‡ Bruno Arnaldi§ Orange Labs and IRISA, Rennes, France Orange Labs France IRISA, Rennes, France IRISA, Rennes, France Figure 1: Our architecture allows the loading of any 3D graphics format simultaneously in any available rendering engine. The scene graph adapter is an interface that adapts a scene graph (SG) of a given format into a renderer scene graph and which also allows the rendering part to request this scene graph.
    [Show full text]
  • Automated Software System for Checking the Structure and Format of Acm Sig Documents
    AUTOMATED SOFTWARE SYSTEM FOR CHECKING THE STRUCTURE AND FORMAT OF ACM SIG DOCUMENTS A THESIS SUBMITTED TO THE GRADUATE SCHOOL OF APPLIED SCIENCES OF NEAR EAST UNIVERSITY By ARSALAN RAHMAN MIRZA In Partial Fulfillment of the Requirements for The Degree of Master of Science in Software Engineering NICOSIA, 2015 ACKNOWLEDGEMENTS This thesis would not have been possible without the help, support and patience of my principal supervisor, my deepest gratitude goes to Assist. Prof. Dr. Melike Şah Direkoglu, for her constant encouragement and guidance. She has walked me through all the stages of my research and writing thesis. Without her consistent and illuminating instruction, this thesis could not have reached its present from. Above all, my unlimited thanks and heartfelt love would be dedicated to my dearest family for their loyalty and their great confidence in me. I would like to thank my parents for giving me a support, encouragement and constant love have sustained me throughout my life. I would also like to thank the lecturers in software/computer engineering department for giving me the opportunity to be a member in such university and such department. Their help and supervision concerning taking courses were unlimited. Eventually, I would like to thank a man who showed me a document with wrong format, and told me “it will be very good if we have a program for checking the documents”, however I don’t know his name, but he hired me to start my thesis based on this idea. ii To Alan Kurdi To my Nephews Sina & Nima iii ABSTRACT Microsoft office (MS) word is one of the most commonly used software tools for creating documents.
    [Show full text]
  • Mixbus V4 1 — Last Update: 2017/12/19 Harrison Consoles
    Mixbus v4 1 — Last update: 2017/12/19 Harrison Consoles Harrison Consoles Copyright Information 2017 No part of this publication may be copied, reproduced, transmitted, stored on a retrieval system, or translated into any language, in any form or by any means without the prior written consent of an authorized officer of Harrison Consoles, 1024 Firestone Parkway, La Vergne, TN 37086. Table of Contents Introduction ................................................................................................................................................ 5 About This Manual (online version and PDF download)........................................................................... 7 Features & Specifications.......................................................................................................................... 9 What’s Different About Mixbus? ............................................................................................................ 11 Operational Differences from Other DAWs ............................................................................................ 13 Installation ................................................................................................................................................ 16 Installation – Windows ......................................................................................................................... 17 Installation – OS X ...............................................................................................................................
    [Show full text]
  • VLC User Guide
    VLC user guide Henri Fallon Alexis de Lattre Johan Bilien Anil Daoud Mathieu Gautier Clément Stenac VLC user guide by Henri Fallon, Alexis de Lattre, Johan Bilien, Anil Daoud, Mathieu Gautier, and Clément Stenac Copyright © 2002-2004 the VideoLAN project This document is the complete user guide of VLC. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. The text of the license can be found in the appendix. GNU General Public License. Table of Contents 1. Introduction.........................................................................................................................................................................1 What is the VideoLAN project ?.....................................................................................................................................1 What is a codec ?............................................................................................................................................................3 How can I use VideoLAN ?............................................................................................................................................3 Command line usage.......................................................................................................................................................4 2. Modules and options for VLC...........................................................................................................................................8
    [Show full text]
  • Visualisation and Generalisation of 3D City Models
    Visualisation and Generalisation of 3D City Models Bo Mao August 2010 TRITA SoM 2010-08 ISSN 1653-6126 ISRN KTH/SoM/-10/08/-SE ISBN 978-91-7415-715-4 © Bo Mao 2010 Licentiate Thesis Geoinformatics Division Department of Urban Planning and Environment Royal Institute of Technology (KTH) SE-100 44 STOCKHOLM, Sweden ii Abstract 3D city models have been widely used in different applications such as urban planning, traffic control, disaster management etc. Effective visualisation of 3D city models in various scales is one of the pivotal techniques to implement these applications. In this thesis, a framework is proposed to visualise the 3D city models both online and offline using City Geography Makeup Language (CityGML) and Extensible 3D (X3D) to represent and present the models. Then, generalisation methods are studied and tailored to create 3D city scenes in multi- scale dynamically. Finally, the quality of generalised 3D city models is evaluated by measuring the visual similarity from the original models. In the proposed visualisation framework, 3D city models are stored in CityGML format which supports both geometric and semantic information. These CityGML files are parsed to create 3D scenes and be visualised with existing 3D standard. Because the input and output in the framework are all standardised, it is possible to integrate city models from different sources and visualise them through the different viewers. Considering the complexity of the city objects, generalisation methods are studied to simplify the city models and increase the visualisation efficiency. In this thesis, the aggregation and typification methods are improved to simplify the 3D city models.
    [Show full text]
  • SOFTWARE-KOLLEKTION 5 18/2005 C
    SOFTWARE-KOLLEKTION 5 18/2005 c Notfall-Windows Foto und Grafik Media Center SOFTWARE-KOLLEKTION 5 18/2005 SOFTWARE-KOLLEKTION 5 c Foto und Grafik PhotoPlus 7 Vollversion Scribus 1.3.0 Photoshop Album SE 2.0 Wings 3D 0.98.31 18/2005 Windows Project Dogwaffle - freeware version 1.2 XnView 1.68 AlphaWorks 3.1 c Ptlens 6.1.1 PDAs AnaBuilder 2.46.2 Raw Shooter Essentials 1.1.3 Anim8or 0.9 Handy Sketch c't-Edition 1.0 SimpelFilter 0.92 PaintWinCE 2.0.2 Ashampoo Photo Illuminator 2.1.0.1 Vollversion SmartMorph 1.55 AutoStitch 2.184 Pocket Painter 1.0 Vollversion Soft Focus TealPaint Blender 2.37 Surface 3D Release 2 BorderMania Pro 4.0 The Gimp cam2pc ThumbsPlus Special Edition 7 Vollversion Notfall-Windows Canvas 8 Vollversion Vignette Corrector 1.0 Contrast Mask VirtuaLight 1.4.0 PE Builder 3.1.5 c't-Edition Vollversion DCPro Filters 4.0 virtualPhotographer 1.44 7-Zip (PE) 3.13 dcraw 7.3 Web Album Generator 1.5.0 AntiVirenKit 2005 (PE) 15.0.5 Vollversion DrawPlus 5 Vollversion Wings 3D 0.98.31 Bitdefender 8 Free Edition (PE) 8.0.200 Vollversion Exif-Viewer 2.4 Xara 3D 3.0 Vollversion DeepBurner (PE) 1.6.0.198 Exifer 2.1.5 Xentient Thumbnails 1.0.1 Drive Snapshot (PE) 1.36 Vollversion FixFoto c't Edition XnView 1.8 EasyRecovery Lite (PE) 6.10 Vollversion Harry's Filters 3.0 XXL Poster Printer 7.0 Vollversion Ext2 Installable File System (PE) 1.0.1a Helicon Filter Pro 3.10 File Recovery (PE) 4.0 HotPixel 1.2 Mac Firefox (PE) 1.0.4 HyperSnap-DX 3.64 Vollversion AnaBuilder 2.46.2 IrfanView (PE) 3.97 imgseek 0.8.5 Artrage 1.1 Proton Editor (PE)
    [Show full text]
  • Symantec Web Security Service Policy Guide
    Web Security Service Policy Guide Revision: NOV.07.2020 Symantec Web Security Service/Page 2 Policy Guide/Page 3 Copyrights Broadcom, the pulse logo, Connecting everything, and Symantec are among the trademarks of Broadcom. The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries. Copyright © 2020 Broadcom. All Rights Reserved. The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries. For more information, please visit www.broadcom.com. Broadcom reserves the right to make changes without further notice to any products or data herein to improve reliability, function, or design. Information furnished by Broadcom is believed to be accurate and reliable. However, Broadcom does not assume any liability arising out of the application or use of this information, nor the application or use of any product or circuit described herein, neither does it convey any license under its patent rights nor the rights of others. Policy Guide/Page 4 Symantec WSS Policy Guide The Symantec Web Security Service solutions provide real-time protection against web-borne threats. As a cloud-based product, the Web Security Service leverages Symantec's proven security technology, including the WebPulse™ cloud community. With extensive web application controls and detailed reporting features, IT administrators can use the Web Security Service to create and enforce granular policies that are applied to all covered users, including fixed locations and roaming users. If the WSS is the body, then the policy engine is the brain. While the WSS by default provides malware protection (blocks four categories: Phishing, Proxy Avoidance, Spyware Effects/Privacy Concerns, and Spyware/Malware Sources), the additional policy rules and options you create dictate exactly what content your employees can and cannot access—from global allows/denials to individual users at specific times from specific locations.
    [Show full text]
  • Isma Internet Streaming Media Alliance
    ISMA INTERNET STREAMING MEDIA ALLIANCE Output Document Number TD00105 November 2007 TITLE: ISMA Ultravox Part 2: Ultravox 3.0 Protocol Specification Status: Provisional Specification © 2007 ISMA12/14/2007ISMA Ultravox Part 2: Ultravox 3 Protocol Provisional Specification 1 Table of Contents Abstract...........................................................................................................................3 1 Ultravox Protocol.........................................................................................................4 1.1 Overview...............................................................................................................4 1.2 Ultravox Frames....................................................................................................4 1.3 Encrypted Messages (Payload for any classes 3-15)...............................................5 2 Ultravox Broadcaster Protocol......................................................................................6 2.1 POST Headers.......................................................................................................6 2.1.1 Required Headers............................................................................................7 2.1.2 Optional Arguments........................................................................................7 2.2 Response Codes.....................................................................................................7 2.3 Response Headers..................................................................................................8
    [Show full text]
  • The Open Virtual Machine Format Whitepaper for OVF Specification
    The Open Virtual Machine Format Whitepaper for OVF Specification version 0.9 OVF Whitepaper 0.9 VMware, Inc. 3401 Hillview Ave., Palo Alto CA, 94304 USA Tel 877-486-9273 Fax 650-427-5001 www.vmware.com XenSource, Inc. 2300 Geng Road, Suite 2500, Palo Alto, CA 94303 www.xensource.com Copyright © VMware, Inc. and XenSource, Inc. All rights reserved. VMware, the VMware “boxes” logo and design, Virtual SMP and VMotion are registered trademarks or trademarks of VMware, Inc. in the United States and/or other jurisdictions. Xen, XenSource, the “Circle Xen” logo and derivatives thereof are registered trademarks or trademarks of XenSource, Inc. in the United States and other countries. Microsoft, Windows and Windows NT are registered trademarks of Microsoft Corporation. Linux is a registered trademark of Linus Torvalds. All other marks and names mentioned herein may be trademarks of their respective companies. No part of this specification (whether in hardcopy or electronic form) may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of VMware, Inc. (VMware), and XenSource, Inc. (XenSource) except as otherwise permitted under copyright law or the terms of that certain Teaming and Non-Disclosure Agreement between VMware and XenSource dated March 23, 2007, as amended from time to time. Please note that the content in this specification is protected under copyright law even if it is not distributed with software
    [Show full text]
  • Digitale Fotografie © Copyright by Heise Zeitschriften Verlag Gmbh & Co
    cc.0310.006-009_fuer_online.EP 08.06.2010 13:37 Uhr Seite 6 Video-Tutorials PhotoPlus 11.1.1.19 Vollversion Linux Raw Therapee 3.0 alpha 1 AmoK Exif Sorter 2.5.6 Praxistraining Fotografie: Fotografieren leicht gemacht (1h 28 min) RegiStax 5.1 Cooliris 1.12.0.33689 Praxistraining Fotografie: UFRaw 0.17 Landschaft & Natur (1h 3 min) VCW VicMan’s Photo Editor 8.1 HDR Landschaft, Architektur, Panorama (1h 3 min) Mac OS Praxistraining Fotografie: Windows GIMP 2.6.8 Mit Licht gestalten (30 min) DRI-Tool 2.0 GREYC’s Magic Image Converter (G’MIC) 1.3.5.0 Neu in Adobe Photoshop CS5 (58 min) easyHDR Basic ImageMagick 6.6.1-5 Interview: Lukas Roth – EnfuseGUI 2.1 PhotoAcute Studio 2.70 Vollversion Die Illusion einer Fotografie (18 min) FDRTools Basic 2.3.2 UFRaw 0.15 Qtpfsgui 1.9.3 E-Book (PDF) Linux Mac OS GREYC’s Magic Image Converter (G’MIC) 1.3.5.0 Stadt, Land, Fluss: Natur- und EnfuseGUI 2.1 Stadtlandschaften digital fotografieren Raw Therapee 3.0 alpha 1 FDRTools Basic 2.3.2 Qtpfsgui 1.9.3 Gutscheine Foto-Tools Linux FotoTV.de (24-Stunden-Zugang mit Vollzugriff) Windows Qtpfsgui 1.9.3 mootivoo.de (20 Euro Rabatt) AmoK Exif Sorter 2.5.6 Cooliris 1.12.0.33689 Bildbearbeitung DiaShow Deluxe 6.6.02 Spezialversion Testbilder Exif Farm 2.1 Windows Beispielbilder von Kameras in IrfanView 4.25 Unterwassergehäusen GIMP 2.6.8 OpenEXR 1.2.1 Beispielbilder zum Know-how-Artikel GIMP Portable 2.6.8 Entrauschen GREYC’s Magic Image Converter (G’MIC) 1.3.5.0 Mac OS Testbilder Digitalkameras Helicon Filter 4.93.2 AmoK Exif Sorter 2.5.6 Testbilder Manuell-Objektive: Image Analyzer 1.31 Cooliris 1.12.0.33689 Außenaufnahmen Rathaus ImageMagick 6.6.1-5 Exif Untrasher 1.4.3 Testbilder Manuell-Objektive: Passbild-Generator 3.5a c’t-Testvorlage PhotoAcute Studio 2.70 Vollversion Testbilder Outdoor-Kameras 6 c’t special 03/2010 – Digitale Fotografie © Copyright by Heise Zeitschriften Verlag GmbH & Co.
    [Show full text]
  • Semantic 3D Modelling for Infrastructure Asset Management
    Semantic 3D Modelling for Infrastructure Asset Management Master’s Thesis Department of Built Environment School of Engineering Aalto University Espoo, 1st of November 2016 M.Sc Sanna Makkonen Supervisor: Prof. Kirsi Virrantaus Advisor: M.Sc (Tech) Sonja Vilpas Aalto University, P.O. BOX 11000, 00076 AALTO www.aalto.fi Abstract of master's thesis Author Sanna Makkonen Title of thesis Semantic 3D Modelling for Infrastructure Asset Management Degree programme Degree Programme in Geomatics Major Geoinformation Technology Code IA3002 Thesis supervisor Professor Kirsi Virrantaus Thesis advisor(s) Sonja Vilpas Date 03.11.2016 Number of pages 73 Language English Abstract Infrastructure asset management has long been based on 2D based geographical information sys- tems. However, 3D based solutions have been taking over the market and, for example, other infra- structure management phases, planning and constructions have started taking advantage of these 3D based solutions. Many studies have shown that 3D facilitates the understanding of the models which improves communication and leads to more efficient working methods. This thesis aims to outline the rationale, current practices and benefits of semantic 3D modelling in infrastructure asset management. In other words, the thesis suggests what the rationale for intro- ducing semantic 3D modelling into infrastructure asset management is, what kind of technical so- lutions or practices have been provided and what are the benefits of introducing semantic 3D mod- elling into asset management. In the end, change factors were outlined to illuminate what should be done to enable semantic 3D based infrastructure asset management. Methods used in this thesis consists of literature, software review and expert interviews.
    [Show full text]