Download as pdf or txt
Download as pdf or txt
You are on page 1of 69

InterScan Messaging Security Virtual

Appliance Administrator s Guide Trend


Micro
Visit to download the full and correct content document:
https://ebookmeta.com/product/interscan-messaging-security-virtual-appliance-admini
strator-s-guide-trend-micro/
More products digital (pdf, epub, mobi) instant
download maybe you interests ...

CCNP Security Virtual Private Networks SVPN 300 730


Official Cert Guide 1st Edition Muniz

https://ebookmeta.com/product/ccnp-security-virtual-private-
networks-svpn-300-730-official-cert-guide-1st-edition-muniz/

MCA Modern Desktop Administrator Complete Study Guide


1st Edition William Panek

https://ebookmeta.com/product/mca-modern-desktop-administrator-
complete-study-guide-1st-edition-william-panek/

Moodle 3 Administration Third Edition An administrator


s guide to confi guring securing customizing and
extending Moodle Buchner

https://ebookmeta.com/product/moodle-3-administration-third-
edition-an-administrator-s-guide-to-confi-guring-securing-
customizing-and-extending-moodle-buchner/

Java Platform Standard Edition Security Developer s


Guide Oracle

https://ebookmeta.com/product/java-platform-standard-edition-
security-developer-s-guide-oracle/
MongoDB Administrator s Guide Over 100 practical
recipes to efficiently maintain and administer your
MongoDB solution 1st Edition Cyrus Dasadia

https://ebookmeta.com/product/mongodb-administrator-s-guide-
over-100-practical-recipes-to-efficiently-maintain-and-
administer-your-mongodb-solution-1st-edition-cyrus-dasadia/

Micro Light Emitting Diode: Fabrication and Devices:


Micro-LED Technology

https://ebookmeta.com/product/micro-light-emitting-diode-
fabrication-and-devices-micro-led-technology/

MCA Microsoft 365 Teams Administrator Study Guide Exam


MS 700 1st Edition Ben Lee

https://ebookmeta.com/product/mca-microsoft-365-teams-
administrator-study-guide-exam-ms-700-1st-edition-ben-lee/

Microsoft Azure Virtual Desktop Guide: Configuring and


Operating Microsoft Azure Virtual Desktop 1st Edition
Arun Sabale

https://ebookmeta.com/product/microsoft-azure-virtual-desktop-
guide-configuring-and-operating-microsoft-azure-virtual-
desktop-1st-edition-arun-sabale/

Certified Kubernetes Administrator CKA Study Guide In


Depth Guidance and Practice Early Release Benjamin
Muschko

https://ebookmeta.com/product/certified-kubernetes-administrator-
cka-study-guide-in-depth-guidance-and-practice-early-release-
benjamin-muschko/
Trend Micro Incorporated reserves the right to make changes to this document and to
the product described herein without notice. Before installing and using the product,
please review the readme files, release notes, and/or the latest version of the applicable
documentation, which are available from the Trend Micro website at:
http://docs.trendmicro.com/en-us/enterprise/interscan-messaging-security.aspx
Trend Micro, the Trend Micro t-ball logo, Control Manager, eManager, InterScan, and
TrendLabs are trademarks or registered trademarks of Trend Micro Incorporated. All
other product or company names may be trademarks or registered trademarks of their
owners.
© 2015. Trend Micro Incorporated. All Rights Reserved.
Document Part No.: MSEM96476/140707
Release Date: October 2015
Protected by U.S. Patent No.: Patents pending
This documentation introduces the main features of the product and/or provides
installation instructions for a production environment. Read through the documentation
before installing or using the product.
Detailed information about how to use specific features within the product may be
available in the Trend Micro Online Help and/or the Trend Micro Knowledge Base at
the Trend Micro website.
Trend Micro always seeks to improve its documentation. If you have questions,
comments, or suggestions about this or any Trend Micro document, please contact us at
[email protected].
Evaluate this documentation on the following site:
http://www.trendmicro.com/download/documentation/rating.asp
Table of Contents
About this Manual
About this Manual ............................................................................................. xi
What's New ....................................................................................................... xii
Audience ........................................................................................................... xiii
InterScan Messaging Security Virtual Appliance Documentation ........... xiii
Document Conventions ................................................................................. xiv

Part I: Getting Started


Chapter 1: Introducing InterScan Messaging Security
Virtual Appliance
About InterScan Messaging Security Virtual Appliance ........................... 1-3
IMSVA Main Features and Benefits ............................................................ 1-3
About Cloud Pre-Filter ................................................................................ 1-13
About Email Encryption ............................................................................. 1-13
About Spyware/Grayware .......................................................................... 1-14
About Web Reputation Services ................................................................ 1-16
About Email Reputation ............................................................................. 1-16
About Trend Micro Control Manager ...................................................... 1-18
About Trend Micro Smart Protection ....................................................... 1-21
About Graymail Scanning ........................................................................... 1-23
About Command & Control (C&C) Contact Alert Services ................. 1-24

Chapter 2: Getting Started


Opening the IMSVA Management Console .............................................. 2-2
Viewing the Management Console Using Secure Socket Layer .............. 2-3

i
Trend Micro InterScan™ Messaging Security Virtual Appliance 9.0 Administrator’s Guide

Setting Up a Child Device ............................................................................. 2-4


Using Smart Search ........................................................................................ 2-6
Configuring Proxy Settings ........................................................................... 2-6
IMSVA Services .............................................................................................. 2-8
Selecting a Scan Method ................................................................................ 2-8

Chapter 3: User Accounts


Administrator Account Management .......................................................... 3-2
Adding Administrator Accounts .................................................................. 3-2
Editing or Deleting Administrator Accounts ............................................. 3-5
Changing the Management Console Password .......................................... 3-6

Chapter 4: Using the Configuration Wizard


Configuring IMSVA with the Configuration Wizard ............................... 4-2

Chapter 5: Updating Components


Updating Engine and Pattern Files .............................................................. 5-2
Specifying an Update Source ........................................................................ 5-3
Performing a Manual Update ....................................................................... 5-4
Rolling Back a Component Update ............................................................. 5-5
Scheduled Component Updates ................................................................... 5-6
Updating the System and Application Files ................................................ 5-9

Chapter 6: Getting Started with Cloud Pre-Filter


Understanding Cloud Pre-Filter ................................................................... 6-2
Creating a Cloud Pre-Filter Account ........................................................... 6-5

Chapter 7: Getting Started with ATSE and Virtual Analyzer


Scan Technology ............................................................................................. 7-2

ii
Table of Contents

About Advanced Threat Scan Engine ......................................................... 7-2


About Virtual Analyzer .................................................................................. 7-4

Chapter 8: Getting Started with Email Encryption


Understanding Email Encryption ................................................................ 8-2
Using Email Encryption ................................................................................ 8-3
Registering for Email Encryption ................................................................ 8-3
Managing Domains ........................................................................................ 8-4
Registering Domains ...................................................................................... 8-5

Part II: Configuring IMSVA and Cloud Pre-filter


Chapter 9: Configuring Cloud Pre-Filter
Understanding Cloud Pre-Filter Policies .................................................... 9-2
Creating a Cloud Pre-Filter Policy ............................................................... 9-4
Verifying Cloud Pre-Filter Works .............................................................. 9-14
Configuring DNS MX Records .................................................................. 9-14
Suggested IMSVA Settings When Using Cloud Pre-Filter .................... 9-15
Disabling Cloud Pre-Filter .......................................................................... 9-17

Chapter 10: Configuring IP Filtering Settings


IP Filtering Service ....................................................................................... 10-2
Using Email Reputation .............................................................................. 10-2
Configuring IP Filtering .............................................................................. 10-4
Displaying Suspicious IP Addresses and Domains ............................... 10-16

Chapter 11: Scanning SMTP Messages


Configuring SMTP Routing ........................................................................ 11-2
Configuring SMTP Settings ........................................................................ 11-2

iii
Trend Micro InterScan™ Messaging Security Virtual Appliance 9.0 Administrator’s Guide

Configuring Connection Settings ............................................................... 11-3


Configuring Message Rule Settings ............................................................ 11-6
Configuring Message Delivery Settings ..................................................... 11-9
DKIM Signing ............................................................................................ 11-15

Chapter 12: Configuring Known Hosts Settings


About Known Hosts ................................................................................... 12-2
Adding Known Hosts .................................................................................. 12-3
Importing Known Hosts ............................................................................. 12-4
Exporting Known Hosts ............................................................................. 12-5

Chapter 13: Configuring Transport Layer Security


About Transport Layer Security ................................................................. 13-2
Prerequisites for Using TLS with IMSVA ................................................ 13-3
Configuring TLS Settings ............................................................................ 13-6
Managing Certificates in IMSVA ............................................................. 13-13

Chapter 14: Configuring POP3 Settings


Scanning POP3 Messages ........................................................................... 14-2
Enabling POP3 Scanning ............................................................................ 14-3
Configuring POP3 Settings ......................................................................... 14-3
Configuring POP3 Scan Service ................................................................. 14-5

Part III: IMSVA Policies


Chapter 15: Managing Policies
About Policies ............................................................................................... 15-2
How the Policy Manager Works ................................................................ 15-2
Filter Policies that Display in the Policy List ........................................... 15-3

iv
Table of Contents

Chapter 16: Configuring Common Policy Objects


Policy Object Descriptions ......................................................................... 16-2
Address Groups ............................................................................................ 16-2
Using the Keyword & Expression List ................................................... 16-14
Data Loss Prevention ................................................................................ 16-26
Notifications ................................................................................................ 16-44
Stamps .......................................................................................................... 16-48
DKIM Approved List ................................................................................ 16-52
Web Reputation Approved List ............................................................... 16-53

Chapter 17: Configuring Internal Addresses


Configuring Internal Addresses ................................................................. 17-2

Chapter 18: Configuring Policies


Adding Policies ............................................................................................. 18-2
Specifying a Route ........................................................................................ 18-2
Specifying Scanning Conditions ............................................................... 18-10
Specifying Actions ...................................................................................... 18-34
Finalizing a Policy ....................................................................................... 18-42

Chapter 19: Configuring Encryption Settings


Configuring Encryption Settings ................................................................ 19-2
Encrypting Message Traffic ........................................................................ 19-3
Configuring Encryption Policies ................................................................ 19-3

Chapter 20: Configuring Scanning Exceptions


Setting Scan Exceptions .............................................................................. 20-2
Configuring Exceptions for Security Settings Violations ....................... 20-3
Setting Scan Actions for Security Setting Violations .............................. 20-4

v
Trend Micro InterScan™ Messaging Security Virtual Appliance 9.0 Administrator’s Guide

Setting Scan Actions for Malformed Messages ........................................ 20-5


Configuring Exceptions for Encrypted Messages ................................... 20-7
Setting Scan Actions for Encrypted Messages ......................................... 20-8
Setting Scan Actions for Virtual Analyzer Scanning Exceptions .......... 20-9

Chapter 21: Configuring Existing Policies


Modifying Existing Policies ........................................................................ 21-2
Policy Example 1 .......................................................................................... 21-5
Policy Example 2 .......................................................................................... 21-9
Using the Asterisk Wildcard ..................................................................... 21-14

Part IV: Monitoring the Network


Chapter 22: Monitoring the Network
Monitoring Your Network .......................................................................... 22-2
Viewing System Status ................................................................................. 22-2

Chapter 23: Dashboard and Widgets


Using the Dashboard ................................................................................... 23-2
Understanding Tabs ..................................................................................... 23-2
Understanding Widgets ............................................................................... 23-6

Chapter 24: Reports


Generating Reports ...................................................................................... 24-2
Managing One-time Reports ...................................................................... 24-5
Scheduled Reports ........................................................................................ 24-7

Chapter 25: Logs


About Logs .................................................................................................... 25-2

vi
Table of Contents

Configuring Log Settings ............................................................................. 25-2


Querying Logs ............................................................................................... 25-4

Chapter 26: Mail Areas and Queues


About Mail Areas and Queues ................................................................... 26-2
Configuring Quarantine and Archive Settings ......................................... 26-2
Managing Quarantine Areas ....................................................................... 26-4
Managing Archive Areas ............................................................................. 26-7
Querying Messages ....................................................................................... 26-9
Viewing Quarantined Messages ............................................................... 26-17
Viewing Archived Messages ..................................................................... 26-18
Viewing Postponed Messages .................................................................. 26-20
Viewing Deferred Messages ..................................................................... 26-21
Viewing Messages in the Virtual Analyzer Queue ................................ 26-23

Chapter 27: Notifications


Event Notifications ...................................................................................... 27-2
Configuring Delivery Settings ..................................................................... 27-2
Configuring Event Criteria and Notification Message ........................... 27-4
EUQ Digest ................................................................................................... 27-7
Editing Notifications .................................................................................... 27-9

Part V: Administering IMSVA


Chapter 28: Backing Up, Restoring, and Replicating
Settings
Importing and Exporting ............................................................................ 28-2
Backing Up IMSVA ..................................................................................... 28-5

vii
Trend Micro InterScan™ Messaging Security Virtual Appliance 9.0 Administrator’s Guide

Restoring IMSVA by Importing Settings ................................................. 28-6


Replicating Settings ...................................................................................... 28-8

Chapter 29: End-User Quarantine


About EUQ ................................................................................................... 29-2
EUQ Authentication .................................................................................... 29-2
Configuring End-User Quarantine (EUQ) .............................................. 29-2
Distribution List EUQ Management ...................................................... 29-14
Disabling EUQ ........................................................................................... 29-16

Chapter 30: Administrative Tasks


Managing Administrator Accounts ............................................................ 30-2
Configuring Connection Settings ............................................................... 30-6
Configuring Database Maintenance Schedule ....................................... 30-16
Managing Product Licenses ...................................................................... 30-17
Activating Products .................................................................................... 30-23
Configuring Smart Protection Network Settings .................................. 30-24

Chapter 31: Command Line Interface


Using the CLI ................................................................................................ 31-2
Entering the CLI .......................................................................................... 31-2
CLI Overview ............................................................................................... 31-3
Entering the OS Shell .................................................................................. 31-3
Command Line Interface Commands ....................................................... 31-4

Chapter 32: Modifying IMSVA Deployment


Internal Communication Port .................................................................... 32-2
Adding and Removing Devices .................................................................. 32-2

viii
Table of Contents

Changing Device Roles ................................................................................ 32-5


Changing the Deployment .......................................................................... 32-6
Changing IP Addresses ................................................................................ 32-7

Chapter 33: Updating and Rescuing the System and


Application
Updating the System and Application ....................................................... 33-2
Rescuing IMSVA .......................................................................................... 33-4

Chapter 34: Troubleshooting and FAQs


Troubleshooting ........................................................................................... 34-2
Frequently Asked Questions .................................................................... 34-21
Troubleshooting Cloud Pre-Filter ........................................................... 34-31

Appendices
Appendix A: Technical Support
Troubleshooting Resources ......................................................................... A-2
Contacting Trend Micro ............................................................................... A-3
Sending Suspicious Content to Trend Micro ............................................ A-5
Other Resources ............................................................................................ A-6

Appendix B: Default Directory Locations


Default Mail Queues ...................................................................................... B-2
eManager, Virus, and Program Logs ........................................................... B-4
Temporary Folder .......................................................................................... B-4
Notification Pickup Folder ........................................................................... B-4

Appendix C: IMSVA Scripts


Using IMSVA Scripts .................................................................................... C-2

ix
Trend Micro InterScan™ Messaging Security Virtual Appliance 9.0 Administrator’s Guide

Appendix D: Creating a New Virtual Machine Under VMware


ESX for IMSVA
Creating a New Virtual Machine ................................................................. D-2

Appendix E: Creating a New Virtual Machine Under


Microsoft Hyper-V for IMSVA
Understanding Hyper-V Installation .......................................................... E-2
Installing IMSVA on Microsoft Hyper-V .................................................. E-2

Index
Index .............................................................................................................. IN-1

x
Preface

About this Manual


Welcome to the Trend Micro™ InterScan™ Messaging Security Virtual Appliance
Administrator's Guide. This manual contains information about InterScan Messaging
Security Virtual Appliance (IMSVA) features, system requirements, as well as
instructions on configuring IMSVA settings.
Refer to the IMSVA 9.0 Installation Guide for information about installing and
upgrading IMSVA.
Topics include:
• What's New on page xii
• Audience on page xiii
• InterScan Messaging Security Virtual Appliance Documentation on page xiii
• Document Conventions on page xiv

xi
Trend Micro InterScan™ Messaging Security Virtual Appliance 9.0 Administrator’s Guide

What's New

TABLE 1. IMSVA 9.0 New Features

NEW FEATURE DESCRIPTION

Transport Layer Security IMSVA applies Transport Layer Security (TLS) to


enhancement email messages that both enter and exit IMSVA.
IMSVA provides detailed TLS settings such as
security levels and cipher grades.

Certificate management IMSVA allows you to manage your SMTP and


HTTPS certificates and trusted CA certificates.

Virtual Analyzer integration IMSVA enables you to define rules to send email
improvement messages with specified attachment types to
Virtual Analyzer for analysis.

Social Engineering Attack Social Engineering Attack Protection detects


Protection suspicious behavior related to social engineering
attacks in email messages. When Social
Engineering Attack Protection is enabled, the
Trend Micro Antispam Engine scans for suspicious
behavior in several parts of each email
transmission, including the email header, subject
line, body, attachments, and the SMTP protocol
information. If the Antispam Engine detects
behavior associated with social engineering
attacks, the Antispam Engine returns details about
the message to IMSVA for further action, policy
enforcement, or reporting.

Known host support Known hosts include trusted mail transfer agents
(MTAs) and the Cloud Pre-Filter that are deployed
before IMSVA on your network. IMSVA enables
you to specify known hosts to exempt them from IP
filtering and graymail scanning.

Enhanced message delivery IMSVA supports both mail exchanger record (MX
record) lookup and static routing methods for
message delivery to achieve better load balance
and failover capabilities.

xii
About this Manual

NEW FEATURE DESCRIPTION

Enhanced Data Loss Prevention IMSVA supports both predefined and customized
(DLP) DLP compliance templates based on various data
identifiers.

Graymail Graymail refers to solicited bulk email messages


that are not spam. IMSVA manages graymail
separately from common spam to allow
administrators to identify graymail messages. IP
addresses specified in the graymail exception list
bypass scanning.

DomainKeys Identified Mail (DKIM) IMSVA supports DKIM signing for outgoing email
signing messages.

Audience
The IMSVA documentation is written for IT administrators in medium and large
enterprises. The documentation assumes that the reader has in-depth knowledge of
email messaging networks, including details related to the following:
• SMTP and POP3 protocols
• Message transfer agents (MTAs), such as Postfix or Microsoft™ Exchange
• LDAP
• Database management
• Transport Layer Security
The documentation does not assume that the reader has any knowledge of antivirus or
antispam technology.

InterScan Messaging Security Virtual


Appliance Documentation
The IMSVA documentation consists of the following:

xiii
Trend Micro InterScan™ Messaging Security Virtual Appliance 9.0 Administrator’s Guide

Administrator’s Guide
Helps you get IMSVA up and running with post-installation instructions on
how to configure and administer IMSVA.

Installation Guide
Contains introductions to IMSVA features, system requirements, and
provides instructions on how to deploy and upgrade IMSVA in various
network environments.

Online Help
Provides detailed instructions on each field and how to configure all features
through the user interface. To access the online help, open the web
management console, then click the help icon.

Readme File
Contain late-breaking product information that might not be found in the
other documentation. Topics include a description of features, installation
tips, known issues, and product release history.

The documentation is available at:

http://docs.trendmicro.com

Document Conventions
The documentation uses the following conventions:

TABLE 2. Document Conventions

CONVENTION DESCRIPTION

UPPER CASE Acronyms, abbreviations, and names of certain


commands and keys on the keyboard

Bold Menus and menu commands, command buttons, tabs,


and options

Italics References to other documents

xiv
About this Manual

CONVENTION DESCRIPTION

Monospace Sample command lines, program code, web URLs, file


names, and program output

Navigation > Path The navigation path to reach a particular screen


For example, File > Save means, click File and then click
Save on the interface

Configuration notes
Note

Recommendations or suggestions
Tip

Information regarding required or default configuration


Important
settings and product limitations

Critical actions and configuration options


WARNING!

xv
Part I
Getting Started
Chapter 1

Introducing InterScan™ Messaging


Security Virtual Appliance
This chapter introduces InterScan™ Messaging Security Virtual Appliance (IMSVA)
features, capabilities, and technology, and provides basic information on other Trend
Micro products that will enhance your anti-spam capabilities.

Topics include:

• About InterScan Messaging Security Virtual Appliance on page 1-3


• IMSVA Main Features and Benefits on page 1-3
• About Cloud Pre-Filter on page 1-13
• About Email Encryption on page 1-13
• About Spyware/Grayware on page 1-14
• About Web Reputation Services on page 1-16
• About Email Reputation on page 1-16
• About Trend Micro Control Manager on page 1-18
• About Trend Micro Smart Protection on page 1-21
• About Graymail Scanning on page 1-23

1-1
Trend Micro InterScan™ Messaging Security Virtual Appliance 9.0 Administrator’s Guide

• About Command & Control (C&C) Contact Alert Services on page 1-24

1-2
Introducing InterScan Messaging Security Virtual Appliance

About InterScan Messaging Security Virtual


Appliance
InterScan Messaging Security Virtual Appliance (IMSVA) integrates multi-tiered spam
prevention and anti-phishing with award-winning antivirus and anti-spyware. Content
filtering enforces compliance and prevents data leakage. This easy-to-deploy appliance is
delivered on a highly scalable platform with centralized management, providing easy
administration. Optimized for high performance and continuous security, the appliance
provides comprehensive gateway email security.

IMSVA Main Features and Benefits


The following table outlines the main features and benefits that IMSVA can provide to
your network.
TABLE 1-1. Main Features and Benefits

FEATURE DESCRIPTIONS BENEFITS

Data and system protection

Cloud-based Cloud Pre-Filter integrates with Cloud Pre-Filter can stop


pre-filtering of IMSVA to scan all email traffic significant amounts of spam and
messages before it reaches your network. malicious messages (up to 90%
of your total message traffic)
from ever reaching your network.

Email Trend Micro Email Encryption Trend Micro Email Encryption


encryption integrates with IMSVA to encrypt or provides IMSVA the ability to
decrypt all email traffic entering and encrypt all email messages
leaving your network. leaving your network. By
encrypting all email messages
leaving a network administrators
can prevent sensitive data from
being leaked.

1-3
Trend Micro InterScan™ Messaging Security Virtual Appliance 9.0 Administrator’s Guide

FEATURE DESCRIPTIONS BENEFITS

Advanced anti- The Advanced Threat Scan Engine ATSE identifies both known and
malware (ATSE) uses a combination of unknown advanced threats,
protection pattern-based scanning and protecting your system from new
aggressive heuristic scanning to threats that have yet to be added
detect document exploits and other to patterns.
threats used in targeted attacks.

Command & C&C Contact Alert Services allows C&C Contact Alert Services
Control (C&C) IMSVA to inspect the sender, provides IMSVA with enhanced
Contact Alert recipients and reply-to addresses in detection and alert capabilities to
Services a message's header, as well as mitigate the damage caused by
URLs in the message body, to see advanced persistent threats and
if any of them matches known C&C targeted attacks.
objects.

Graymail Graymail refers to solicited bulk IMSVA manages graymail


email messages that are not spam. separately from common spam
IMSVA detects marketing to allow administrators to identify
messages and newsletters and graymail messages. IP
social network notifications as addresses specified in the
graymail. graymail exception list bypass
scanning.

Regulatory Administrators can meet Compliance templates provide


compliance government regulatory administrators with regulatory
requirements using the new default compliance. For a detailed list of
policy scanning conditions available templates, see http://
Compliance templates. docs.trendmicro.com/en-us/
enterprise/data-protection-
reference-documents.aspx.

1-4
Introducing InterScan Messaging Security Virtual Appliance

FEATURE DESCRIPTIONS BENEFITS

Smart Scan Smart Scan facilitates a more Smart Scan leverages the Smart
efficient scanning process by off- Protection Network to:
loading a large number of threat
signatures previously stored on the • Enable fast, real-time
IMSVA server to the cloud. security status lookup
capabilities in the cloud
• Reduce the time necessary
to deliver protection against
emerging threats
• Lower memory consumption
on the server

IntelliTrap Virus writers often attempt to IntelliTrap helps reduce the risk
circumvent virus filtering by using that a virus compressed using
different file compression schemes. different file compression
IntelliTrap provides heuristic schemes will enter your network
evaluation of these compressed through email.
files.
Because there is the possibility that
IntelliTrap may identify a non-threat
file as a security risk, Trend Micro
recommends quarantining message
attachments that fall into this
category when IntelliTrap is
enabled. In addition, if your users
regularly exchange compressed
files, you may want to disable this
feature.
By default, IntelliTrap is turned on
as one of the scanning conditions
for an antivirus policy, and is
configured to quarantine message
attachments that may be classified
as security risks.

1-5
Trend Micro InterScan™ Messaging Security Virtual Appliance 9.0 Administrator’s Guide

FEATURE DESCRIPTIONS BENEFITS

Content IMSVA analyzes email messages Content that you deem


management and their attachments, traveling to inappropriate, such as personal
and from your network, for communication, large
appropriate content. attachments, and so on, can be
blocked or deferred effectively
using IMSVA.

Real-time Administrators can monitor the IMSVA provides administrators


Statistics and scan performance and IP filtering with an overview of the system
Monitor performance of all IMSVA devices that keeps administrators
(within a group) on the informed on the first sign of mail
management console. processing issues. Detailed
logging helps administrators
proactively manage issues
before they become a problem.

Protection against other email threats

DoS attacks By flooding a mail server with large IMSVA allows you to configure
attachments, or sending messages the characteristics of messages
that contain multiple viruses or that you want to stop at the
recursively compressed files, SMTP gateway, thus reducing
individuals with malicious intent can the chances of a DoS attack.
disrupt mail processing.

Malicious Many types of file attachments, IMSVA allows you to configure


email content such as executable programs and the types of messages that are
documents with embedded macros, allowed to pass through the
can harbor viruses. Messages with SMTP gateway.
HTML script files, HTML links, Java
applets, or ActiveX controls can
also perform harmful actions.

1-6
Introducing InterScan Messaging Security Virtual Appliance

FEATURE DESCRIPTIONS BENEFITS

Degradation of Non-business-related email traffic Most companies have


services has become a problem in many acceptable usage policies for
organizations. Spam messages their messaging system—IMSVA
consume network bandwidth and provides tools to enforce and
affect employee productivity. Some ensure compliance with existing
employees use company policies.
messaging systems to send
personal messages, transfer large
multimedia files, or conduct
personal business during working
hours.

Legal liability Improper use of email can also put IMSVA provides tools for
and business a company at risk of legal liability. monitoring and blocking content
integrity Employees may engage in sexual to help reduce the risk that
or racial harassment, or other illegal messages containing
activity. Dishonest employees can inappropriate or confidential
use a company messaging system material will be allowed through
to leak confidential information. your gateway.
Inappropriate messages that
originate from a company’s mail
server damage the company’s
reputation, even if the opinions
expressed in the message are not
those of the company.

1-7
Trend Micro InterScan™ Messaging Security Virtual Appliance 9.0 Administrator’s Guide

FEATURE DESCRIPTIONS BENEFITS

Mass mailing Email-borne viruses that may By auto-deleting messages that


virus automatically spread bogus contain mass-mailing viruses,
containment messages through a company’s you avoid using server resources
messaging system can be to scan, quarantine, or process
expensive to clean up and cause messages and files that have no
panic among users. redeeming value.
When IMSVA detects a mass- The identities of known mass-
mailing virus, the action performed mailing viruses are in the Mass
against this virus can be different Mailing Pattern that is updated
from the actions against other types using the TrendLabs℠
of viruses. ActiveUpdate Servers. You can
save resources, avoid help desk
For example, if IMSVA detects a calls from concerned employees
macro virus in a Microsoft Office and eliminate post-outbreak
document with important cleanup work by choosing to
information, you can configure the automatically delete these types
program to quarantine the message of viruses and their email
instead of deleting the entire containers.
message, to ensure that important
information will not be lost.
However, if IMSVA detects a mass-
mailing virus, the program can
automatically delete the entire
message.

Protection from spyware and other types of grayware

Spyware and Other than viruses, your clients are IMSVA’s ability to protect your
other types of at risk from potential threats such environment against spyware
grayware as spyware, adware and dialers. and other types of grayware
For more information, see About enables you to significantly
Spyware/Grayware on page 1-14. reduce security, confidentiality,
and legal risks to your
organization.

Integrated anti-spam features

1-8
Introducing InterScan Messaging Security Virtual Appliance

FEATURE DESCRIPTIONS BENEFITS

Spam Spam Prevention Solution (SPS) is The detection technology used


Prevention a licensed product from Trend by Spam Prevention Solution
Solution (SPS) Micro that provides spam detection (SPS) is based on sophisticated
services to other Trend Micro content processing and statistical
products. To use SPS, obtain an analysis. Unlike other
SPS Activation Code. For more approaches to identifying spam,
information, contact your sales content analysis provides high-
representative. performance, real-time detection
that is highly adaptable, even as
SPS works by using a built-in spam spam senders change their
filter that automatically becomes techniques.
active when you register and
activate the SPS license.

Spam Filtering IP Profiler is a self-learning, fully With the integration of IP


with IP Profiler configurable feature that proactively Filtering, which includes IP
and Email blocks IP addresses of computers Profiler and Email reputation,
reputation that send spam and other types of IMSVA can block spammers at
potential threats. Email reputation the IP level.
blocks IP addresses of known
spam senders that Trend Micro
maintains in a central database.

Note
Activate SPS before you
configure IP Profiler and
Email reputation.

1-9
Trend Micro InterScan™ Messaging Security Virtual Appliance 9.0 Administrator’s Guide

FEATURE DESCRIPTIONS BENEFITS

Social Social Engineering Attack When Social Engineering Attack


Engineering Protection detects suspicious Protection is enabled, the Trend
Attack behavior related to social Micro Antispam Engine scans for
Protection engineering attacks in email suspicious behavior in several
messages. parts of each email transmission,
including the email header,
subject line, body, attachments,
and the SMTP protocol
information. If the Antispam
Engine detects behavior
associated with social
engineering attacks, the
Antispam Engine returns details
about the message to IMSVA for
further action, policy
enforcement, or reporting.

Administration and integration

LDAP and You can configure LDAP settings if Using LDAP, you can define
domain-based you are using LDAP directory multiple rules to enforce your
policies services such as Lotus Domino™ company’s email usage
or Microsoft™ Active Directory™ guidelines. You can define rules
for user-group definition and for individuals or groups, based
administrator privileges. on the sender and recipient
addresses.

Web-based The management console allows The management console is


management you to conveniently configure SSL-compatible. Being SSL-
console IMSVA policies and settings. compatible means access to
IMSVA is more secure.

1-10
Introducing InterScan Messaging Security Virtual Appliance

FEATURE DESCRIPTIONS BENEFITS

End-User IMSVA provides web-based EUQ to With the web-based EUQ


Quarantine improve spam management. The management console, end-users
(EUQ) web-based EUQ service allows can manage messages that
end-users to manage the spam IMSVA quarantines.
quarantine of their personal
accounts and of distribution lists IMSVA also enables users to
that they belong to. IMSVA apply actions to quarantined
quarantines messages that it messages and to add senders to
determines are spam. The EUQ the Approved Senders list
indexes these messages into a through links in the EUQ digest.
database. The messages are then
available for end-users to review,
delete, or approve for delivery.

Delegated IMSVA offers the ability to create By delegating administrative


administration different access rights to the roles to different employees, you
management console. You can can promote the sharing of
choose which sections of the administrative duties.
console are accessible for different
administrator logon accounts.

Centralized Centralized reporting gives you the Helps you analyze how IMSVA is
reporting flexibility of generating one time (on performing.
demand) reports or scheduled
reports. One time (on demand) reports
allow you to specify the type of
report content as and when
required. Alternatively, you can
configure IMSVA to automatically
generate reports daily, weekly,
and monthly.

System A built-in agent monitors the health Email and SNMP notification on
availability of your IMSVA server and delivers detection of system failure allows
monitor notifications through email or you to take immediate corrective
SNMP trap when a fault condition actions and minimize downtime.
threatens to disrupt the mail flow.

1-11
Trend Micro InterScan™ Messaging Security Virtual Appliance 9.0 Administrator’s Guide

FEATURE DESCRIPTIONS BENEFITS

POP3 You can choose to enable or In addition to SMTP traffic,


scanning disable POP3 scanning from the IMSVA can also scan POP3
management console. messages at the gateway as
messaging clients in your
network retrieve them.

Clustered The current version of IMSVA has You can install the various
architecture been designed to make distributed IMSVA components on different
deployment possible. computers, and some
components can exist in
multiples. For example, if your
messaging volume demands,
you can install additional IMSVA
scanner components on
additional servers, all using the
same policy services.

Integration IMSVA integrates with Virtual IMSVA sends suspicious


with Virtual Analyzer, which is an isolated messages, including
Analyzer virtual environment used to manage attachments, to Virtual Analyzer
and analyze samples in Deep for further analysis. Virtual
Discovery Advisor and Deep Analyzer performs content
Discovery Analyzer. simulation and analysis in an
isolated virtual environment to
identify characteristics commonly
associated with many types of
malware. In particular, Virtual
Analyzer checks if files attached
to messages contain exploit
code.

1-12
Introducing InterScan Messaging Security Virtual Appliance

FEATURE DESCRIPTIONS BENEFITS

Integration Trend Micro Control Manager™ Outbreak Prevention Services


with Trend (TMCM) is a software management delivered through Trend Micro
Micro Control solution that gives you the ability to Control Manager™ reduces the
Manager™ control antivirus and content risk of outbreaks. When a Trend
security programs from a central Micro product detects a new
location regardless of the program’s email-borne virus, TrendLabs
physical location or platform. This issues a policy that uses the
application can simplify the advanced content filters in
administration of a corporate virus IMSVA to block messages by
and content security policy. identifying suspicious
characteristics in these
messages. These rules help
minimize the window of
opportunity for an infection
before the updated pattern file is
available.

About Cloud Pre-Filter


Cloud Pre-Filter is a cloud security solution that integrates with IMSVA to provide
proactive protection in the cloud with the privacy and control of an on-premise, virtual
appliance.
Cloud Pre-Filter reduces inbound email volume up to 90% by blocking spam and
malware outside your network. Cloud Pre-Filter is integrated with IMSVA at the
gateway allowing flexible control over sensitive information. And local quarantines
ensure your email stays private. No email is stored in the cloud. With Cloud Pre-Filter,
you can reduce complexity and overhead to realize significant cost savings.

About Email Encryption


Trend Micro Email Encryption provides IMSVA with the ability to perform encryption
and decryption of email. With Email Encryption, IMSVA has the ability to encrypt and
decrypt email regardless of the email client or platform from which it originated. The
encryption and decryption of email on Trend Micro Email Encryption is controlled by a

1-13
Trend Micro InterScan™ Messaging Security Virtual Appliance 9.0 Administrator’s Guide

Policy Manager that enables an administrator to configure policies based on various


parameters, such as sender and recipient email addresses, keywords or where the email
(or attachments) contain credit card numbers. Trend Micro Email Encryption presents
itself as a simple mail transfer protocol (SMTP) interface and delivers email out over
SMTP to a configured outbound mail transport agent (MTA). This enables easy
integration with other email server-based products, be them content scanners, mail
servers or archiving solutions.

About Spyware/Grayware
Your clients are at risk from potential threats other than viruses/malware. Grayware can
negatively affect the performance of the computers on your network and introduce
significant security, confidentiality, and legal risks to your organization.

TABLE 1-2. Types of Grayware

TYPE DESCRIPTION

Spyware Gathers data, such as account user names and passwords, and
transmits them to third parties

Adware Displays advertisements and gathers data, such as user web


surfing preferences, to target advertisements at the user
through a web browser

Dialers Changes computer Internet settings and can force a computer


to dial pre-configured phone numbers through a modem

Joke Programs Causes abnormal computer behavior, such as closing and


opening the CD-ROM tray and displaying numerous message
boxes

Hacking Tools Helps hackers enter computers

Remote Access Tools Helps hackers remotely access and control computers

Password Cracking Helps hackers decipher account user names and passwords
Applications

Other Other types not covered above

1-14
Introducing InterScan Messaging Security Virtual Appliance

How Spyware/Grayware Gets into Your Network


Spyware/grayware often gets into a corporate network when users download legitimate
software that has grayware applications included in the installation package.
Most software programs include an End User License Agreement (EULA), which the
user has to accept before downloading. Often the EULA does include information
about the application and its intended use to collect personal data; however, users often
overlook this information or do not understand the legal jargon.

Potential Risks and Threats


The existence of spyware/grayware on your network has the potential to introduce the
following:
TABLE 1-3. Types of Risks

TYPE DESCRIPTION

Reduced computer To perform their tasks, spyware/grayware applications often


performance require significant CPU and system memory resources.

Increased web Certain types of grayware, such as adware, are often designed
browser-related to create pop-up windows or display information in a browser
crashes frame or window. Depending on how the code in these
applications interacts with system processes, grayware can
sometimes cause browsers to crash or freeze and may even
require a system reboot.

Reduced user By needing to close frequently occurring pop-up advertisements


efficiency and deal with the negative effects of joke programs, users can
be unnecessarily distracted from their main tasks.

Degradation of Spyware/grayware applications often regularly transmit the data


network bandwidth they collect to other applications running on your network or to
locations outside of your network.

Loss of personal and Not all data that spyware/grayware applications collect is as
corporate information innocuous as a list of websites users visit. Spyware/grayware
can also collect the user names and passwords users type to
access their personal accounts, such as a bank account, and
corporate accounts that access resources on your network.

1-15
Trend Micro InterScan™ Messaging Security Virtual Appliance 9.0 Administrator’s Guide

TYPE DESCRIPTION

Higher risk of legal If hackers gain access to the computer resources on your
liability network, they may be able to utilize your client computers to
launch attacks or install spyware/grayware on computers
outside your network. Having your network resources unwillingly
participate in these types of activities could leave your
organization legally liable to damages incurred by other parties.

About Web Reputation Services


Trend Micro web reputation technology helps break the infection chain by assigning
websites a “reputation” based on an assessment of the trustworthiness of an URL,
derived from an analysis of the domain. Web reputation protects against web-based
threats including zero-day attacks, before they reach the network. Trend Micro web
reputation technology tracks the lifecycle of hundreds of millions of web domains,
extending proven Trend Micro anti-spam protection to the Internet.

About Email Reputation


Trend Micro designed Email reputation to identify and block spam before it enters a
computer network by routing Internet Protocol (IP) addresses of incoming mail
connections to Trend Micro Smart Protection Network for verification against an
extensive Reputation Database.

Types of Email Reputation


There are two types of Email reputation: Standard on page 1-16 and Advanced on page
1-17.

Email Reputation: Standard


This service helps block spam by validating requested IP addresses against the Trend
Micro reputation database, powered by the Trend Micro Smart Protection Network.

1-16
Introducing InterScan Messaging Security Virtual Appliance

This ever-expanding database currently contains over 1 billion IP addresses with


reputation ratings based on spamming activity. Trend Micro spam investigators
continuously review and update these ratings to ensure accuracy.
Email reputation: Standard is a DNS single-query-based service. Your designated email
server makes a DNS query to the standard reputation database server whenever an
incoming email message is received from an unknown host. If the host is listed in the
standard reputation database, Email reputation reports that email message as spam.

Tip
Trend Micro recommends that you configure IMSVA to block, not receive, any email
messages from an IP address that is included on the standard reputation database.

Email Reputation: Advanced


Email reputation: Advanced identifies and stops sources of spam while they are in the
process of sending millions of messages.
This is a dynamic, real-time antispam solution. To provide this service, Trend Micro
continuously monitors network and traffic patterns and immediately updates the
dynamic reputation database as new spam sources emerge, often within minutes of the
first sign of spam. As evidence of spam activity ceases, the dynamic reputation database
is updated accordingly.
Like Email reputation: Standard, Email reputation: Advanced is a DNS query-based
service, but two queries can be made to two different databases: the standard reputation
database and the dynamic reputation database (a database updated dynamically in real
time). These two databases have distinct entries (no overlapping IP addresses), allowing
Trend Micro to maintain a very efficient and effective database that can quickly respond
to highly dynamic sources of spam. Email reputation: Advanced has blocked more than
80% of total incoming connections (all were malicious) in customer networks. Results
will vary depending on how much of your incoming email stream is spam. The more
spam you receive, the higher the percentage of blocked connections you will see.

1-17
Trend Micro InterScan™ Messaging Security Virtual Appliance 9.0 Administrator’s Guide

About Trend Micro Control Manager


Trend Micro™ Control Manager™ is a software management solution that gives you
the ability to control antivirus and content security programs from a central location-
regardless of the program’s physical location or platform. This application can simplify
the administration of a corporate virus/malware and content security policy.
• Control Manager server: The Control Manager server is the machine upon which
the Control Manager application is installed. The web-based Control Manager
management console is hosted from this server.
• Agent: The agent is an application installed on a managed product that allows
Control Manager to manage the product. The agent receives commands from the
Control Manager server, and then applies them to the managed product. The agent
collects logs from the product, and sends them to Control Manager.
• Entity: An entity is a representation of a managed product on the Product
Directory link. Each entity has an icon in the directory tree. The directory tree
displays all managed entities residing on the Control Manager console.

Control Manager Support


The following table shows a list of Control Manager features that IMSVA supports.
TABLE 1-4. Supported Control Manager Features

FEATURE DESCRIPTION SUPPORTED?

Two-way Using 2-way communication, No.


communication either IMSVA or Control
Manager may initiate the Only IMSVA can initiate a
communication process. communication process with
Control Manager.

1-18
Introducing InterScan Messaging Security Virtual Appliance

FEATURE DESCRIPTION SUPPORTED?

Outbreak Prevention The Outbreak Prevention Yes


Policy Policy (OPP) is a quick
response to an outbreak
developed by TrendLabs that
contains a list of actions
IMSVA should perform to
reduce the likelihood of the
IMSVA server or its clients
from becoming infected.
Trend Micro ActiveUpdate
Server deploys this policy to
IMSVA through Control
Manager.

Log upload for query Uploads IMSVA virus logs, Yes


Content Security logs, and
Email reputation logs to
Control Manager for query
purposes.

Single Sign-on Manage IMSVA from Control No.


Manager directly without first
logging on to the IMSVA You need to first log on to the
management console. IMSVA management console
before you can manage
IMSVA from Control Manager.

Configuration Replicate configuration Yes


replication settings from an existing
IMSVA server to a new
IMSVA server from Control
Manager.

Pattern update Update pattern files used by Yes


IMSVA from Control Manager

Engine update Update engines used by Yes


IMSVA from Control Manager.

1-19
Trend Micro InterScan™ Messaging Security Virtual Appliance 9.0 Administrator’s Guide

FEATURE DESCRIPTION SUPPORTED?

Product component Update IMSVA product No.


update components such as patches
and hot fixes from Control Refer to the specific patch or
Manager. hot fix readme file for
instructions on how to update
the product components.

Configuration by user Configure IMSVA through the Yes


interface redirect IMSVA management console
accessible from Control
Manager.

Renew product Renew IMSVA product Yes


registration license from Control Manager.

Customized reporting Control Manager provides Yes


from Control Manager customized reporting and log
queries for email-related data.

Control Manager agent Install or uninstall IMSVA No.


installation/ Control Manager agent from
uninstallation Control Manager. IMSVA Control Manager
agent is automatically
installed when you install
IMSVA. To enable/disable the
agent, do the following from
the IMSVA management
console:
1. Go to Administration >
Connections.
2. Click the TMCM Server
tab.
3. To enable/disable the
agent, select/clear the
check box next to Enable
MCP Agent.

Event notification Send IMSVA event Yes


notification from Control
Manager.

1-20
Introducing InterScan Messaging Security Virtual Appliance

FEATURE DESCRIPTION SUPPORTED?

Command tracking for Track the status of commands Yes


all commands that Control Manager issues
to IMSVA.

About Trend Micro Smart Protection


Trend Micro provides next-generation content security through smart protection
services. By processing threat information in the cloud, Trend Micro smart protection
reduces demand on system resources and eliminates time-consuming signature
downloads.

Smart protection services include:

File Reputation Services


File reputation decouples the pattern file from the local scan engine and
conducts pattern file lookups to the Trend Micro Smart Protection Network.
High performance content delivery networks ensure minimum latency during
the checking process and enable more immediate protection.

Trend Micro continually enhances file reputation to improve malware


detection. Smart Feedback allows Trend Micro to use community feedback of
files from millions of users to identify pertinent information that helps
determine the likelihood that a file is malicious.

Web Reputation Services


With one of the largest reputation databases in the world, Trend Micro web
reputation tracks the credibility of domains based on factors such as age,
historical location changes, and suspicious activity indicators discovered
through malware behavior analysis. Trend Micro assigns reputation scores to
specific pages instead of classifying entire sites to increase accuracy and reduce
false positives.

Web reputation technology prevents users from:

• Accessing compromised or infected sites

1-21
Trend Micro InterScan™ Messaging Security Virtual Appliance 9.0 Administrator’s Guide

• Communicating with Command & Control (C&C) servers used in


cybercrime

The Need for a New Solution


The conventional threat handling approach uses malware patterns or definitions that are
delivered to a client on a scheduled basis and stored locally. To ensure continued
protection, new updates need to be received and reloaded into the malware prevention
software regularly.
While this method works, the continued increase in threat volume can impact server and
workstation performance, network bandwidth usage, and the overall time it takes to
delivery quality protection. To address the exponential growth rate of threats, Trend
Micro pioneered a smart approach that off-loads the storage of malware signatures to
the cloud. The technology and architecture used in this effort allows Trend Micro to
provide better protection to customers against the volume of emerging malware threats.

Trend Micro™ Smart Protection Network™


Trend Micro delivers File Reputation Services and Web Reputation Services to IMSVA
through the Trend Micro™ Smart Protection Network™.
The Trend Micro Smart Protection Network is a next-generation cloud-client content
security infrastructure designed to protect customers from security risks and web
threats. It powers both on-premise and Trend Micro hosted solutions to protect users
whether they are on the network, at home, or on the go. The Smart Protection Network
uses lighter-weight clients to access its unique in-the-cloud correlation of email, web,
and file reputation technologies, as well as threat databases. Customers' protection is
automatically updated and strengthened as more products, services and users access the
network, creating a real-time neighborhood watch protection service for its users.
The Smart Protection Network provides File Reputation Services by hosting the
majority of the malware pattern definitions. A client sends scan queries to the Smart
Protection Network if its own pattern definitions cannot determine the risk of a file.
The Smart Protection Network provides Web Reputation Services by hosting web
reputation data previously available only through Trend Micro hosted servers. A client
sends web reputation queries to the Smart Protection Network to check the reputation

1-22
Introducing InterScan Messaging Security Virtual Appliance

of websites that a user is attempting to access. The client correlates a website's


reputation with the specific web reputation policy enforced on the computer to
determine whether access to the site is allowed or blocked.

For more information on the Smart Protection Network, visit:

www.smartprotectionnetwork.com

About Graymail Scanning


Graymail refers to solicited bulk email messages that are not spam. IMSVA detects
marketing messages and newsletters and social network notifications as graymail.
IMSVA identifies graymail messages in two ways:

• Email Reputation Services scoring the source IP address

• Trend Micro Anti-Spam Engine identifying message content

Note
Note that while IMSVA detects these kinds of email messages, these messages are not
tagged as spam.

Administrators define the rule criteria to take an action on those email messages. Every
graymail message rule has an exception list containing address objects that bypass
message filtering. An address object is a single IP address or address range (IPv4 or
IPv6), or the Classless Inter-Domain Routing (CIDR) block.

Administrators have several options to understand graymail message traffic in the


network. Reports illustrate the highest senders and recipients of graymail messages from
external or internal sources. Administrators can also query detailed log information or
view the email quarantine and release messages identified as permitted graymail
messages when necessary.

The graymail exception list can be exported and imported.

1-23
Another random document with
no related content on Scribd:
The Project Gutenberg eBook of Colour vision
This ebook is for the use of anyone anywhere in the United
States and most other parts of the world at no cost and with
almost no restrictions whatsoever. You may copy it, give it away
or re-use it under the terms of the Project Gutenberg License
included with this ebook or online at www.gutenberg.org. If you
are not located in the United States, you will have to check the
laws of the country where you are located before using this
eBook.

Title: Colour vision


Being the Tyndall Lectures delivered in 1894 at the
Royal Institution

Author: Sir William de Wiveleslie Abney

Release date: April 17, 2024 [eBook #73410]

Language: English

Original publication: New York: William Wood and Company,


1894

Credits: Chris Curnow and the Online Distributed Proofreading


Team at https://www.pgdp.net (This file was produced
from images generously made available by The
Internet Archive)

*** START OF THE PROJECT GUTENBERG EBOOK COLOUR


VISION ***
Transcriber’s Note
Larger versions of most illustrations may be seen by right-
clicking them and selecting an option to view them separately,
or by double-tapping and/or stretching them.
New original cover art included with this eBook is granted
to the public domain. It includes part of the title page and an
illustration taken from the original book.
Additional notes will be found near the end of this ebook.
COLOUR VISION
TYPES OF COLOUR VISION.

W. DE W. A., DEL. W. GRIGGS, LITH.


COLOUR VISION
BEING

THE TYNDALL LECTURES


DELIVERED IN 1894

AT
THE ROYAL INSTITUTION

BY

CAPT. W. de W. ABNEY, C.B., D.C.L., F.R.S.,


LATE ROYAL ENGINEERS

WITH COLOURED PLATE AND NUMEROUS DIAGRAMS

NEW YORK
WILLIAM WOOD AND COMPANY
CONTENTS.
PAGE
Preface vii

CHAPTER I.
The Eye 1

CHAPTER II.
Simple Colours and their Mixture 15

CHAPTER III.
Three Colour Sensations Possible 32

CHAPTER IV.
The Young and Hering Theories of Colour Vision 41

CHAPTER V.
General Aspect of Colour Blindness 58

CHAPTER VI.
Colour Blindness exhibited by Colour Discs and exhibited
by Luminosity Curves of the Spectrum 74
CHAPTER VII.
Luminosity of Colours to Different Parts of the Retina 88

CHAPTER VIII.
Luminosity of a Feeble Spectrum and the Limit of the
Perception of Colour 98

CHAPTER IX.
The Extinction of Light from the Spectrum 108

CHAPTER X.
The Extinction of the Perception of Light by the Colour
Blind 122

CHAPTER XI.
Tobacco Blindness 137

CHAPTER XII.
Examples of Colour Blindness due to Disease 148

CHAPTER XIII.
The Holmgren Test for Colour Blindness 167

CHAPTER XIV.
The Spectrum Test for Colour Blindness 180

CHAPTER XV.
The Young and Hering Theories of Colour Vision
Compared 187

Appendix 201

Index 229
PREFACE.
THE writer had for some years past, in conjunction with General
Festing, and recently as Secretary and Member of the Colour Vision
Committee of the Royal Society, carried out a series of investigations
on colour vision, and selected that subject when he was invited, in
1894, to deliver the Tyndall Lectures at the Royal Institution.
The brief time allotted for these lectures—an hour on three
successive Saturday afternoons—restricted the discussion of some
aspects of the question, and confined its treatment in the main to
those features most readily explicable by the physicist, and to
bringing into notice the latest results which had been obtained from
physical experiments. How far the writer has succeeded in the task
which he then outlined it is for the reader to determine.
There was no intention in the first instance to publish these
lectures. After their delivery, many persons expressed a desire that
the information they contained should be rendered accessible to
such as were interested in the theory of colour vision, and in
deference to that desire the lecture-notes have been re-cast in book
form. For the reader’s convenience the matter is now divided into
chapters instead of into lectures, and a few additions have been
made in the text to explain some of the experimental work to those
who have not facilities for its repetition.
The writer has to acknowledge several debts of gratitude. First,
to Mr. E. Nettleship, for his kindness in looking over the proofs, and
making valuable suggestions whilst the work was passing through
the press; and also, as will be seen throughout its pages, for many of
the interesting cases of defective colour perception which have been
examined by the somewhat novel methods described. Next, the
writer’s gratitude is due to Professor M. Foster for the permission he
has given to use his admirable description of the Hering theory; and,
lastly, to the Royal Society for the permission it accorded to use
various diagrams which have served as illustrations to papers which
have appeared in its “Philosophical Transactions” and “Proceedings.”
COLOUR VISION.
CHAPTER I.
I MUST commence this course by saying that I feel the honour that
has been done me in asking me to undertake it, connected as it is
with the name of Tyndall, whose recent removal from our midst has
been deplored by all lovers of science, and by none more than by
those who have had the privilege of listening to him at this Institution.
It is my duty to speak on some subject of physics, and the subject I
have chosen is Colour Vision. I hope it will not be considered
inappropriate, since it was Thomas Young, the physicist, whose
connection with this Institution is well known, who first propounded a
really philosophical theory of the subject. Interesting as it may be to
trace how old theories have failed and new ones have started, I feel
that for those who, like myself, have but little time at command in
which to address you, the historical side of this question must of
necessity be treated incompletely.
Colour vision is a subject which enters into the domains both of
physics and physiology, and it is thus difficult for any one individual
to treat of it exhaustively unless he be a Helmholtz, who was as
distinguished in the one branch of science as he was in the other. I
am not a physiologist, and at the most, can only pretend to an
elementary knowledge of the physiology of the eye, but I trust it is
sufficient to prevent myself from falling into any grievous error. I shall
try and show you, however, that the subject is capable of being
made subordinate to physical methods of examination. I must
necessarily commence by a very brief description of those parts of
the eye in which it is supposed the seat of vision lies, but in terms
which are not too technical. As to the mere optical properties of the
eye I shall say but little, for they are not necessary for my purpose,
although more particularly adapted to mathematical treatment than
the other properties I have to describe.
The eye may be diagrammatically represented as in the figure
which is supposed to be a horizontal section of it, the figure being
reproduced from Professor Michael Foster’s Physiology.

Fig. 1.

Scl is the sclerotic coat. Ch the choroid


coat, with CP the ciliary process. I is
the body of the Iris. R is the retina or
inner wall. PE the pigment epithelium
or outer wall. L the lens held by the
suspensory ligament sp.l. VH is the
vitreous humour. ON the optic nerve,
ox is the optic axis, in this case made
to pass through the fovea centralis,
f.c.

As far as the perception of colour is concerned, the principal part


of the eye which is not distinctly optical—i.e. for the production of
images—is the retina, and this it will be seen is in reality an outcrop
of the brain, the connection between the two being the optic nerve.
Owing to this connection, it is not easy to determine where the seat
of colour perception is located; but for the purpose of physical
investigation this is not of first-rate importance, nor does it affect the
discussion of rival theories except in a minor degree. There are other
subsidiary adjuncts in the eye to which, however, I must call
attention, as they have a distinct bearing on the apparent intensity of
some colours and of the hue that mixtures of others are perceived.
The first is what is called the “macula lutea,” or yellow spot, a spot
which it may be assumed exists in every eye. It is horizontally oval in
form, and is situated in the very centre of the retina, embracing some
6° to 8° in angular measure. It has a brownish or yellowish tint, and
the retina at this part is slightly depressed, being bounded by a
slightly raised rim. In the centre of this area the retina becomes very
thin, having a depression about 1/100 of an inch or ·3 millimetres in
diameter, which is named the “fovea centralis,” where it is said that
vision is the most acute. This statement can be well credited when
we come to consider where the seat of the stimulation of sensation
lies. The colour which tints the yellow spot is strongest at the crater-
like rim, and fades away centrally and peripherally, and is said to be
wholly absent in the fovea centralis.
As the colour of this spot is yellow or brown in the living eye (and
that it is probably brown the absorption indicates), it follows that
white light passing through it must be deprived of some of its
components, though in differing degrees. If the seat of sensation is
at the outer layer of the retina, as we shall shortly see must be the
case, it will further be seen that when light of any colour which the
brown pigment will absorb more or less completely falls on different
parts of the oval area, the absorption must vary at each part, and the
intensity of the perceived light will be least at the rim and increase
centrally and peripherally. As the centre of the yellow spot or fovea is
coincident approximately with the point where the axis of the eye
cuts the retina, the image of an evenly illuminated object, when
looked at directly, must fall on the yellow spot. If, therefore, a patch
of such light, the image of which more than covers the spot, be
observed, it ought to exhibit a varying brightness of colour
corresponding to the strength of the colouring matter which exists at
the different parts. This it but rarely does, for habit and constant
interpretation of what should be seen prevents the mind from
distinguishing these variations; but if the colour brightness, as
perceived by the different parts, be submitted to measurement by
proper means, the variations in brightness of the image can be
readily recognised. A very common method of exhibiting the
presence of the pigment is to look at a bright white cloud through a
layer of chrome alum. Chrome alum transmits red and blue-green
rays. Now as the spectrum-blue rays are those which the pigment
will absorb, it follows that the colour of the solution should appear
ruddy to the central part of the eye, but on the rest of the retina it
should appear of its ordinary purplish colour. At a first glance, and
before the eye has become fatigued, this is the case, but the
phenomenon soon disappears. Another way of forming an idea as to
what the yellow spot absorbs is to throw a feeble spectrum on a
white surface and cause the eye to travel along it. If the spectrum be
viewed so that it does not occupy more than about 40° of the retina,
the movement of the eye will show a dark band travelling along the
green, blue, and violet regions as the image of these parts of the
spectrum fall on the yellow spot, and their apparent brightness will
increase as they fall outside the absorbing area. This proves that an
absorption takes place in this area.

Fig. 2.

The retina consists essentially of an inner and outer wall,


enclosing matter which is similar to the grey matter of the brain. On
the inner wall are the vessels which are connected with the optic
nerve. The outer wall is epithelium coloured with a pigment, and it is
here that the visual impulses begin, although the rays of light giving
rise to them have to pass through the thickness of the retina before
so doing. It has already been stated that the light has to pass
through the thickness of the yellow spot before a visual sensation is
felt in the centre of the field, and the experiments just given offer a
fair proof of the truth of the assertion, but there is still another which
is perhaps more conclusive. Suppose we have a hollow reflecting
ball, as shown in Fig. 2, and through an orifice A we project a beam
of light to B, which meets an obstruction, S, in its path, then A B
would be reflected from B to C on a screen C F, and the obstruction
S would be marked at C. If another beam from D was directed so as
to meet the same obstruction, its presence would be marked at F.
Knowing the distance of the centre O of the hollow sphere from F C
and its diameter, and measuring the distance between F and C and
their respective distances from the axis of the sphere, the distances
S B and S E can be calculated. This method is applied in the
formation of what are known as Purkinje’s figures. The simplest case
is where a beam of light is directed through the sclerotic and
transmitted through the lens. Images of the retinal vessels are
distinguished as at S, and it is found that they cast shadows, which
are seen as dark lines in the glare of the field of vision. The
sensation of light must therefore come from behind these vessels,
and calculation shows that the seat of the sensation is close to the
pigmented inner wall of the retina.
Lying here is a layer of what are known as rods and cones,
which have a connection, either actual or functional, with the optic
fibres which largely compose the inner wall of the retina, and are
connected with the optic nerve. In the yellow spot the cones are
much more numerous than the rods, but in the peripheral part the
reverse is the case. In the fovea the rods appear to be altogether
absent. The total number of cones in the eye has been calculated to
be about 3,000,000, of which about 7,000 are in the small fovea. The
number of cones will give an idea of their dimensions. This detail has
been entered into as it has been supposed that these rods and
cones are all-important in translating light-waves into visual
impulses. The inner wall of the retina of most human eyes, as has
been mentioned, is stained with a black pigment, fuscin, though in
albinos it is absent. What its particular use may be is still unknown,
for its change by light is so slow that it can scarcely be the cause of
vision. In the outer parts of the rods is, however, diffused a
substance highly sensitive to light, called the “visual purple,” from its
colour, and a theory founded on chemical action, produced by a
change in this substance, has been promulgated. Fascinating,
however, as such a theory must be, it lacks confirmation. The fact
that the cones do not contain it, and that in the fovea are cones
alone, renders it difficult to reconcile the theory with the fact that this
part of the retina possesses, we are told, the greatest acuteness of
sensation as regards light and colour.
The eyes of most vertebrate animals, it may be remarked, have
this visual purple, but in those of the bat, owl, hen, and some others
the colouring matter seems to be absent. Visual purple is an
interesting substance, however, and as it is found in the eye it
probably exercises some useful function, though what that function
may be is at present unknown. That images of objects can be
formed on the retina, owing to the bleaching of this substance, has
been proved by experiment. The purple is first changed to a yellow
colour, and then passes into white. These “optograms,” as they are
called, can be fixed in an excised eye if the retina be detached, and
then be treated with a weak solution of alum.

Fig. 3.

Many persons are not aware of the extent of the field of view
which the eye embraces. Vertically it takes in about 100°, whilst

You might also like