Full Ebook of Interscan Messaging Security Virtual Appliance Administrator S Guide Trend Micro Online PDF All Chapter
Full Ebook of Interscan Messaging Security Virtual Appliance Administrator S Guide Trend Micro Online PDF All Chapter
https://ebookmeta.com/product/ccnp-security-virtual-private-
networks-svpn-300-730-official-cert-guide-1st-edition-muniz/
https://ebookmeta.com/product/mca-modern-desktop-administrator-
complete-study-guide-1st-edition-william-panek/
https://ebookmeta.com/product/moodle-3-administration-third-
edition-an-administrator-s-guide-to-confi-guring-securing-
customizing-and-extending-moodle-buchner/
https://ebookmeta.com/product/java-platform-standard-edition-
security-developer-s-guide-oracle/
MongoDB Administrator s Guide Over 100 practical
recipes to efficiently maintain and administer your
MongoDB solution 1st Edition Cyrus Dasadia
https://ebookmeta.com/product/mongodb-administrator-s-guide-
over-100-practical-recipes-to-efficiently-maintain-and-
administer-your-mongodb-solution-1st-edition-cyrus-dasadia/
https://ebookmeta.com/product/micro-light-emitting-diode-
fabrication-and-devices-micro-led-technology/
https://ebookmeta.com/product/mca-microsoft-365-teams-
administrator-study-guide-exam-ms-700-1st-edition-ben-lee/
https://ebookmeta.com/product/microsoft-azure-virtual-desktop-
guide-configuring-and-operating-microsoft-azure-virtual-
desktop-1st-edition-arun-sabale/
https://ebookmeta.com/product/certified-kubernetes-administrator-
cka-study-guide-in-depth-guidance-and-practice-early-release-
benjamin-muschko/
Trend Micro Incorporated reserves the right to make changes to this document and to
the product described herein without notice. Before installing and using the product,
please review the readme files, release notes, and/or the latest version of the applicable
documentation, which are available from the Trend Micro website at:
http://docs.trendmicro.com/en-us/enterprise/interscan-messaging-security.aspx
Trend Micro, the Trend Micro t-ball logo, Control Manager, eManager, InterScan, and
TrendLabs are trademarks or registered trademarks of Trend Micro Incorporated. All
other product or company names may be trademarks or registered trademarks of their
owners.
© 2015. Trend Micro Incorporated. All Rights Reserved.
Document Part No.: MSEM96476/140707
Release Date: October 2015
Protected by U.S. Patent No.: Patents pending
This documentation introduces the main features of the product and/or provides
installation instructions for a production environment. Read through the documentation
before installing or using the product.
Detailed information about how to use specific features within the product may be
available in the Trend Micro Online Help and/or the Trend Micro Knowledge Base at
the Trend Micro website.
Trend Micro always seeks to improve its documentation. If you have questions,
comments, or suggestions about this or any Trend Micro document, please contact us at
[email protected].
Evaluate this documentation on the following site:
http://www.trendmicro.com/download/documentation/rating.asp
Table of Contents
About this Manual
About this Manual ............................................................................................. xi
What's New ....................................................................................................... xii
Audience ........................................................................................................... xiii
InterScan Messaging Security Virtual Appliance Documentation ........... xiii
Document Conventions ................................................................................. xiv
i
Trend Micro InterScan™ Messaging Security Virtual Appliance 9.0 Administrator’s Guide
ii
Table of Contents
iii
Trend Micro InterScan™ Messaging Security Virtual Appliance 9.0 Administrator’s Guide
iv
Table of Contents
v
Trend Micro InterScan™ Messaging Security Virtual Appliance 9.0 Administrator’s Guide
vi
Table of Contents
vii
Trend Micro InterScan™ Messaging Security Virtual Appliance 9.0 Administrator’s Guide
viii
Table of Contents
Appendices
Appendix A: Technical Support
Troubleshooting Resources ......................................................................... A-2
Contacting Trend Micro ............................................................................... A-3
Sending Suspicious Content to Trend Micro ............................................ A-5
Other Resources ............................................................................................ A-6
ix
Trend Micro InterScan™ Messaging Security Virtual Appliance 9.0 Administrator’s Guide
Index
Index .............................................................................................................. IN-1
x
Preface
xi
Trend Micro InterScan™ Messaging Security Virtual Appliance 9.0 Administrator’s Guide
What's New
Virtual Analyzer integration IMSVA enables you to define rules to send email
improvement messages with specified attachment types to
Virtual Analyzer for analysis.
Known host support Known hosts include trusted mail transfer agents
(MTAs) and the Cloud Pre-Filter that are deployed
before IMSVA on your network. IMSVA enables
you to specify known hosts to exempt them from IP
filtering and graymail scanning.
Enhanced message delivery IMSVA supports both mail exchanger record (MX
record) lookup and static routing methods for
message delivery to achieve better load balance
and failover capabilities.
xii
About this Manual
Enhanced Data Loss Prevention IMSVA supports both predefined and customized
(DLP) DLP compliance templates based on various data
identifiers.
DomainKeys Identified Mail (DKIM) IMSVA supports DKIM signing for outgoing email
signing messages.
Audience
The IMSVA documentation is written for IT administrators in medium and large
enterprises. The documentation assumes that the reader has in-depth knowledge of
email messaging networks, including details related to the following:
• SMTP and POP3 protocols
• Message transfer agents (MTAs), such as Postfix or Microsoft™ Exchange
• LDAP
• Database management
• Transport Layer Security
The documentation does not assume that the reader has any knowledge of antivirus or
antispam technology.
xiii
Trend Micro InterScan™ Messaging Security Virtual Appliance 9.0 Administrator’s Guide
Administrator’s Guide
Helps you get IMSVA up and running with post-installation instructions on
how to configure and administer IMSVA.
Installation Guide
Contains introductions to IMSVA features, system requirements, and
provides instructions on how to deploy and upgrade IMSVA in various
network environments.
Online Help
Provides detailed instructions on each field and how to configure all features
through the user interface. To access the online help, open the web
management console, then click the help icon.
Readme File
Contain late-breaking product information that might not be found in the
other documentation. Topics include a description of features, installation
tips, known issues, and product release history.
http://docs.trendmicro.com
Document Conventions
The documentation uses the following conventions:
CONVENTION DESCRIPTION
xiv
About this Manual
CONVENTION DESCRIPTION
Configuration notes
Note
Recommendations or suggestions
Tip
xv
Part I
Getting Started
Chapter 1
Topics include:
1-1
Trend Micro InterScan™ Messaging Security Virtual Appliance 9.0 Administrator’s Guide
• About Command & Control (C&C) Contact Alert Services on page 1-24
1-2
Introducing InterScan Messaging Security Virtual Appliance
1-3
Trend Micro InterScan™ Messaging Security Virtual Appliance 9.0 Administrator’s Guide
Advanced anti- The Advanced Threat Scan Engine ATSE identifies both known and
malware (ATSE) uses a combination of unknown advanced threats,
protection pattern-based scanning and protecting your system from new
aggressive heuristic scanning to threats that have yet to be added
detect document exploits and other to patterns.
threats used in targeted attacks.
Command & C&C Contact Alert Services allows C&C Contact Alert Services
Control (C&C) IMSVA to inspect the sender, provides IMSVA with enhanced
Contact Alert recipients and reply-to addresses in detection and alert capabilities to
Services a message's header, as well as mitigate the damage caused by
URLs in the message body, to see advanced persistent threats and
if any of them matches known C&C targeted attacks.
objects.
1-4
Introducing InterScan Messaging Security Virtual Appliance
Smart Scan Smart Scan facilitates a more Smart Scan leverages the Smart
efficient scanning process by off- Protection Network to:
loading a large number of threat
signatures previously stored on the • Enable fast, real-time
IMSVA server to the cloud. security status lookup
capabilities in the cloud
• Reduce the time necessary
to deliver protection against
emerging threats
• Lower memory consumption
on the server
IntelliTrap Virus writers often attempt to IntelliTrap helps reduce the risk
circumvent virus filtering by using that a virus compressed using
different file compression schemes. different file compression
IntelliTrap provides heuristic schemes will enter your network
evaluation of these compressed through email.
files.
Because there is the possibility that
IntelliTrap may identify a non-threat
file as a security risk, Trend Micro
recommends quarantining message
attachments that fall into this
category when IntelliTrap is
enabled. In addition, if your users
regularly exchange compressed
files, you may want to disable this
feature.
By default, IntelliTrap is turned on
as one of the scanning conditions
for an antivirus policy, and is
configured to quarantine message
attachments that may be classified
as security risks.
1-5
Trend Micro InterScan™ Messaging Security Virtual Appliance 9.0 Administrator’s Guide
DoS attacks By flooding a mail server with large IMSVA allows you to configure
attachments, or sending messages the characteristics of messages
that contain multiple viruses or that you want to stop at the
recursively compressed files, SMTP gateway, thus reducing
individuals with malicious intent can the chances of a DoS attack.
disrupt mail processing.
1-6
Introducing InterScan Messaging Security Virtual Appliance
Legal liability Improper use of email can also put IMSVA provides tools for
and business a company at risk of legal liability. monitoring and blocking content
integrity Employees may engage in sexual to help reduce the risk that
or racial harassment, or other illegal messages containing
activity. Dishonest employees can inappropriate or confidential
use a company messaging system material will be allowed through
to leak confidential information. your gateway.
Inappropriate messages that
originate from a company’s mail
server damage the company’s
reputation, even if the opinions
expressed in the message are not
those of the company.
1-7
Trend Micro InterScan™ Messaging Security Virtual Appliance 9.0 Administrator’s Guide
Spyware and Other than viruses, your clients are IMSVA’s ability to protect your
other types of at risk from potential threats such environment against spyware
grayware as spyware, adware and dialers. and other types of grayware
For more information, see About enables you to significantly
Spyware/Grayware on page 1-14. reduce security, confidentiality,
and legal risks to your
organization.
1-8
Introducing InterScan Messaging Security Virtual Appliance
Note
Activate SPS before you
configure IP Profiler and
Email reputation.
1-9
Trend Micro InterScan™ Messaging Security Virtual Appliance 9.0 Administrator’s Guide
LDAP and You can configure LDAP settings if Using LDAP, you can define
domain-based you are using LDAP directory multiple rules to enforce your
policies services such as Lotus Domino™ company’s email usage
or Microsoft™ Active Directory™ guidelines. You can define rules
for user-group definition and for individuals or groups, based
administrator privileges. on the sender and recipient
addresses.
1-10
Introducing InterScan Messaging Security Virtual Appliance
Centralized Centralized reporting gives you the Helps you analyze how IMSVA is
reporting flexibility of generating one time (on performing.
demand) reports or scheduled
reports. One time (on demand) reports
allow you to specify the type of
report content as and when
required. Alternatively, you can
configure IMSVA to automatically
generate reports daily, weekly,
and monthly.
System A built-in agent monitors the health Email and SNMP notification on
availability of your IMSVA server and delivers detection of system failure allows
monitor notifications through email or you to take immediate corrective
SNMP trap when a fault condition actions and minimize downtime.
threatens to disrupt the mail flow.
1-11
Trend Micro InterScan™ Messaging Security Virtual Appliance 9.0 Administrator’s Guide
Clustered The current version of IMSVA has You can install the various
architecture been designed to make distributed IMSVA components on different
deployment possible. computers, and some
components can exist in
multiples. For example, if your
messaging volume demands,
you can install additional IMSVA
scanner components on
additional servers, all using the
same policy services.
1-12
Introducing InterScan Messaging Security Virtual Appliance
1-13
Trend Micro InterScan™ Messaging Security Virtual Appliance 9.0 Administrator’s Guide
About Spyware/Grayware
Your clients are at risk from potential threats other than viruses/malware. Grayware can
negatively affect the performance of the computers on your network and introduce
significant security, confidentiality, and legal risks to your organization.
TYPE DESCRIPTION
Spyware Gathers data, such as account user names and passwords, and
transmits them to third parties
Remote Access Tools Helps hackers remotely access and control computers
Password Cracking Helps hackers decipher account user names and passwords
Applications
1-14
Introducing InterScan Messaging Security Virtual Appliance
TYPE DESCRIPTION
Increased web Certain types of grayware, such as adware, are often designed
browser-related to create pop-up windows or display information in a browser
crashes frame or window. Depending on how the code in these
applications interacts with system processes, grayware can
sometimes cause browsers to crash or freeze and may even
require a system reboot.
Loss of personal and Not all data that spyware/grayware applications collect is as
corporate information innocuous as a list of websites users visit. Spyware/grayware
can also collect the user names and passwords users type to
access their personal accounts, such as a bank account, and
corporate accounts that access resources on your network.
1-15
Trend Micro InterScan™ Messaging Security Virtual Appliance 9.0 Administrator’s Guide
TYPE DESCRIPTION
Higher risk of legal If hackers gain access to the computer resources on your
liability network, they may be able to utilize your client computers to
launch attacks or install spyware/grayware on computers
outside your network. Having your network resources unwillingly
participate in these types of activities could leave your
organization legally liable to damages incurred by other parties.
1-16
Introducing InterScan Messaging Security Virtual Appliance
Tip
Trend Micro recommends that you configure IMSVA to block, not receive, any email
messages from an IP address that is included on the standard reputation database.
1-17
Trend Micro InterScan™ Messaging Security Virtual Appliance 9.0 Administrator’s Guide
1-18
Introducing InterScan Messaging Security Virtual Appliance
1-19
Trend Micro InterScan™ Messaging Security Virtual Appliance 9.0 Administrator’s Guide
1-20
Introducing InterScan Messaging Security Virtual Appliance
1-21
Trend Micro InterScan™ Messaging Security Virtual Appliance 9.0 Administrator’s Guide
1-22
Introducing InterScan Messaging Security Virtual Appliance
www.smartprotectionnetwork.com
Note
Note that while IMSVA detects these kinds of email messages, these messages are not
tagged as spam.
Administrators define the rule criteria to take an action on those email messages. Every
graymail message rule has an exception list containing address objects that bypass
message filtering. An address object is a single IP address or address range (IPv4 or
IPv6), or the Classless Inter-Domain Routing (CIDR) block.
1-23
Another random document with
no related content on Scribd:
The Project Gutenberg eBook of Colour vision
This ebook is for the use of anyone anywhere in the United
States and most other parts of the world at no cost and with
almost no restrictions whatsoever. You may copy it, give it away
or re-use it under the terms of the Project Gutenberg License
included with this ebook or online at www.gutenberg.org. If you
are not located in the United States, you will have to check the
laws of the country where you are located before using this
eBook.
Language: English
AT
THE ROYAL INSTITUTION
BY
NEW YORK
WILLIAM WOOD AND COMPANY
CONTENTS.
PAGE
Preface vii
CHAPTER I.
The Eye 1
CHAPTER II.
Simple Colours and their Mixture 15
CHAPTER III.
Three Colour Sensations Possible 32
CHAPTER IV.
The Young and Hering Theories of Colour Vision 41
CHAPTER V.
General Aspect of Colour Blindness 58
CHAPTER VI.
Colour Blindness exhibited by Colour Discs and exhibited
by Luminosity Curves of the Spectrum 74
CHAPTER VII.
Luminosity of Colours to Different Parts of the Retina 88
CHAPTER VIII.
Luminosity of a Feeble Spectrum and the Limit of the
Perception of Colour 98
CHAPTER IX.
The Extinction of Light from the Spectrum 108
CHAPTER X.
The Extinction of the Perception of Light by the Colour
Blind 122
CHAPTER XI.
Tobacco Blindness 137
CHAPTER XII.
Examples of Colour Blindness due to Disease 148
CHAPTER XIII.
The Holmgren Test for Colour Blindness 167
CHAPTER XIV.
The Spectrum Test for Colour Blindness 180
CHAPTER XV.
The Young and Hering Theories of Colour Vision
Compared 187
Appendix 201
Index 229
PREFACE.
THE writer had for some years past, in conjunction with General
Festing, and recently as Secretary and Member of the Colour Vision
Committee of the Royal Society, carried out a series of investigations
on colour vision, and selected that subject when he was invited, in
1894, to deliver the Tyndall Lectures at the Royal Institution.
The brief time allotted for these lectures—an hour on three
successive Saturday afternoons—restricted the discussion of some
aspects of the question, and confined its treatment in the main to
those features most readily explicable by the physicist, and to
bringing into notice the latest results which had been obtained from
physical experiments. How far the writer has succeeded in the task
which he then outlined it is for the reader to determine.
There was no intention in the first instance to publish these
lectures. After their delivery, many persons expressed a desire that
the information they contained should be rendered accessible to
such as were interested in the theory of colour vision, and in
deference to that desire the lecture-notes have been re-cast in book
form. For the reader’s convenience the matter is now divided into
chapters instead of into lectures, and a few additions have been
made in the text to explain some of the experimental work to those
who have not facilities for its repetition.
The writer has to acknowledge several debts of gratitude. First,
to Mr. E. Nettleship, for his kindness in looking over the proofs, and
making valuable suggestions whilst the work was passing through
the press; and also, as will be seen throughout its pages, for many of
the interesting cases of defective colour perception which have been
examined by the somewhat novel methods described. Next, the
writer’s gratitude is due to Professor M. Foster for the permission he
has given to use his admirable description of the Hering theory; and,
lastly, to the Royal Society for the permission it accorded to use
various diagrams which have served as illustrations to papers which
have appeared in its “Philosophical Transactions” and “Proceedings.”
COLOUR VISION.
CHAPTER I.
I MUST commence this course by saying that I feel the honour that
has been done me in asking me to undertake it, connected as it is
with the name of Tyndall, whose recent removal from our midst has
been deplored by all lovers of science, and by none more than by
those who have had the privilege of listening to him at this Institution.
It is my duty to speak on some subject of physics, and the subject I
have chosen is Colour Vision. I hope it will not be considered
inappropriate, since it was Thomas Young, the physicist, whose
connection with this Institution is well known, who first propounded a
really philosophical theory of the subject. Interesting as it may be to
trace how old theories have failed and new ones have started, I feel
that for those who, like myself, have but little time at command in
which to address you, the historical side of this question must of
necessity be treated incompletely.
Colour vision is a subject which enters into the domains both of
physics and physiology, and it is thus difficult for any one individual
to treat of it exhaustively unless he be a Helmholtz, who was as
distinguished in the one branch of science as he was in the other. I
am not a physiologist, and at the most, can only pretend to an
elementary knowledge of the physiology of the eye, but I trust it is
sufficient to prevent myself from falling into any grievous error. I shall
try and show you, however, that the subject is capable of being
made subordinate to physical methods of examination. I must
necessarily commence by a very brief description of those parts of
the eye in which it is supposed the seat of vision lies, but in terms
which are not too technical. As to the mere optical properties of the
eye I shall say but little, for they are not necessary for my purpose,
although more particularly adapted to mathematical treatment than
the other properties I have to describe.
The eye may be diagrammatically represented as in the figure
which is supposed to be a horizontal section of it, the figure being
reproduced from Professor Michael Foster’s Physiology.
Fig. 1.
Fig. 2.
Fig. 3.
Many persons are not aware of the extent of the field of view
which the eye embraces. Vertically it takes in about 100°, whilst