Shared Engineering Services APJ Ghostdetect ver 1.0 for SPC Donghyun Seo Dec 12, 2008.

Slides:



Advertisements
Similar presentations
Smart Identity Protection That Works for You and Your Users 2 Petri Ala-Annala Senior Principal, CISSP-ISSAP, CISA, CISM.
Advertisements

Name COUNTRY 10 th Name COUNTRY 10 th Cheung Yee Man Hong Kong Cheung Yee Man Hong Kong.
Symantec Education Skills Assessment SESA 3.0 Feature Showcase
IT Analytics for Symantec Endpoint Protection
‘Changing environment – changing security’ - Cyber-threat challenges today – Budapest, September 17-18, Industry and the fight against cybercrime.
Online Shopping Self-Defense
© 2010 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered.
1 Online Self-Defense: Avoiding Scams Chau Mai December 5, 2013.
Mokala Christele Wasseu Toutou Frederique Maraise Awah Vanessa Injeh.
Threat Intelligence Use in Information Security: History, Theory and Practice Tim Gallo Cyber Security Field Engineering 1.
Translation in the Community LRC Localisation in the Cloud Jason Rickard Principal Product Manager, Community.
Empower People Around the World with a $25 Loan Design Skills Color Typography Layout Creativity Technical Skills Tool Use Layers Color Optimization.
Symantec Tech Symposium Randy Cochran, Vice Present Channel Sales – Americas August 17, 2009.
Feature: Purchase Requisitions - Requester © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names.
Click to edit Master title style Click to edit Master subtitle style.
MIX 09 4/15/ :14 PM © 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered.
The Changing Face of Endpoint Security K Varadarajan Regional Manager, Enterprise Sales, Symantec Security Conference 2010_Bangalore.
Interactivity Navigating a data model Working with large quantities of data Entry Editing and adding data User feedback and validation Presentation.
Symantec Vision and Strategy for the Information-Centric Enterprise Muhamed Bavçiç Senior Technology Consultant SEE.
1 When Cloud Networking meets Cloud Computing: Software-Defined Networking (SDN) Customer Application Faan DeSwardt Infrastructure Architecture Manager.
GPS 2011 Slide - 1 COMPETITIVE STRATEGIES APAC Discussion.
Windows 7 Training Microsoft Confidential. Windows ® 7 Compatibility Version Checking.
Практические аспекты аутсорсинга ИБ Алексей Чередниченко Ведущий консультант, Symantec Services Group 28 апреля 2009.
President’s Forum and WSML 2012 INDSTRAT 02 Mobile Market Dynamics Brian Duckering, Deborah Clark, Evan Quinn “A Day in the Life of Mobile” 1.
Mobile Devices Carry Hidden Threats With Financial Consequences Hold StillInstalled.
Conditions and Terms of Use
Symantec Managed Security Services The Power To Protect Duncan Evans Director, Cyber Security Services 1.
Feature: Print Remaining Documents © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or.
1 Safely Using Shared Computers Amanda Grady December 2013.
Symantec Targeted Attack Protection 1 Stopping Tomorrow’s Targeted Attacks Today iPuzzlebiz
© 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or.
Type presentation name here in slide master © 2007 SDL. Company Confidential. Forward-looking information is based upon multiple assumptions and uncertainties.
GPS 2011 Slide - 1 MS CERT KIT Microworld Nova. GPS 2011 Slide - 2 Presentation of Microworld Nova The MS Cert Kit MS Cert Kit presentation The backend.
Quick Thoughts on PGP Use Cases for KMIP 1 Michael Allen Sr. Technical Director.
The current state of Cybersecurity Targeted and In Your Pocket Dale “Dr. Z” Zabriskie CISSP CCSK Symantec Evangelist.
© 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or.

President’s Forum and WSML 2012 SYMSTRAT 03: Enterprise Sales Conversations for Virtualization Todd Zambrovitz with guest appearance by Kevin Fiedler 1.
WLAN Auditing Tools and Techniques Todd Kendall, Principal Security Consultant September 2007.
Innovation From the Ground Up Fred Hollowood, Martin Roche.
Type presentation name here in slide master © 2007 SDL. Company Confidential. Forward-looking information is based upon multiple assumptions and uncertainties.
Josef Schauer Program Manager Previous version support.
Winning with Storage Foundation 5.x – 4.x End Of Life Process Winning with Storage Foundation 5.x.
Installation of Storage Foundation for Windows High Availability 5.1 SP2 1 Daniel Schnack Principle Technical Support Engineer.
1 APJ Curriculum Paths for Partners Specialization Accelerates Shirley Hoon APJ Partner Enablement Partner Enablement Oct
Copy to Tape TOI. 2 Copy to Tape TOI Agenda Overview1 Technical Feature Implementation2 Q&A3.
FY16 Q3 Enterprise West QBR
© 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks.
© 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or.
© 2008 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or.
Optimized Synthetics 1 OpenStorage Optimized Synthetics.
Type presentation name here in slide master © 2007 SDL. Company Confidential. Forward-looking information is based upon multiple assumptions and uncertainties.
Partner Proctored Assessment Registration Process Ajit Jha 1 Partner Assessment.
OST Virtual Synthetics 1. Synthetics Overvier Definitions – Catalog – Image – Extent Process Overview (today) – Extent map derivation – Read agenda –
Cyber Security in the Post-AV Era Amit Mital Chief Technology Officer General Manager, Emerging Endpoints Business Unit.

Editing Tons of Text? RegEx to the Rescue! Eric Cressey Senior UX Content Writer Symantec Corporation.
APIs related to NBU AIR Feature 1 OST APIs Related to NBU AIR Feature.
Maximize Profits Through Stronger Security Brook Chelmo Product Marketing
Using Parallelspace TEAM Models to Design and Create Custom Profiles
Parallelspace PowerPoint Template for ArchiMate® 2.1 version 1.1
Parallelspace PowerPoint Template for ArchiMate® 2.1 version 2.0
1 Topic Title First slide 2 line 3 line 4 line
Automation in an XML Authoring Environment
Deep dive on app data roaming
Presenter Name Title Organization.
1 Session Title 2 line 3 line 4 line
1 Topic Title First slide 2 line 3 line 4 line
Presentation transcript:

Shared Engineering Services APJ Ghostdetect ver 1.0 for SPC Donghyun Seo Dec 12, 2008

Shared Engineering Services APJ Development Request SPC(Korea Software Property-right Council) requested Symantec Korea sales team to make a 3-rd part tool to detect Ghost fingerprint. SPC are planning to make another audit program which support Ghost fingerprint sometime next year. so separate detecting/reporting tool was necessary until release new Audit program. 2

Shared Engineering Services APJ Development Requirement 1 Ghost usage detect function ( provided by GCR SES) Create output file as result, every time it runs. Save output file per each PC g_Audit.exe runs with/without Audit.exe(SPC’s) file in same folder. g_Audit.exe UI will be hidden to users. one exe file No limitation of file size g_Audit.exe ’s output files will be supported by exist Audit viewer. (if we cannot get the latest audit source from SPC we have to make another viewer) 3

Shared Engineering Services APJ Development Requirement 2 With Audit source case –g_Audit.exe tool’s output files will be supported by exist Audit viewer. Without Audit source case (we have done by this case) –G_Audit.exe tool’s output files will not be supported by exist Audit viewer. –Different encryption will be applied. –Different viewer can be provided to SPC to summarize the Ghost audit results. –1 additional week of dev time is required for the viewer 4

Shared Engineering Services APJ Development Schedule / Resource Schedule –2008/Oct/21 – Start Development process –2008/Nov/07 – Release Beta (v0.1) version to SPC –2008/Nov/14 – Receive Feedback from SPC –2008/Nov/21 – Release PreBeta (v0.15) version to SPC –2008/Nov/28 – Release Beta(v0.2) version to SPC –2008/Dec/03 – Received Feedback from SPC –2008/Dec/10 – Release v1.0 to SCP Resource –GCR SES – GhostLib.lib ( usage detect function provided) –Donghyun Seo / Minyong Park – Dev –Minyoung Park / Wooyong Shim - SQA 5

Shared Engineering Services APJ How to use Ghostdetect tool 6 1. Run g_Audit.exe (this file should be located in the same folder with SPC Audit tool 2. SPC Audit tool will run automatically and user cannot see the UI of ‘g_Audit.exe’

Shared Engineering Services APJ How to use Ghostdetect tool 7 3. Close SPC audit tool then two result files will create. ‘.ret’ from SPC audit tool and ‘.gret’ from g_Audit.exe 4. Run Ghostdetect.exe to detect/read/view/print/save

Shared Engineering Services APJ How to use Ghostdetect tool 8 5. Open/Detect

Shared Engineering Services APJ How to use Ghostdetect tool 9 6. Print/Save Print Csv save

Shared Engineering Services APJ 10 Copyright © 2007 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. Thank you. DongHyun Seo Shared Engineering Services APJ