Softwin BitDefender Total Security 2010 manuel d'utilisation
- Voir en ligne ou télécharger le manuel d’utilisation
- 444 pages
- N/A
Aller à la page of
Les manuels d’utilisation similaires
Un bon manuel d’utilisation
Les règles imposent au revendeur l'obligation de fournir à l'acheteur, avec des marchandises, le manuel d’utilisation Softwin BitDefender Total Security 2010. Le manque du manuel d’utilisation ou les informations incorrectes fournies au consommateur sont à la base d'une plainte pour non-conformité du dispositif avec le contrat. Conformément à la loi, l’inclusion du manuel d’utilisation sous une forme autre que le papier est autorisée, ce qui est souvent utilisé récemment, en incluant la forme graphique ou électronique du manuel Softwin BitDefender Total Security 2010 ou les vidéos d'instruction pour les utilisateurs. La condition est son caractère lisible et compréhensible.
Qu'est ce que le manuel d’utilisation?
Le mot vient du latin "Instructio", à savoir organiser. Ainsi, le manuel d’utilisation Softwin BitDefender Total Security 2010 décrit les étapes de la procédure. Le but du manuel d’utilisation est d’instruire, de faciliter le démarrage, l'utilisation de l'équipement ou l'exécution des actions spécifiques. Le manuel d’utilisation est une collection d'informations sur l'objet/service, une indice.
Malheureusement, peu d'utilisateurs prennent le temps de lire le manuel d’utilisation, et un bon manuel permet non seulement d’apprendre à connaître un certain nombre de fonctionnalités supplémentaires du dispositif acheté, mais aussi éviter la majorité des défaillances.
Donc, ce qui devrait contenir le manuel parfait?
Tout d'abord, le manuel d’utilisation Softwin BitDefender Total Security 2010 devrait contenir:
- informations sur les caractéristiques techniques du dispositif Softwin BitDefender Total Security 2010
- nom du fabricant et année de fabrication Softwin BitDefender Total Security 2010
- instructions d'utilisation, de réglage et d’entretien de l'équipement Softwin BitDefender Total Security 2010
- signes de sécurité et attestations confirmant la conformité avec les normes pertinentes
Pourquoi nous ne lisons pas les manuels d’utilisation?
Habituellement, cela est dû au manque de temps et de certitude quant à la fonctionnalité spécifique de l'équipement acheté. Malheureusement, la connexion et le démarrage Softwin BitDefender Total Security 2010 ne suffisent pas. Le manuel d’utilisation contient un certain nombre de lignes directrices concernant les fonctionnalités spécifiques, la sécurité, les méthodes d'entretien (même les moyens qui doivent être utilisés), les défauts possibles Softwin BitDefender Total Security 2010 et les moyens de résoudre des problèmes communs lors de l'utilisation. Enfin, le manuel contient les coordonnées du service Softwin en l'absence de l'efficacité des solutions proposées. Actuellement, les manuels d’utilisation sous la forme d'animations intéressantes et de vidéos pédagogiques qui sont meilleurs que la brochure, sont très populaires. Ce type de manuel permet à l'utilisateur de voir toute la vidéo d'instruction sans sauter les spécifications et les descriptions techniques compliquées Softwin BitDefender Total Security 2010, comme c’est le cas pour la version papier.
Pourquoi lire le manuel d’utilisation?
Tout d'abord, il contient la réponse sur la structure, les possibilités du dispositif Softwin BitDefender Total Security 2010, l'utilisation de divers accessoires et une gamme d'informations pour profiter pleinement de toutes les fonctionnalités et commodités.
Après un achat réussi de l’équipement/dispositif, prenez un moment pour vous familiariser avec toutes les parties du manuel d'utilisation Softwin BitDefender Total Security 2010. À l'heure actuelle, ils sont soigneusement préparés et traduits pour qu'ils soient non seulement compréhensibles pour les utilisateurs, mais pour qu’ils remplissent leur fonction de base de l'information et d’aide.
Table des matières du manuel d’utilisation
-
Page 1
User's guide Copyright© 2009 BitDefender[...]
-
Page 2
BitDefender T otal Security 2010 User's guide Published 2009.07.02 Copyright© 2009 BitDefender Legal Notice All rights reserved. No part of this book may be r eproduced or transmitted in any for m or by any means, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without written p[...]
-
Page 3
Each man has his price Bob And yours was pretty low BitDefender T otal Security 2010[...]
-
Page 4
T able of Contents License and W ar ranty . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xii Pr eface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxiv 1. Conventions Used in This Book . . . . .[...]
-
Page 5
6.6.1. Game Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34 6.6.2. Laptop Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 6.7. Automatic Device Detection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . [...]
-
Page 6
11.5.6. F ile Shredder Wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106 11.6. F ile V ault Wizar ds . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109 11.6.1. Add F iles to V ault . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .[...]
-
Page 7
17.2. Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160 17.2.1. General Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160 17.2.2. Virus Report Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . [...]
-
Page 8
20.5. Applications Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235 20.5.1. Creating Application Control R ules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 236 20.5.2. Managing Application Control R ules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 236[...]
-
Page 9
24.1.5. Menu Bar . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 301 25. Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 304 25.1. Instant Messaging (IM) Encryption . . . . . . . . . . . . . . . . . . . . . . . [...]
-
Page 10
31. Integration into Windows Contextual Menu . . . . . . . . . . . . . . . . . . . . . . 344 31.1. Scan with BitDefender . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 344 31.2. BitDefender F ile V ault . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 345 [...]
-
Page 11
39.4.2. Many Spam Messages Are Not Detected . . . . . . . . . . . . . . . . . . . . . . . . . . . 391 39.4.3. Antispam F ilter Does Not Detect Any Spam Message . . . . . . . . . . . . . . . . 393 39.5. BitDefender R emoval F ailed . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 394 40. Support . . . . . . . . . .[...]
-
Page 12
License and W ar ranty IF Y OU DO NOT AGREE TO THESE TERMS AND CONDITIONS DO NOT INST ALL THE SOFTW ARE. B Y SELECTING "I A CCEPT", "OK", "CONTINUE", "YES" OR B Y INST ALLING OR USING THE SOF TW ARE IN ANY W A Y, Y OU ARE INDICA TING Y OUR COMPLETE UNDERST ANDING AND A CCEPT ANCE OF THE TERMS OF THIS AGREEMEN[...]
-
Page 13
1. The Service is made available by the Licensor to you during the period of any free trial of the Service, and for the period when you maintain a paid subscription to the Service. Use of the Service consists of you, as Subscriber to the Service, electronically transmitting encrypted computer data (Data) via the Sof tware over the Internet into a l[...]
-
Page 14
in advance) for any period, the Licensor may, in addition to any other rights, at its sole discretion and without notice to you: a. (a) suspend the obligation of the Licensor to perfor m under this Agr eement, and deny you access to and use of the Service until your subscription is back in good standing, or b. (b) terminate your access to and use o[...]
-
Page 15
use the Sof tware or the Service in any manner that may injur e any party or property in any way whatsoever . 6. SIGNUP INFORMA TION AND PRIV A CY POLICY All use by the Licensor of personal information collected from you through, or associated with your subscription to the Service shall be undertak en in accor dance with the Licensor’s privacy po[...]
-
Page 16
Y our data stored on the Service is encrypted by the Softwar e with the intention of pr otecting the privacy of that data which is accessible only to you and other users who have access to your username and password. The Licensor warrants that in UltraSafe mode your data is encrypted in a manner which pr events the Licensor (and the Licensor’s As[...]
-
Page 17
In particular, you acknowledge that from time to time, the Service may fail or be interrupted for a period for any number of r easons (including for example, without limitation, thr ough power inter ruption, or har d disc failur e, or for periodic system maintenance whether scheduled or unscheduled and whether or not you were given advance notice o[...]
-
Page 18
With respect to your data which is backed up through the Service and stor ed as encrypted data (Data) by the Licensor or the Licensor’s Associates, apart from the obligations specifically set out in this Agr eement, neither the Licensor nor the Licensor’s Associates have any obligation to you or any other users in relation to access to the Data[...]
-
Page 19
COPYRIGHT . All rights, titles and inter est in and to BitDefender and all copyright rights in and to BitDefender (including but not limited to any images, photographs, logos, animations, video, audio, music, te xt, and "applets" incorporated into BitDefender), the accompanying printed materials, and any copies of BitDefender are owned by[...]
-
Page 20
Nor does BitDefender mak e any r epresentations about the performance or lack of performance of BitDefender either expressed or implied. Any disclaimer of warranty by BitDefender set out herein also applies to the BitDefender Associates. No oral or other representation by BitDefender or by any party or repr esentative of any party associated with B[...]
-
Page 21
REQUIRING F AIL -SAFE PERFORMANCE OR OPER A TION. THIS SOFTW ARE IS NOT FOR USE IN THE OPERA TION OF AIR CR AF T NA VIGA TION, NUCLEAR F ACILITIES, OR COMMUNICA TION SYSTEMS, WEAPONS SYSTEMS, DIRECT OR INDIRECT LIFE-SUPPOR T SYSTEMS, AIR TRAFFIC CONTROL, OR ANY APPLICA TION OR INST ALL A TION WHERE F AIL URE COULD RESUL T IN DEA TH, SEVERE PHYSICAL[...]
-
Page 22
Y ou declare that all the data that you provide will be true and accurate and undertak es to infor m BItDefender of any changes to said data. Y ou have the right to object to the processing of any of his or her data which is not essential for the ex ecution of the agreement and to its use for any purpose other than the maintenance of the contractua[...]
-
Page 23
AGREEMENT TO BE LEGALL Y BINDING The parties acknowledge that they intend to be legally bound by this Agreement, and have enter ed into this Agr eement in full knowledge of the legal ramifications of this Agreement. (If in doubt about the legal consequences of entering into this Agreement, potential users of the Sof tware or the Service should seek[...]
-
Page 24
P reface This guide is intended to all users who have chosen BitDefender T otal Security 2010 as a security solution for their personal computers. The information presented in this book is suitable not only for computer literates, it is accessible to everyone who is able to work under Windows. This book will describe for you BitDefender T otal Secu[...]
-
Page 25
Note The note is just a short observation. Although you can omit it, the notes can provide valuable information, such as specific feature or a link to some related topic. Important This requir es your attention and is not recommended to skip over it. Usually, it provides non-critical but significant information. W ar ning This is critical informati[...]
-
Page 26
3. R equest for Comments W e invite you to help us improve the book. W e have tested and verified all of the information to the best of our ability . Please write to tell us about any flaws you find in this book or how you think it could be improved, to help us provide you with the best documentation possible. Let us know by sending an e-mail to do[...]
-
Page 27
Installation and R emoval 1 BitDefender T otal Security 2010[...]
-
Page 28
1. System R equir ements Y ou may install BitDefender T otal Security 2010 only on computers running the following operating systems: ⚫ Windows XP (32/64 bit) with Service Pack 2 or higher ⚫ Windows Vista (32/64 bit) or W indows Vista with Service P ack 1 or higher ⚫ Windows 7 (32/64 bit) Before installation, make sure that your computer meet[...]
-
Page 29
⚫ Y ahoo Messenger 8.5 ⚫ Windows Live Messenger 8 Antispam pr otection is provided for all POP3/SMTP e-mail clients. The BitDefender Antispam toolbar however is integrated only into: ⚫ Microsof t Outlook 2000 / 2003 / 2007 ⚫ Microsof t Outlook Expr ess ⚫ Microsof t Windows Mail ⚫ Thunderbird 2.0.0.17 System R equir ements 3 BitDefender [...]
-
Page 30
2. Pr eparing for Installation Before you install BitDefender T otal Security 2010, complete these preparations to ensure the installation will go smoothly : ⚫ Mak e sure that the computer where you plan to install BitDefender meets the minimum system requirements. If the computer does not meet all the minimum system r equirements, BitDefender wi[...]
-
Page 31
3. Installing BitDefender Y ou can install BitDefender from the BitDefender installation CD or using the installation file downloaded on your computer fr om the BitDefender website or from other authorized websites (for example, the website of a BitDefender partner or an online shop). Y ou can download the installation file from the BitDefender web[...]
-
Page 32
F ollow these steps to install BitDefender T otal Security 2010: 1. Click Next . Y ou can cancel installation anytime you want by clicking Cancel . BitDefender T otal Security 2010 alerts you if you have other antivirus products installed on your computer . Click Remove to uninstall the corresponding product. If you want to continue without removin[...]
-
Page 33
Important W e recommend you to turn off Windows F irewall since BitDefender T otal Security 2010 alr eady includes an advanced firewall. Running two firewalls on the same computer may cause problems. ⚫ T urn off Windows Defender - to turn off W indows Defender; this option appears only on Windows Vista. Click Install in order to begin the install[...]
-
Page 34
3.1.1. Step 1/2 - R egister BitDefender T otal Security 2010 R egistration BitDefender T otal Security 2010 comes with 30-day trial period. T o continue evaluating the product, select I want to evaluate BitDefender and click Next . T o register BitDefender T otal Security 2010: 1. Select I want to evaluate BitDefender with a license key . 2. T ype [...]
-
Page 35
3.1.2. Step 2/2 - Cr eate a BitDefender Account Account Creation If you do not want to cr eate a BitDefender account at the moment, select Register later and click Finish . Otherwise, proceed according to your curr ent situation: ⚫ “I do not have a BitDefender account” (p. 9) ⚫ “I already have a BitDefender account” (p. 10) Important Y [...]
-
Page 36
⚫ Re-type password - type in again the previously specified passwor d. Note Once the account is activated, you can use the pr ovided e-mail addr ess and password to log in to your account at http://myaccount.bitdefender .com . 3. If you plan to use BitDefender to back your data up on secure online servers, select the cor responding check bo x to [...]
-
Page 37
4. Optionally, BitDefender can infor m you about special offers and promotions using the e-mail address of your account. Select one of the available options from the menu: ⚫ Send me all messages ⚫ Send me only product related messages ⚫ Don't send me any messages 5. Click Sign in . 6. Click Finish to complete the wizard. 3.2. Configurati[...]
-
Page 38
3.2.1. Step 1 - Select Usage Pr ofile Usage Pr ofiles Click the button that best describes the activities performed on this computer (the usage profile). Description Option Click here if this PC is used mainly for browsing and multimedia activities. T ypical Click here if this PC is used by children and you want to control their access to Internet [...]
-
Page 39
3.2.2. Step 2 - Describe Computer Computer Description Select the options that apply to your computer: ⚫ This computer is in a home network. Select this option if you want to manage remotely (from another computer) the BitDefender pr oduct you installed on this computer . An additional wizar d step will allow you to configure the Home Network Man[...]
-
Page 40
3.2.3. Step 3 - Select User Interface User Interface View Modes Click the button that best describes your computer skills to select an appropriate user interface view mode. Y ou can choose to view the user interface under any of three modes, depending on your computer skills and on your pr evious experience with BitDefender . Description Mode Suite[...]
-
Page 41
Description Mode Y ou can fix issues separately and choose which issues to be monitor ed. Moreover, you can manage remotely the BitDefender products installed on the computers in your household. Suited for more technical users, this mode allows you to fully configure each functionality of BitDefender . Advanced Mode Y ou can also use all tasks prov[...]
-
Page 42
2. If you ar e sharing your Windows user account with your childr en, select the corr esponding check bo x and type a passwor d in the cor responding fields to protect the P ar ental Control settings. Anyone trying to change the P ar ental Contr ol settings must first provide the password that you have configured. Click Next to continue. 3.2.5. Ste[...]
-
Page 43
3.2.6. Step 6 - Select the T asks to Be R un T ask Selection Set BitDefender to perfor m important tasks for the security of your system. The following options are available: ⚫ Update BitDefender and perform a quick system scan now - during the next step, the virus signatures and product files of BitDefender will be updated in order to protect yo[...]
-
Page 44
4. Right-click the System Scan task and select Schedule . A new window will appear . 5. Change the frequency and the start time as needed. 6. Click OK to save the changes. W e recommend that you have these options enabled before moving on to the next step in order to ensure the security of your system. Click Next to continue. If you clear the first[...]
-
Page 45
4. Upgrade Y ou can upgrade to BitDefender T otal Security 2010 if you are using BitDefender T otal Security 2010 beta or the 2008 or 2009 version. There are two ways to perform the upgrade: ⚫ Install BitDefender T otal Security 2010 directly over the older version. If you install directly over the 2009 version, the F riends and Spammers lists an[...]
-
Page 46
5. R epairing or R emoving BitDefender If you want to repair or r emove BitDefender T otal Security 2010, follow the path from the Windows start menu: Start → Programs → BitDefender 2010 → Repair or Remove . Y ou will be requested to confirm your choice by clicking Next . A new window will appear where you can select: ⚫ Repair - to re-insta[...]
-
Page 47
Getting Started 21 BitDefender T otal Security 2010[...]
-
Page 48
6. Overview Once you have installed BitDefender your computer is protected. If you have not completed the configuration wizard , you must open BitDefender as soon as possible and fix the existing issues. Y ou may have to configure specific BitDefender components or tak e preventive actions to pr otect your computer and your data. If you want to, yo[...]
-
Page 49
Description Mode Y ou can fix issues separately and choose which issues to be monitor ed. Moreover, you can manage remotely the BitDefender products installed on the computers in your household. Suited for more technical users, this mode allows you to fully configure each functionality of BitDefender . Expert Mode Y ou can also use all tasks provid[...]
-
Page 50
Novice Mode The window is organized into thr ee main sections: ⚫ Security Status informs you of the issues that affect your computer's security and helps you fix them. By clicking Fix All Issues , a wizard will help you easily remove any threats to your computer and data security . F or detailed infor mation, please refer to “ Fixing Issue[...]
-
Page 51
Description T ask This wizard guides you through the process of creating a local back up task. At the end of this process, you will Local Backup be able to back your files up on the spot or schedule the product to back them up at a later moment. This wizar d helps you back up data on secure online servers and create an automatic backup routine. Onl[...]
-
Page 52
Description Link Gives you access to a help file that shows you how to use BitDefender . Help & Support 6.2.2. Intermediate Mode Aimed at users with average computer skills, Intermediate Mode is a simple interface that gives you access to all modules at a basic level. Y ou'll have to keep track of warnings and critical alerts and fix undes[...]
-
Page 53
Description T ab Displays the status of the BitDefender features designed to improve your system's performance together with links to tune-up tasks. T uneUp Displays the status of the file vault and of the backup modules together with links to the file vault and to back up tasks. F ile Storage Displays the BitDefender home network structure. T[...]
-
Page 54
Expert Mode On the left side of the window there is a menu containing all security modules. Each module has one or more tabs wher e you can configure the cor responding security settings or perfor m security or administrative tasks. The following table briefly describes each module. F or detailed infor mation, please refer to the “Expert Mode” [...]
-
Page 55
Description Module Allows you to pr event data theft from your computer and protect your privacy while you are online. Privacy Control Allows you to pr otect your computer from inbound and outbound unauthorized connection attempts. It is quite similar F ir ewall to a guard at your gate - it will k eep a watchful eye on your Internet connection and [...]
-
Page 56
Description Link Allows you to enter a new license key or to view the curr ent license k ey and the registration status. R egister Allows you to contact the BitDefender support team. Support Gives you access to a help file that shows you how to use BitDefender . Help Allows you to see a detailed history of all tasks performed by BitDefender on your[...]
-
Page 57
⚫ Letter G : The product operates in Game Mode . If BitDefender is not working, the system tray icon is grayed out . This usually happens when the license key expir es. It can also occur when the BitDefender services are not responding or when other er r ors affect the normal operation of BitDefender . 6.4. Scan Activity Bar The Scan activity bar[...]
-
Page 58
specify other actions to be taken on infected files. The scanning options are standard and you cannot change them. 6.4.2. Disable/R estor e Scan Activity Bar When you no longer want to see the graphic visualization, just right-click it and select Hide . T o restor e the Scan activity bar, follow these steps: 1. Open BitDefender . 2. Click the Setti[...]
-
Page 59
BitDefender Manual Scan Click Add Folder , select the location you want to scan and click OK . If you want to scan multiple folders, repeat this action for each additional location. The paths to the selected locations will appear in the Scan T arget column. If you change your mind about the location, just click the Remove button next to it. Click t[...]
-
Page 60
applications work in Safe Mode. This is why most viruses are inactive when using Windows in Safe Mode and they can be easily removed. T o start W indows in Safe Mode, restart your computer and press the F8 key until the Windows Advanced Options Menu appears. Y ou can choose between several options of starting W indows in Safe Mode. Y ou might want [...]
-
Page 61
⚫ Pr ess Ctrl+Shift+Alt+G (the default hotk ey). Important Do not forget to turn Game Mode off when you finish. T o do this, use the same methods you did when you turned it on. Changing Game Mode Hotk ey If you want to change the hotkey, follow these steps: 1. Open BitDefender and switch the user interface to Expert Mode. 2. Click Game / Laptop M[...]
-
Page 62
2. Click the Settings button in the upper -right corner of the window . 3. In the General Settings category, select the check bo x corresponding to Laptop Mode Detection . 4. Click OK to save and apply the changes. 6.7. Automatic Device Detection BitDefender automatically detects when you connect a removable storage device to your computer and offe[...]
-
Page 63
7. Click OK to save and apply the changes. Overview 37 BitDefender T otal Security 2010[...]
-
Page 64
7. F ixing Issues BitDefender uses an issue tracking system to detect and inform you about the issues that may affect the security of your computer and data. By default, it will monitor only a series of issues that are considered to be very important. However, you can configure it as needed, choosing which specific issues you want to be notified ab[...]
-
Page 65
F ix All Issues Wizar d The wizard displays the list of e xisting security vulnerabilities on your computer . All curr ent issues are selected to be fixed. If ther e is an issue that you do not want to be fixed, just select the corresponding check bo x. If you do so, its status will change to Skip . Note If you do not want to be notified about spec[...]
-
Page 66
⚫ System vulnerabilities. BitDefender automatically checks your system for vulnerabilities and alerts you about them. System vulnerabilities include the following: ▸ weak passwords to Windows user accounts. ▸ outdated softwar e on your computer . ▸ missing Windows updates. ▸ Windows Automatic Updates is disabled. When such issues are to b[...]
-
Page 67
8. Configuring Basic Settings Y ou can configure the main product settings (including changing the user interface view mode) from the basic settings window . T o open it, do any of the following: ⚫ Open BitDefender and click the Settings button in the upper -right corner of the window . ⚫ Right-click the BitDefender icon in the system tray and [...]
-
Page 68
8.1. User Interface Settings In this area, you can switch the user interface view mode and r eset the usage pr ofile. Switching the user interface view mode. As described in section “ User Interface View Modes ” (p. 22) , there are three modes for displaying the user interface. Each user interface mode is designed for a specific category of use[...]
-
Page 69
8.2. Security Settings In this ar ea, you can enable or disable product settings that cover various aspects of computer and data security . The curr ent status of a setting is indicated using one of these icons: Green circle with a check mark: The setting is enabled. Red circle with an exclamation mark: The setting is disabled. T o enable / disable[...]
-
Page 70
Description Setting defined. R estrictions may include blocking inappropriate web sites, as well as limiting gaming and Internet access according to a specified schedule. F ir ewall pr otects your computer fr om hack er and malicious outside attacks. Firewall F ile Encryption k eeps your documents private by encrypting them in special vaulted drive[...]
-
Page 71
Description Setting Game Mode temporarily modifies protection settings so as to minimize their impact on system performance during games. Game Mode Laptop Mode temporarily modifies protection settings so as to minimize their impact on the life of your laptop battery . Laptop Mode Detection This ensur es that the BitDefender settings can only be cha[...]
-
Page 72
9. History and Events The View Logs link at the bottom of the BitDefender main window opens another window with the BitDefender history & events. This window offers you an overview of the security-r elated events. F or instance, you can easily check if the update was successfully performed, if malware was found on your computer, if your backup [...]
-
Page 73
⚫ V ulnerability ⚫ Backup ⚫ IM encryption ⚫ File Encryption ⚫ T une-Up ⚫ Game/Laptop Mode ⚫ Home Network ⚫ Update ⚫ Registration ⚫ Internet Log A list of events is available for each category . Each event comes with the following information: a short description, the action BitDefender took on it when it happened, and the date a[...]
-
Page 74
10. R egistration and My A ccount BitDefender T otal Security 2010 comes with 30-day trial period. During the trial period, the pr oduct is fully functional and you can test it to see if it meets your expectations. Please note that, af ter 15 days of evaluation, the product will cease to update, unless you create a BitDefender account. Cr eating a [...]
-
Page 75
R egistration Y ou can see the BitDefender registration status, the current license k ey and how many days are left until the license expir es. T o register BitDefender T otal Security 2010: 1. T ype the license key in the edit field. Note Y ou can find your license key : ⚫ on the CD label. ⚫ on the product registration car d. ⚫ in the online[...]
-
Page 76
10.2. A ctivating BitDefender T o activate BitDefender, you must create or sign in to a BitDefender account. If you did not register a BitDefender account during the initial r egistration wizard, you can do that as follows: ⚫ In Novice Mode, click Fix All Issues . The wizard will help you fix all pending issues, including activating the product. [...]
-
Page 77
Important Y ou must create an account within 15 days after installing BitDefender (if you register it with a license k ey, the deadline is e xtended to 30 days). Otherwise, BitDefender will no longer update. I do not have a BitDefender account T o successfully create a BitDefender account, follow these steps: 1. Select Create a new account . 2. T y[...]
-
Page 78
If you already have an active account, but BitDefender does not detect it, follow these steps to register the product to that account: 1. Select Sign in (previously created account) . 2. T ype the e-mail address and the password of your account in the cor r esponding fields. Note If you have forgotten your password, click Forgot your password? and [...]
-
Page 79
11. Wizar ds In order to make BitDefender very easy to use, several wizards help you car ry out specific security tasks or configur e more complex pr oduct settings. This chapter describes the wizar ds that may appear when you fix issues or perfor m specific tasks with BitDefender . Other configuration wizards are described separately in the “Exp[...]
-
Page 80
Y ou can see the scan status and statistics (scanning speed, elapsed time, number of scanned / infected / suspicious / hidden objects and other). W ait for BitDefender to finish scanning. Note The scanning process may tak e a while, depending on the complexity of the scan. Password-protected archives. If BitDefender detects a passwor d-pr otected a[...]
-
Page 81
Actions Y ou can see the number of issues affecting your system. The infected objects are displayed in groups, based on the malwar e they are infected with. Click the link corr esponding to a thr eat to find out more infor mation about the infected objects. Y ou can choose an overall action to be tak en for all issues or you can select separate act[...]
-
Page 82
Description Action to sear ch for and find such files on your computer, if any . Please note that these hidden files ar e not the files that you deliberately hide from Windows. They are the files hidden by special pr ograms, known as r ootkits. R ootkits ar e not malicious in natur e. However, they are commonly used to mak e viruses or spywar e und[...]
-
Page 83
Click Close to close the window . BitDefender Could Not Solve Some Issues In most cases BitDefender successfully disinfects the infected files it detects or it isolates the infection. However, there are issues that cannot be solved. In these cases, we r ecommend you to contact the BitDefender Support T eam at www .bitdefender .com . Our support rep[...]
-
Page 84
W elcome Window If you want to skip over this window when running this wizard in the future, select the Don't show this step the next time this wizard is run check box. Click Next . 11.2.2. Step 2/6 - Select T ar get Here you can specify the files or folders to be scanned as well as the scan options. Wizar ds 58 BitDefender T otal Security 201[...]
-
Page 85
Select T ar get Click Add T arget , select the files or folders that you want to scan and click OK . The paths to the selected locations will appear in the Scan T arget column. If you change your mind about the location, just click the Remove button next to it. Click the Remove All button to remove all the locations that were added to the list. Whe[...]
-
Page 86
Description Option Only the files with the e xtensions specified by the user will be scanned. These extensions must be separated by ";". Scan user defined extensions only Click Next . 11.2.3. Step 3/6 - Select Actions Here you can specify the scanner settings and the scan level. Select Actions ⚫ Select the actions to be tak en on the in[...]
-
Page 87
Description Action Moves infected files into the quarantine. Quarantined files cannot be executed or opened; therefor e, the risk of getting infected disappears. Move files to Quarantine ⚫ Select the action to be tak en on the hidden (rootkits) files. The following options are available: Description Action No action will be tak en on hidden files[...]
-
Page 88
Custom Scan Level Specify the type of malware you want BitDefender to scan for by selecting the appropriate options: Description Option Scans for known viruses. Scan for viruses BitDefender detects incomplete virus bodies, too, thus removing any possible threat that could affect your system's security . Scans for adware threats. Detected files[...]
-
Page 89
Click OK to close the window . Click Next . 11.2.4. Step 4/6 - Additional Settings Before scanning begins, additional options are available: Additional Settings ⚫ T o save the custom task you are creating for futur e use select the Show this task in Intermediate UI check bo x and enter a name for the task in the pr ovided edit field. The task wil[...]
-
Page 90
Scanning Note The scanning process may tak e a while, depending on the complexity of the scan. Y ou can click the scan progress icon in the system tray to open the scan window and see the scan progress. 11.2.6. Step 6/6 - V iew R esults When BitDefender completes the scanning process, the scan r esults will appear in a new window : Wizar ds 64 BitD[...]
-
Page 91
Summary Y ou can see the results summary . If you want comprehensive information on the scanning process, click View Log to view the scan log. Important If requir ed, please restart your system in order to complete the cleaning process. Click Close to close the window . 11.3. V ulnerability Check W izar d This wizard checks the system for vulnerabi[...]
-
Page 92
11.3.1. Step 1/6 - Select V ulnerabilities to Check V ulnerabilities Click Next to check the system for the selected vulnerabilities. Wizar ds 66 BitDefender T otal Security 2010[...]
-
Page 93
11.3.2. Step 2/6 - Checking for V ulnerabilities V ulnerability Check W ait for BitDefender to finish checking for vulnerabilities. Wizar ds 67 BitDefender T otal Security 2010[...]
-
Page 94
11.3.3. Step 3/6 - Update Windows Windows Updates Y ou can see the list of critical and non-critical W indows updates that ar e not curr ently installed on your computer . Click Install All System Updates to install all the available updates. Click Next . Wizar ds 68 BitDefender T otal Security 2010[...]
-
Page 95
11.3.4. Step 4/6 - Update Applications Applications Y ou can see the list of applications checked by BitDefender and if they are up to date. If an application is not up to date, click the provided link to download the latest version. Click Next . Wizar ds 69 BitDefender T otal Security 2010[...]
-
Page 96
11.3.5. Step 5/6 - Change W eak P asswor ds User P asswords Y ou can see the list of the Windows user accounts configured on your computer and the level of protection their passwor d provides. A password can be strong (hard to guess) or weak (easy to crack by malicious people with specialized softwar e). Click Fix to modify the weak passwords. A ne[...]
-
Page 97
⚫ Change user password. Y ou must type the new password in the edit fields. Mak e sure to inform the user about the password change. Note F or a str ong password, use a combination of upper case and lowercase letters, numbers and special characters (such as # , $ or @ ). Y ou can search the Internet for more information and tips on creating str o[...]
-
Page 98
11.4.1. Local Backup Wizar d This wizard guides you through the pr ocess of cr eating a local backup task. A t the end of this process, you will be able to back your files up on the spot or schedule the product to back them up at a later moment. Step 1/5 - W elcome W indow This is just a welcome page. W elcome Window Click Next . Step 2/5 - Choose [...]
-
Page 99
Choose what to backup Y ou can choose either Quick Backup (your music, videos, pictur es, emails, applications settings, etc.) or F ull Backup (all partitions). Click Other files , to add other files fr om your Desktop to Quick Backup . F ull Backup can also be easily customized by selecting what dir ectories to backup from a certain partition. Cli[...]
-
Page 100
Choose where to backup The following options are available: ⚫ Backup data on my computer ⚫ Backup data on my USB drive ⚫ Backup data on a network location ⚫ Backup data on CD/DVD ⚫ Backup data on FTP server If you decide to back your data up on your computer, your USB drive or on a network location, click Choose location and select where [...]
-
Page 101
1. T ype the FTP server name in the corresponding field. 2. If the FTP server uses a different port than default port 21, type it in the corr esponding field. 3. T o use passive mode (the FTP server initiates the connection), select the Passive Mode check box. 4. If the FTP server allows anonymous access, you can leave the Anonymous option selected[...]
-
Page 102
Click Next . Step 5/5 - Summary Here you can review the back up job settings and start the backup. Summary Y ou must type a task name into the cor responding field. Y ou can mak e any changes by retur ning to the previous steps (click Back ). Click Start backup if you ar e satisfied with your settings. W ait for BitDefender to complete the back up [...]
-
Page 103
Note The first time you create a scheduled backup job, you will be pr ompted to specif y Set R unning User the Windows account used to run the job. T o use the current user account, just type its password in the corr esponding field. If you want to run the backup under a different account, select The following Windows user and fill in the fields. ?[...]
-
Page 104
W elcome Window Click Next . Step 2/4 - Choose where to Back up from Here you can select a location where you want to restor e files from. Choose where to backup from The following options are available: Wizar ds 78 BitDefender T otal Security 2010[...]
-
Page 105
⚫ Restore data from my computer ⚫ Restore data from a USB drive ⚫ Restore data from a network location ⚫ Restore data from CD/DVD ⚫ Restore data from FTP server A fter selecting an option, click Choose location and select the backup file that you want to restor e. Click Next . Step 3/4 - Choose the R estore L ocation and F iles Here you c[...]
-
Page 106
Step 4/4 - Summary Here you can review the restor e job settings and start the restoring process. Click Restore if you are satisfied with your settings. W ait for BitDefender to restor e the selected data and then click Finish . 11.4.3. Online Backup Wizar d This wizard helps you back up data on secure online servers and create an automatic back up[...]
-
Page 107
Choose what to backup Choose what you want to back up by checking the checkbo x next to each of your important files and folders. Note Common F iles and F olders is a quick way to find the items most people like to back up such as My Documents, My Pictures, My Music and so on. Y ou can see the size of your selected files by selecting the Auto calcu[...]
-
Page 108
Choose when to backup If you select Run scheduled backups automatically without user intervention , you can specify how of ten the scheduled task runs by using the F requency and Timing drop-down menus. T o run the back up task even when you are not logged on, click the corresponding checkbo x. Click Next to continue or Skip Configuration to exit t[...]
-
Page 109
Other settings At the same time, you can choose to receive feedback regarding back up tasks or not by email. Select the corresponding checkbox and type your email address where you want to receive automatic backup reports. Click Next to continue or Skip Configuration to exit the wizard. Step 4/4 - Summary Here you can review the back up job setting[...]
-
Page 110
Summary If you want to start the backup immediately select the Run backup now checkbox. Click Finish to run backup or Skip Configuration to exit the wizard. 11.4.4. Online R estor e Wizar d This wizard helps you restore data that you backed up online. Step 1/3 - Search for back up This is where you can search for previous backups tasks to recover f[...]
-
Page 111
Search for backup The calendar displays in bold all dates on which backup tasks have been run. By clicking a date, only backups tasks up to this date will be included in your search results. F urther more, you can filter your search by using the following criteria: Description Criteria Set the size of the file (in KB) by typing a number into the co[...]
-
Page 112
Select what to recover Click Next to continue or Skip Configuration to exit the wizard. Step 3/3 - Select where to restor e This is where you can set up the restoring location for your files and folders. Wizar ds 86 BitDefender T otal Security 2010[...]
-
Page 113
Select where to restor e The default restoring location is: ?:Programs FilesBitDefender Online BackupRecoveredFiles . T o set up another restoring location, follow these steps: 1. Select the New location checkbox. 2. T ype the new location in the cor responding textbo x or use the br owse button to specify it. 3. If you want to save the new loca[...]
-
Page 114
R estor e finished Click Open F older to browse the default restoring location. 11.5. T uneup W izards The T uneup wizards help you optimize the disk space and improve the performance and responsiveness of your computer . 11.5.1. Disk Defragmenter Wizar d This wizard physically reorganizes the data on the hard disk so that the pieces of each file a[...]
-
Page 115
Analyzing W ait for the Disk Defragmenter to finish the analysis. If you want to cancel the operation, just click Cancel . Step 2/3 - View Analysis R eport A fter the analysis is completed, a new window will appear wher e you can see the results and initiate disk defragmentation, if necessary . Wizar ds 89 BitDefender T otal Security 2010[...]
-
Page 116
Analysis R eport Check the analysis report. If no disk volume needs defragmenting, click Close to close the window . Otherwise, select the Defragment option corresponding to the disk volumes that need defragmenting and click Run to initiate defragmentation. Note The Disk Defragmenter will need 15% of free space on the defragmented volume in order t[...]
-
Page 117
Defragmenting W ait for the disk defragmenting to complete. Y ou can cancel disk defragmentation at any time by clicking Abort . Step 3/3 - View Defragmentation R eport A fter the disk defragmentation is completed, a new window will appear where you can see the defragmentation statistics. Wizar ds 91 BitDefender T otal Security 2010[...]
-
Page 118
Defragmentation R eport Click Close to close the window . 11.5.2. PC Cleanup Wizar d This wizard removes unnecessary files from the disk, including temporary Internet files and cookies, unused system files and recent documents shortcuts. Step 1/3 - Initiate Deletion Here you can start deleting the temporary Internet files and cookies. Wizar ds 92 B[...]
-
Page 119
W elcome Window Click Next . Step 2/3 - Deleting F iles... The cleaner will start deleting the temporary Internet files and cookies. Wizar ds 93 BitDefender T otal Security 2010[...]
-
Page 120
Deleting F iles... W ait for the Cleaner to delete the temporary Internet files and the cookies. If you want to cancel the operation, just click Cancel . Step 3/3 - View R esults Summary A fter the cleaner has deleted all files, a new window will appear where you can view the results summary . Wizar ds 94 BitDefender T otal Security 2010[...]
-
Page 121
R esults Summary Y ou can see statistics regarding the deleted objects. Click Close to close the window . 11.5.3. Duplicate F inder W izar d This wizard helps you find and delete files that are duplicated in your system. Step 1/4 - Select Search T arget Here you can specify where to search for duplicates. Wizar ds 95 BitDefender T otal Security 201[...]
-
Page 122
Search T ar get Click Add T arget and select a location where the Duplicate F inder should search for duplicate files. The path to the selected location will appear in the Path column. If you change your mind about the location, just click the Remove button next to it. Note Y ou can select one or several locations. Click Next . Step 2/4 - Searching[...]
-
Page 123
Searching... Y ou can see the search status and statistics. W ait for the Duplicate F inder to complete the search for duplicate files. If you want to cancel the operation, just click Cancel . Step 3/4 - Select Action A fter the sear ch is completed, a new window will appear where you can specify what actions to be taken on the duplicate files dete[...]
-
Page 124
Actions The duplicate files detected are or ganized and displayed as groups. If you click next to a gr oup, you can see detailed information about the duplicate files (full path, size, creation and modification date). Y ou can choose an overall action to be taken on all the duplicate files detected or you can choose actions to be tak en on groups o[...]
-
Page 125
choose to take no action on a particular gr oup, then the overall action will apply to all except that particular gr oup. Click Next . Step 4/4 - View R esults Summary Here you can view the results of the Duplicate F inder scanning. R esults Summary Click Run again to initiate a new sear ch for duplicate files or OK to close the window . 11.5.4. R [...]
-
Page 126
Status Y ou can see when the R egistry Cleaner was run last and the BitDefender recommendation. Click Next . Step 2/4 - Scanning... The R egistry Cleaner will start scanning the Windows Registry . Wizar ds 100 BitDefender T otal Security 2010[...]
-
Page 127
Scanning... Y ou can see the last registry k ey scanned and the related statistics. W ait for the R egistry Cleaner to complete the r egistry k ey scan. If you want to cancel the operation, just click Cancel . Note If you want to stop the scan, just click Stop . Y ou will skip the next step. Step 3/4 - Select Action A fter the registry k eys scan i[...]
-
Page 128
Actions Y ou can see all the invalid or orphan registry k eys detected. Detailed information is provided about each registry k ey (name, value, priority, category). The registry keys are grouped based on their location in the Windows R egistry : Description Category R egistry keys that contain information about the path to applications installed on[...]
-
Page 129
Description Category R egistry keys that contain information on the location of shar ed DLLs (Dynamic Link Libraries). DLLs store Shared DLLs functions that ar e used by installed applications to perform certain tasks. They can be shar ed by multiple applications to reduce memory and disk space requir ements. These registry keys become invalid when[...]
-
Page 130
R esults Summary If you did not choose to delete all the registry keys, a warning text will be displayed. W e recommend you to r eview the respective issues. Click Close to close the window . 11.5.5. R egistry R ecovery Wizar d This wizard helps you r etrieve registry k eys pr eviously deleted fr om the Windows R egistry using BitDefender R egistry[...]
-
Page 131
Status Y ou can see a list of time points when the Windows R egistry was cleaned. Select the time point to restor e the Windows Registry to. If you ar e sure that you want to recover the r egistry k eys deleted at the selected time point, click Next . W ar ning The recovery of the cleaned r egistry might overwrite the registry keys edited since the[...]
-
Page 132
R esults Click Close to close the window . 11.5.6. F ile Shredder Wizar d This wizard helps you per manently erase files and their traces fr om your system. Use F ile Shr edder to make sur e that the files you delete from your computer can never be recover ed. Step 1/3 - Select T arget Here you can specify the files or folders to be permanently rem[...]
-
Page 133
T ar get Click Add T arget , select the file or folder that you want to delete and click OK . The path to the selected location will appear in the Path column. If you change your mind about the location, just click the Remove button next to it. Note Y ou can select one or several locations. Click Next . Step 2/3 - Deleting F iles... BitDefender wil[...]
-
Page 134
Deleting... W ait for the file shr edding operation to complete. If you want to cancel the operation, just click Cancel . Step 3/3 - View R esults Summary A fter all files have been removed, a new window will appear where you can view the results. Wizar ds 108 BitDefender T otal Security 2010[...]
-
Page 135
R esults Summary Click Close to close the window . 11.6. F ile V ault W izards The F ile V ault wizards help you create and manage BitDefender file vaults. A file vault is an encrypted storage space on your computer wher e you can securely store important files, documents and even entire folders. These wizards do not appear when you fix issues, bec[...]
-
Page 136
11.6.1. Add F iles to V ault This wizar d helps you create a file vault and add files to it in order to safely store them on your computer . Step 1/6 - Select T arget Here you can specify the files or folders to be added to vault. T ar get Click Add T arget , select the file or folder that you want to add and click OK . The path to the selected loc[...]
-
Page 137
Select V ault If you select Browse for a File V ault , you must click Browse and select the file vault. Y ou will go either to the step 5 if the selected vault is opened (mounted ) or to the step 4 if it is locked (unmounted). If you click Select an existing File V ault , then you must click the desir ed vault name. Y ou will go either to the step [...]
-
Page 138
Create V ault T o complete the file vault related information follow these steps: 1. Click Browse and choose a location for the bvd file. Note R emember that the file vault is an encrypted file on your computer with the bvd extension. 2. Select a drive letter for the new file vault from the corr esponding dr op-down menu. Note R emember that when y[...]
-
Page 139
Y ou will go to the step 5. Step 4/6 - P assword This is where you will be ask ed to enter the password for the selected vault. Enter password T ype the password into the corr esponding field and click Next . Step 5/6 - Summary This is where you can review chosen operations. Wizar ds 113 BitDefender T otal Security 2010[...]
-
Page 140
Summary Click Next . Step 6/6 - R esults This is where you can view the vault content. Wizar ds 114 BitDefender T otal Security 2010[...]
-
Page 141
R esults Click Finish . 11.6.2. R emove V ault F iles This wizard helps you remove files from a specific file vault. Step 1/5 - Select V ault Here you can specify the vault to remove files from. Wizar ds 115 BitDefender T otal Security 2010[...]
-
Page 142
Select V ault If you select Browse for a File V ault , you must click Browse and select the file vault. Y ou will go either to the step 3 if the selected vault is opened (mounted ) or to the step 2 if it is locked (unmounted). If you click Select an existing File V ault , then you must click the desir ed vault name. Y ou will go either to the step [...]
-
Page 143
Enter password T ype the password into the corr esponding field and click Next . Step 3/5 - Select files This is where you will be pr ovided with the list of the files from the previously selected vault. Wizar ds 117 BitDefender T otal Security 2010[...]
-
Page 144
Select files Select the files to be removed and click Next . Step 4/5 - Summary This is where you can review chosen operations. Wizar ds 118 BitDefender T otal Security 2010[...]
-
Page 145
Summary Click Next . Step 5/5 - R esults This is where you can view operation result. Wizar ds 119 BitDefender T otal Security 2010[...]
-
Page 146
R esults Click Finish . 11.6.3. View F ile V ault This wizard helps you open a specific file vault and view the files it contains. Step 1/4 - Select V ault Here you can specify the vault to view files from. Wizar ds 120 BitDefender T otal Security 2010[...]
-
Page 147
Select V ault If you select Browse for a File V ault , you must click Browse and select the file vault. Y ou will go either to the step 3 if the selected vault is opened (mounted ) or to the step 2 if it is locked (unmounted). If you click Select an existing File V ault , then you must click the desir ed vault name. Y ou will go either to the step [...]
-
Page 148
Enter password T ype the password into the corr esponding field and click Next . Step 3/4 - Summary This is where you can review chosen operations. Wizar ds 122 BitDefender T otal Security 2010[...]
-
Page 149
Summary Click Next . Step 4/4 - R esults This is where you can view the files of the vault. Wizar ds 123 BitDefender T otal Security 2010[...]
-
Page 150
R esults Click Finish . 11.6.4. Lock F ile V ault This wizard helps you lock a specific file vault in order to protect its content. Step 1/3 - Select V ault Here you can specify the vault to lock. Wizar ds 124 BitDefender T otal Security 2010[...]
-
Page 151
Select V ault If you select Browse for a File V ault , you must click Browse and select the file vault. If you click Select an existing File V ault , then you must click the desir ed vault name. Click Next . Step 2/3 - Summary This is where you can review chosen operations. Wizar ds 125 BitDefender T otal Security 2010[...]
-
Page 152
Summary Click Next . Step 3/3 - R esults This is where you can view operation result. Wizar ds 126 BitDefender T otal Security 2010[...]
-
Page 153
R esults Click Finish . Wizar ds 127 BitDefender T otal Security 2010[...]
-
Page 154
Inter mediate Mode 128 BitDefender T otal Security 2010[...]
-
Page 155
12. Dashboard The Dashboard tab pr ovides infor mation r egarding the security status of your computer and allows you to fix pending issues. Dashboard The dashboard consists of the following sections: ⚫ Overall Status - Indicates the number of issues affecting your computer and helps you fix them. If ther e ar e any pending issues, you will see a[...]
-
Page 156
Click the name of a module to see more details about its status and to configure status tracking for its components. ⚫ Usage Profile - Indicates the usage pr ofile that is currently selected and offers a link to a relevant task for that profile: ▸ When the T ypical profile is selected, the Scan Now button allows you to perform a System Scan usi[...]
-
Page 157
13. Security BitDefender comes with a Security module that helps you keep your BitDefender up to date and your computer virus free. T o enter the Security module, click the Security tab. Security The Security module consists of two sections: ⚫ Status Area - Displays the current status of all monitor ed security components and allows you to choose[...]
-
Page 158
Red circle with an exclamation mark: Issues affect the component. The sentences describing issues ar e written in red. Just click the Fix button corr esponding to a sentence to fix the reported issue. If an issue is not fix ed on the spot, follow the wizard to fix it. 13.1.1. Configuring Status T racking T o select the components BitDefender should[...]
-
Page 159
Description Issue The malware signatur es of your BitDefender pr oduct are not being automatically updated on a r egular basis. Automatic Update is disabled The malware signatur es of your BitDefender pr oduct are outdated. The update has not been performed for x da ys ⚫ Firewall - BitDefender monitors the status of the F irewall feature. If it i[...]
-
Page 160
Description Status A new version of the Application is available but not installed. Application (outdated) A user password is easy to crack by malicious people with specialized softwar e. User (W eak Password) 13.2. Quick T asks This is where you can find links to the most important security tasks: ⚫ Update Now - starts an immediate update. ⚫ S[...]
-
Page 161
Updating BitDefender In this window you can see the status of the update process. The update pr ocess is perfor med on the fly, meaning that the files to be updated are r eplaced pr ogressively . In this way, the update process will not affect product operation and, at the same time, all vulnerabilities will be e xcluded. If you want to close this [...]
-
Page 162
Description T ask Scans the entire system, except for ar chives. In the default configuration, it scans for all types of malware other than rootkits . System Scan Use this task to scan important curr ent user folders: My Documents , Desktop and StartUp . This will My Documents Scan ensure the safety of your documents, a safe workspace and clean app[...]
-
Page 163
T o configure P arental Control, click Configure Parental . A new window will appear . Configure BitDefender P arental Control Here you can see the status of P ar ental Contr ol for each Windows user account and you can configure the P arental Control rules. This configuration window is similar to the P arental Control tab in Expert Mode. For more [...]
-
Page 164
14. T une-Up BitDefender comes with a T une-Up module that helps you maintain the integrity of your system. The maintenance tools offer ed are critical for the impr ovement of your system's responsiveness and the efficient management of the hard drive space. T o perfor m maintenance operations on your PC, click the T une-Up tab and use the too[...]
-
Page 165
The sentences describing issues are written in red. Just click the Run Now button corr esponding to a sentence and follow the wizard to fix the reported issue. 14.1.1. Configuring Status T racking Click Configure Status T racking and select the Enable alerts check box corr esponding to the tune-up tools you want BitDefender to monitor . The status [...]
-
Page 166
14.2.1. Cleaning Windows R egistry The Windows Registry is an important part of the Windows-based operating systems. It is a database that contains information and settings for the hardwar e and the operating system, installed applications, users, preferences of your computer and others. Many applications write keys in the Windows Registry at insta[...]
-
Page 167
T o detect and delete duplicate files on your computer, you can use the Duplicate F inder . In this way you can impr ove the management of the fr ee space on your har d drives. T o find duplicate files on your computer, follow these steps: 1. Click Find Duplicates . 2. F ollow the four -step guided pr ocedur e. For more information, please refer to[...]
-
Page 168
T o prevent sensitive data from being recover ed af ter you delete it, you can use BitDefender to permanently delete that data by physically removing it from your hard disk. T o permanently remove files, follow these steps: 1. Click Shred Files . 2. F ollow the three-step guided pr ocedur e. For more information, please r efer to “ File Shredder [...]
-
Page 169
15. F ile Storage BitDefender comes with a F ile Storage module that helps you keep your data not only safe, but confidential. T o achieve this goal, backup your files and use file encryption. Backup. The antivirus pr otection alone is no longer sufficient for protecting your valuable data. Imagine that your system is virus free but somehow the com[...]
-
Page 170
F ile Storage The F ile Storage module consists of two sections: ⚫ Status Area - Allows you to see the full list of monitored components. Y ou can choose which of the components to be monitor ed. It is recommended to enable the monitoring option for all of them. ⚫ Quick T asks - This is where you can find links to the most important security ta[...]
-
Page 171
The status area in the F ile Storage tab offers information regar ding the status of the following components: ⚫ File Encryption monitors the status of the F ile V ault. If it is not enabled, the issue File Encryption is disabled will be reported. ⚫ Local Backup monitors the status of the Local Backup feature. If a backup of your data is overdu[...]
-
Page 172
16. Network The Network module allows you to manage the BitDefender products installed on your home computers fr om a single computer . T o enter the Network module, click the Network tab. Network T o be able to manage the BitDefender products installed on your home computers, you must follow these steps: 1. Join the BitDefender home network on you[...]
-
Page 173
⚫ Scan All - allows you to scan all managed computers at the same time. ⚫ Update All allows you to update all managed computers at the same time. ⚫ Register All allows you to register all managed computers at the same time. 16.1.1. Joining the BitDefender Network T o join the BitDefender home network, follow these steps: 1. Click Enable Netwo[...]
-
Page 174
2. T ype the home management password and click OK . A new window will appear . Add Computer Y ou can see the list of computers in the network. The icon meaning is as follows: ⚫ Indicates an online computer with no BitDefender products installed. ⚫ Indicates an online computer with BitDefender installed. ⚫ Indicates an offline computer with B[...]
-
Page 175
Authenticate 5. T ype the home management password configured on the respective computer . 6. Click OK . If you have pr ovided the cor rect password, the selected computer name will appear in the network map. Note Y ou can add up to five computers to the network map. 16.1.3. Managing the BitDefender Network Once you have successfully cr eated a Bit[...]
-
Page 176
Network Map If you move the mouse cursor over a computer from the network map, you can see brief information about it (name, IP address, number of issues affecting the system security, BitDefender registration status). If you right-click a computer name in the network map, you can see all the administrative tasks you can run on the remote computer [...]
-
Page 177
Allows you to fix the issues that are affecting the security of this computer by following the F ix All Issues wizard. ⚫ View History/Events Allows you access to the History&Events module of the BitDefender pr oduct installed on this computer . ⚫ Update Now Intitiates the Update pr ocess for the BitDefender product installed on this compute[...]
-
Page 178
16.1.4. Scanning All Computers T o scan all managed computers, follow these steps: 1. Click Scan All . Y ou will be pr ompted to provide the local home management password. Enter P assword 2. Select a scan type. ⚫ System Scan - starts a full scan of your computer (archives ex cluded). ⚫ Deep System Scan - starts a full scan of your computer (ar[...]
-
Page 179
Enter P assword 2. Click OK . 16.1.6. R egistering All Computers T o register all managed computers, follow these steps: 1. Click Register All . Y ou will be prompted to pr ovide the local home management password. Enter P assword 2. Enter the key you want to register with. R egister All 3. Click OK . Network 153 BitDefender T otal Security 2010[...]
-
Page 180
Expert Mode 154 BitDefender T otal Security 2010[...]
-
Page 181
17. General The General module provides information on the BitDefender activity and the system. Here you can also change the overall behavior of BitDefender . 17.1. Dashboar d T o see if any issues affect your computer, as well as product activity statistics and your registration status, go to General>Dashboard in Expert Mode. Dashboard The dash[...]
-
Page 182
⚫ Network Activity - Indicates the evolution of the network traffic filter ed by BitDefender F ir ewall. The height of the bar indicates the intensity of the traffic during that time interval. 17.1.1. Overall Status This is wher e you can find out the number of issues that ar e affecting the security of your computer . T o remove all thr eats, cl[...]
-
Page 183
Description Issue An on demand system scan was never perfor med to check if files stor ed on your computer ar e malware free. Y ou have never scanned your computer for malware A full system scan was started but not completed. The last system scan you started was aborted before it finished R eal-time protection is disabled and a system scan is overd[...]
-
Page 184
Description Status BitDefender does not check for potential vulnerabilities regar ding missing Windows updates, application updates or weak passwords. V ulnerability Check is disabled BitDefender found missing W indows/application updates and/or weak passwords. Multiple vulnerabilities were detected Critical Micr osof t updates ar e available but n[...]
-
Page 185
17.1.2. Statistics If you want to k eep an eye on the BitDefender activity, a good place to start is the Statistics section. Y ou can see the following items: Description Item Indicates the number of files that were check ed for malware at the time of your last scan. Scanned files Indicates the number of files that wer e disinfected at the time of [...]
-
Page 186
Description Item Indicates the number of days lef t until the license key expir es. If your license k ey e xpir es within the following Expires in days, please r egister the product with a new license k ey . T o purchase a license k ey or to renew your license, click the Buy/Renew link, located at the bottom of the window . 17.2. Settings T o confi[...]
-
Page 187
Note If you are not the only person with administrative rights using this computer, it is recommended that you protect your BitDefender settings with a password. If you select this option, the following window will appear: Enter password T ype the password in the Password field, re-type it in the Retype password field and click OK . Once you have s[...]
-
Page 188
⚫ Scan Activity Bar Show the Scan Activity bar (on screen graph of product activity) - displays the Scan Activity bar whenever you log on to Windows. Clear this check box if you do not want the Scan Activity bar to be displayed anymore. Note This option can be configured only for the curr ent Windows user account. The Scan activity bar is only av[...]
-
Page 189
System Information The list contains all the items loaded when starting the system as well as the items loaded by different applications. Three buttons are available: ⚫ Restore - changes a cur r ent file association to default. A vailable for the File Associations settings only! ⚫ Go to - opens a window where the selected item is placed (the Re[...]
-
Page 190
18. Antivirus BitDefender pr otects your computer from all kinds of malware (viruses, T rojans, spyware, rootkits and so on). The pr otection BitDefender offers is divided into two categories: ⚫ R eal-time protection - prevents new malware threats from entering your system. BitDefender will, for example, scan a word document for known thr eats wh[...]
-
Page 191
R eal-time Protection Y ou can see whether Real-time protection is enabled or disabled. If you want to change the Real-time protection status, clear or select the cor responding check bo x. Important T o prevent viruses from infecting your computer keep Real-time protection enabled. T o start a system scan, click Scan Now . 18.1.1. Configuring Pr o[...]
-
Page 192
Description Pr otection level Only pr ograms and incoming mail messages ar e scanned for viruses. Besides the classical signature-based scan, the heuristic analysis is also used. The actions taken on infected files ar e the following: disinfect file/move file to quarantine. Offers standard security . The resour ce consumption level is low . Default[...]
-
Page 193
Shield Settings The scan options are or ganized as an expandable menu, very similar to those used for exploration in W indows. Click the bo x with "+" to open an option or the box with "-" to close an option. Note Y ou can observe that some scan options, although the "+" sign appears, cannot be opened. The reason is th[...]
-
Page 194
Description Option .doc ; .dot ; .xls ; .ppt ; .wbk ; .wiz ; .pot ; .ppa ; .xla ; .xlt ; .vbs ; .vbe ; .mdb ; .rtf ; .htm ; .hta ; .html ; .xml ; .xtp ; .php ; .asp ; .js ; .shs ; .chm ; .lnk ; .pif ; .prc ; .url ; .smm ; .pdf ; .msi ; .ini ; .csc ; .cmd ; .bas ; .eml and .nws . Only the files with the extensions specified by the user will be scann[...]
-
Page 195
Description Option Moves infected files into the quarantine. Quarantined files cannot be e xecuted or Move file to quarantine opened; therefore, the risk of getting infected disappears. Select from the drop-down menu the second action to tak e on infected files, in case the first action fails. Second action In case an infected file is detected, the[...]
-
Page 196
Description Option Scans all incoming e-mail messages. Scan incoming e-mail Scans all outgoing e-mail messages. Scan outgoing e-mail ⚫ Scan web (HTTP) traffic - scans the http traffic. ⚫ Show warning when a virus is found - opens an alert window when a virus is found in a file or in an e-mail message. F or an infected file the alert window will[...]
-
Page 197
BitDefender A VC Alert If you know and trust the detected application, click Allow . If you want to immediately close the application, click OK . Select the Rememeber this action for this application check bo x befor e making your choice and BitDefender will tak e the same action for the detected application in the future. The rule that is thus cr [...]
-
Page 198
Important K eep the A ctive V irus Control enabled in order to be pr otected against unknown viruses. If you want to be alerted and prompted for action by Active Virus Contr ol whenever an application tries to perfor m a possible malicious action, select the Ask me before taking an action check box. Configuring the Pr otection Level The A VC pr ote[...]
-
Page 199
⚫ Remove - remove an application from the list. ⚫ Edit - edit an application rule. 18.1.4. Disabling R eal-time Pr otection If you want to disable real-time protection, a warning window will appear . Disable R eal-time Pr otection Y ou must confir m your choice by selecting from the menu how long you want the real-time pr otection to be disable[...]
-
Page 200
Antiphishing White List Y ou can see the web sites that BitDefender does not currently check for phishing content. T o add a new web site to the white list, type its url address in the New address field and click Add . The white list should contain only web sites you fully trust. For example, add the web sites where you curr ently shop online. Note[...]
-
Page 201
There is a risk that a virus is already lodged in your system, before you even install BitDefender . This is why it's a very good idea to scan your computer for resident viruses after you've installed BitDefender . And it's definitely a good idea to frequently scan your computer for viruses. T o configur e and initiate on-demand scan[...]
-
Page 202
There are three categories of scan tasks: ⚫ System tasks - contains the list of default system tasks. The following tasks are available: Description Default T ask Scans the entir e system. In the default configuration, it scans for all types of malware threatening your Deep System Scan system's security, such as viruses, spyware, adware, roo[...]
-
Page 203
⚫ Delete - removes the selected task. Note Not available for system tasks. Y ou cannot remove a system task. ⚫ Scan Now - runs the selected task, initiating an immediate scan . T o the left of each task you can see the Properties button, that allows you to configure the task and view the scan logs. 18.2.2. Using Shortcut Menu A shortcut menu is[...]
-
Page 204
Note In the case of system tasks, this option is replaced by Show Scan Paths , as you can only see their scan target. ⚫ Schedule - opens the Properties window, Scheduler tab, where you can schedule the selected task. ⚫ View Logs - opens the Properties window, L ogs tab, wher e you can see the reports generated after the selected task was run. ?[...]
-
Page 205
Overview Here you can see information about the task (name, last run and schedule status) and set the scan settings. Choosing Scan Level Y ou can easily configur e the scan settings by choosing the scan level. Drag the slider along the scale to set the appropriate scan level. There are 3 scan levels: Description Pr otection level Offers reasonable [...]
-
Page 206
Description Pr otection level All files and archives are scanned for viruses and spywar e. Besides the classical signatur e-based scan, the heuristic analysis is also used. A series of general options for the scanning process are also available: ⚫ Run the task with Low priority. Decr eases the priority of the scan process. Y ou will allow other p[...]
-
Page 207
The scan options are or ganized as an expandable menu, very similar to those used for exploration in W indows. Click the bo x with "+" to open an option or the box with "-" to close an option. The scan options are grouped into 3 categories: ⚫ Scan Level. Specify the type of malware you want BitDefender to scan for by selecting[...]
-
Page 208
Description Option wbk ; wiz ; pot ; ppa ; xla ; xlt ; vbs ; vbe ; mdb ; rtf ; htm ; hta ; html ; xml ; xtp ; php ; asp ; js ; shs ; chm ; lnk ; pif ; prc ; url ; smm ; pdf ; msi ; ini ; csc ; cmd ; bas ; eml and nws . Only the files with the extensions specified by the user will be scanned. These extensions must be separated by ";". Scan[...]
-
Page 209
Description Action No action will be taken on infected files. These files will appear in the report file. T ake No Action R emove the malware code from the infected files detected. Disinfect files Deletes infected files immediately, without any warning. Delete files Moves infected files into the quarantine. Quarantined files cannot be ex ecuted or [...]
-
Page 210
Description Action Moves hidden files into the quarantine. Quarantined files cannot be ex ecuted or opened; therefor e, the risk of getting infected disappears. Move files to Quarantine Note Please note that these hidden files are not the files that you deliberately hide from Windows. They are the files hidden by special programs, known as rootkits[...]
-
Page 211
– Action to take when an encrypted suspect file is found. Select the action to be tak en on suspicious files that are encrypted using Windows. The following options are available: Description Action Only log the suspicious files that are encrypted using Windows. Af ter the scan is completed, you T ake no action can open the scan log to view infor[...]
-
Page 212
Scan T ar get Y ou can see the list of local, network and removable drives as well as the files or folders added previously, if any . All check ed items will be scanned when running the task. The section contains the following buttons: ⚫ Add F older(s) - opens a br owsing window where you can select the file(s) / folder(s) that you want to be sca[...]
-
Page 213
⚫ All Entries - to scan all drives, no matter if they ar e local, in the network or removable. Note If you want to scan your entire computer, select the checkbox corresponding to All Entries . Click OK to save the changes and close the window . T o run the task, just click Scan . Viewing the Scan T ar get of System T asks Y ou can not modif y the[...]
-
Page 214
Scheduling Scan T asks With complex tasks, the scanning process will tak e some time and it will work best if you close all other programs. That is why it is best for you to schedule such tasks when you are not using your computer and it has gone into the idle mode. T o see the schedule of a specific task or to modify it, right-click the task and s[...]
-
Page 215
Click OK to save the changes and close the window . T o run the task, just click Scan . 18.2.5. Scanning F iles and F olders Before you initiate a scanning process, you should mak e sure that BitDefender is up to date with its malware signatures. Scanning your computer using an outdated signature database may prevent BitDefender from detecting new [...]
-
Page 216
Immediate Scanning T o scan your computer or part of it you can run the default scan tasks or your own scan tasks. This is called immediate scanning. T o run a scan task, use one of the following methods: ⚫ double-click the desir ed scan task in the list. ⚫ click the Scan now button corr esponding to the task. ⚫ select the task and then click[...]
-
Page 217
Drag F ile Drop F ile The Antivirus Scan wizard will appear and guide you through the scanning process. Manual Scanning Manual scanning consists in dir ectly selecting the object to be scanned using the BitDefender Manual Scan option from the BitDefender pr ogram gr oup in the Start Menu. Note Manual scanning is very useful, as it can be performed [...]
-
Page 218
Manual Scanning Click Add Folder , select the location you want to scan and click OK . If you want to scan multiple folders, repeat this action for each additional location. The paths to the selected locations will appear in the Scan T arget column. If you change your mind about the location, just click the Remove button next to it. Click the Remov[...]
-
Page 219
Scanning Y ou can see the scan status and statistics (scanning speed, elapsed time, number of scanned / infected / suspicious / hidden objects and other). W ait for BitDefender to finish scanning. Note The scanning process may tak e a while, depending on the complexity of the scan. Password-protected archives. If BitDefender detects a passwor d-pr [...]
-
Page 220
Stopping or pausing the scan. Y ou can stop scanning anytime you want by clicking Stop&Y es . Y ou will go directly to the last step of the wizard. T o temporarily stop the scanning process, just click Pause . Y ou will have to click Resume to r esume scanning. Step 2/3 - Select Actions When the scanning is completed, a new window will appear, [...]
-
Page 221
Description Action R emoves the malwar e code from infected files. Disinfect Deletes detected files. Delete Moves detected files to quarantine. Quarantined files cannot be ex ecuted or opened; therefor e, the risk of getting infected disappears. Move to quarantine Changes the name of hidden files by appending .bd.ren to their name. As a result, you[...]
-
Page 222
Summary Y ou can see the results summary . If you want comprehensive information on the scanning process, click View log to view the scan log. Important If requir ed, please restart your system in order to complete the cleaning process. Click Close to close the window . BitDefender Could Not Solve Some Issues In most cases BitDefender successfully [...]
-
Page 223
18.2.6. Viewing Scan Logs T o see the scan results after a task has run, right-click the task and select Logs . The following window will appear: Scan Logs Here you can see the report files generated each time the task was e xecuted. F or each file you are provided with information on the status of the logged scanning process, the date and time whe[...]
-
Page 224
Scan Log Example The scan log contains detailed infor mation about the logged scanning pr ocess, such as scanning options, the scanning target, the threats found and the actions tak en on these threats. 18.3. Objects Excluded fr om Scanning There are cases when you may need to exclude certain files from scanning. F or example, you may want to exclu[...]
-
Page 225
Note The objects excluded from on-access scanning will not be scanned, no matter if they are accessed by you or by an application. T o see and manage the objects e x cluded fr om scanning, go to Antivirus>Exceptions in Expert Mode. Exceptions Y ou can see the objects (files, folders, extensions) that ar e ex cluded fr om scanning. F or each obje[...]
-
Page 226
type of scanning you want them to be excluded from, as needed. Mak e the necessary changes and click OK . Note Y ou can also right-click an object and use the options on the shortcut menu to edit or delete it. Y ou can click Discard to r evert the changes made to the rule table, provided that you have not saved them by clicking Apply . 18.3.1. Excl[...]
-
Page 227
Step 2/4 - Specify Excluded P aths Excluded P aths T o specify the paths to be e xcluded fr om scanning use either of the following methods: ⚫ Click Browse , select the file or folder that you want to be ex cluded from scanning and then click Add . ⚫ T ype the path that you want to be excluded from scanning in the edit field and click Add . Not[...]
-
Page 228
Step 3/4 - Select Scanning T ype Scanning T ype Y ou can see a table containing the paths to be ex cluded fr om scanning and the type of scanning they are excluded from. By default, the selected paths are ex cluded from both on-access and on-demand scanning. T o change when to apply the e x ception, click on the right column and select the desired [...]
-
Page 229
Step 4/4 - Scan Excluded F iles Scan Excluded F iles It is highly recommended to scan the files in the specified paths to make sure that they ar e not infected. Select the check bo x to scan these files befor e excluding them from scanning. Click Finish . 18.3.2. Excluding Extensions fr om Scanning T o exclude extensions from scanning, click the Ad[...]
-
Page 230
Step 1/4 - Select Object T ype Object T ype Select the option of excluding extensions from scanning. Click Next . Antivirus 204 BitDefender T otal Security 2010[...]
-
Page 231
Step 2/4 - Specify Excluded Extensions Excluded Extensions T o specify the e xtensions to be ex cluded from scanning use either of the following methods: ⚫ Select from the menu the extension that you want to be ex cluded from scanning and then click Add . Note The menu contains a list of all the e xtensions r egistered on your system. When you se[...]
-
Page 232
Step 3/4 - Select Scanning T ype Scanning T ype Y ou can see a table containing the extensions to be excluded from scanning and the type of scanning they are excluded from. By default, the selected extensions are excluded from both on-access and on-demand scanning. T o change when to apply the e x ception, click on the right column and select the d[...]
-
Page 233
Step 4/4 - Select Scanning T ype Scanning T ype It is highly recommended to scan the files having the specified extensions to make sure that they are not infected. Click Finish . 18.4. Quarantine Area BitDefender allows isolating the infected or suspicious files in a secure ar ea, named quarantine. By isolating these files in the quarantine, the ri[...]
-
Page 234
Quarantine The Quarantine section displays all the files currently isolated in the Quarantine folder . F or each quarantined file, you can see its name, the name of the detected virus, the path to its original location and the submission date. Note When a virus is in quarantine it cannot do any harm because it cannot be ex ecuted or read. 18.4.1. M[...]
-
Page 235
18.4.2. Configuring Quarantine Settings T o configure the quarantine settings, click Settings . A new window will appear . Quarantine Settings Using the quarantine settings, you can set BitDefender to automatically perform the following actions: Delete old files. T o automatically delete old quarantined files, check the corr esponding option. Y ou [...]
-
Page 236
Automatically submit files. T o automatically submit quarantined files, check the cor responding option. Y ou must specify the fr equency with which to submit files. Note By default, BitDefender will automatically submit quarantined files every 60 minutes. Scan quarantined files after update. T o automatically scan quarantined files after each upda[...]
-
Page 237
19. Antispam BitDefender Antispam employs remark able technological innovations and industry standard antispam filters to weed out spam befor e it reaches the user's Inbox. 19.1. Antispam Insights Spam is a gr owing pr oblem, both for individuals and for organizations. It's not pretty, you wouldn't want your kids to see it, it can ge[...]
-
Page 238
Image F ilter Since avoiding heuristic filter detection has become quite a challenge, nowadays' inbo x folders are full with more and more messages only containing an image with unsolicited content. T o cope with this growing pr oblem, BitDefender introduced the Image filter that compar es the image signature fr om the e-mail with those fr om [...]
-
Page 239
trace a certain scent. Sometimes the filter must be corrected too - prompted to adjust when it mak es a wrong decision. Important Y ou can correct the Bayesian filter using the Is Spam and Not Spam buttons from the Antispam toolbar . 19.1.2. Antispam Operation The BitDefender Antispam Engine uses all antispam filters combined to deter mine whether [...]
-
Page 240
characteristics of SP AM. The result is that it will add a Spam score to the e-mail, too. Note If the e-mail is tagged as SEXUALL Y EXPLICIT in the subject line, BitDefender will consider it SP AM. The Bayesian filter module will further analyze the message, according to statistical information regar ding the rate at which specific words appear in [...]
-
Page 241
Antispam Status Y ou can see whether Antispam is enabled or disabled. If you want to change the Antispam status, clear or select the corr esponding check box. Important T o prevent spam fr om entering your Inbox , keep the Antispam filter enabled. In the Statistics section you can view the results of the antispam activity pr esented per session (si[...]
-
Page 242
Description Pr otection level Offers pr otection for accounts that r eceive a lot of legitimate commer cial mail. The filter will let most Permissive e-mail pass thr ough, but it may pr oduce false negatives (spam classified as legitimate mail). Offers pr otection for accounts that receive some legitimate commer cial mail. The filter will let most [...]
-
Page 243
F riends List Here you can add or remove entries from the F riends list . If you want to add an e-mail address check the E-mail address option, type in the address and click . The address will appear in the F riends list . Important Syntax: name@domain.com. If you want to add a domain check the Domain name option, type in the domain and click . The[...]
-
Page 244
Y ou can save the F riends list to a file so that you can use it on another computer or after reinstalling the product. T o save the F riends list, click the Save button and save it to the desired location. The file will have a .bwl extension. T o load a previously saved F riends list, click the Load button and open the corr esponding .bwl file. T [...]
-
Page 245
Spammers List Here you can add or remove entries from the Spammers list . If you want to add an e-mail address check the Email address option, type in the address and click . The address will appear in the Spammers list . Important Syntax: name@domain.com. If you want to add a domain check the Domain name option, type in the domain and click . The [...]
-
Page 246
from any r egistered user of such a service will be detected as spam. If, for e xample, you add yahoo.com to the Spammers list, all e-mail messages coming fr om yahoo.com addresses will be mark ed as [spam] . T o delete an item from the list, select it and click the Remove button. T o delete all entries from the list, click the Clear list button an[...]
-
Page 247
Antispam Settings Three categories of options are available ( Antispam settings , Basic Antispam filters and Advanced Antispam filters ) organized lik e an e xpandable menu, similar to those from Windows. Note Click the box labeled "+" to open a category or click the one labeled "-" to close it. T o enable/disable an option sele[...]
-
Page 248
19.3.2. Basic Antispam F ilters ⚫ Enable F riends/Spammers lists - filter e-mail messages using the F riends/Spammers lists . ▸ Automatically add recipients to F riends list - automatically add recipients of sent mail to F riends list. ▸ Automatically add to F riends list - when you click the Not Spam button from the Antispam toolbar , the se[...]
-
Page 249
20. P ar ental Control BitDefender P arental Control enables you to control the access to the Inter net and to specific applications for each user holding a user account on the system. Y ou can configure Par ental Control to block: ⚫ inappropriate web pages. ⚫ Internet access, for specific periods of time (such as when it's time for lesson[...]
-
Page 250
P ar ental Control Y ou can see infor mation regarding the P ar ental Control status for each W indows user account. The age category is listed below each user name if Par ental Control is enabled. If P arental Control is disabled, the status is not configured . Additionally, you can see the status of each P arental Control feature per user: Green [...]
-
Page 251
P ar ental Control Status T o configure the Par ental Control for this user account, follow these steps: 1. Enable the P ar ental Contr ol for this user account by selecting the Parental Control check box. Important K eep the P arental Control enabled in order to protect your childr en against inappropriate content by using your customized computer[...]
-
Page 252
⚫ W eb - to filter web navigation according to the rules set by you in the W eb section. ⚫ Applications - to block access to the applications specified by you in the Applications section. ⚫ Keywords - to filter web, mail and instant messaging access according to the rules set by you in the K eywords section. ⚫ IM - to allow or block chat wi[...]
-
Page 253
T o set the password protection, do the following: 1. T ype the password in the Password field. 2. T ype the password again in the Retype P assword field to confirm it. 3. Click OK to save the password and close the window . Once you set the passwor d, if you want to change the Par ental Control settings, you will be ask ed to pr ovide the passwor [...]
-
Page 254
W eb F ilter Categories Select the check box corresponding to a category you want to block and the user will no longer be allowed to access websites matching that category . T o mak e your selection easier, the categories of web content ar e listed accor ding to the age group for which one could consider them appropriate: ⚫ Child Profile Categori[...]
-
Page 255
⚫ T eenager Profile Categories includes content that may be considered safe for children between 14 and 18 years old. Description Category W ebsites used to mask the URL of a requested website. W eb Proxy Blocker Online magazines. T abloids Online casinos, betting websites, websites offering betting tips, betting forums, etc. Gambling Online shop[...]
-
Page 256
⚫ Send me an activity report via e-mail. An e-mail notification is sent every time BitDefender P arental Control blocks an activity . ⚫ Save an internet traffic log . L ogs the websites visited by users for whom P ar ental Control is enabled. 20.2.1. Checking Visited W ebsites BitDefender logs by default the websites visited by your children. T[...]
-
Page 257
⚫ If the server uses a different port than the default port 25, type it in the corr esponding field. ⚫ Sender's e-mail address - type the address you want to appear in the F rom field of the e-mail. ⚫ Recipient's e-mail address - type the addr ess wher e you want the reports to be e-mailed. ⚫ If the server r equir es authenticatio[...]
-
Page 258
W eb Control T o enable this pr otection select the check box cor responding to Enable W eb Control . 20.3.1. Creating W eb Control R ules T o allow or block access to a website, follow these steps: 1. Click Allow Site or Block Site . A new window will appear: P ar ental Contr ol 232 BitDefender T otal Security 2010[...]
-
Page 259
Specify W ebsite 2. Enter the website address in the Website field. Syntax: ⚫ *.xxx.com - the action of the rule will apply on all web sites finished with .xxx.com ; ⚫ *porn* - the action of the rule will apply on all web sites containing porn in the web site address; ⚫ www.*.com - the action of the rule will apply on all web sites having the[...]
-
Page 260
⚫ Allow all sites, except the ones in the list . Select this option to allow access to all websites except those for which you have set the Block action. ⚫ Block all sites, except the ones in the list . Select this option to block access to all websites except those for which you have set the Allow action. 20.4. W eb T ime Limiter The W eb Time[...]
-
Page 261
can click Block all to select all the cells and, implicitly, to block all the web access. If you click Allow all , the internet connections will be permitted all the time. Important The box es coloured in grey represent the time intervals when all internet connections are block ed. 20.5. Applications Control The Applications Control helps you to bl[...]
-
Page 262
20.5.1. Creating Application Control R ules T o block or restrict access to an application, follow these steps: 1. Click Block Application or Restrict Application . A new window will appear : Specify Application 2. Click Browse to locate the application to which you want to block/r estrict access. 3. Select the action of the rule: ⚫ Block permane[...]
-
Page 263
T o edit a rule, select it, click the Edit button and make the necessary changes in the configuration window . T o delete a rule, select it and click the Delete button. 20.6. K eywords Contr ol K eywor ds Contr ol helps you block users' access to e-mail messages, web pages and instant messages that contain specific words. Using K eywords Contr[...]
-
Page 264
20.6.1. Creating K eywor ds Control R ules T o block a word or phrase, follow these steps: 1. Click Block K eyword . A new window will appear: Specify K eyword 2. T ype the word or phrase you want to block in the edit field. If you want only whole words to be detected, select the Match whole words check box. 3. Select the traffic type BitDefender s[...]
-
Page 265
20.7. Instant Messaging (IM) Contr ol The Instant Messaging (IM) Contr ol allows you to specif y the IM contacts your childr en are allowed to chat with. Note The IM Contr ol is only available for Y ahoo Messenger and Windows Live (MSN) Messenger . T o configur e IM Control for a specific user account, click the Modify button corr esponding to that[...]
-
Page 266
Add IM contact 2. T ype the contact's name in the Name field. 3. T ype the e-mail address or the user name used by the IM contact in the E-mail or IM ID field. 4. Choose the IM program the contact associates with. 5. Select the action for this rule - Block or Allow 6. Click Finish to add the rule. 20.7.2. Managing Instant Messaging (IM) Contr [...]
-
Page 267
21. Privacy Control BitDefender monitors dozens of potential “hotspots” in your system wher e spywar e might act, and also checks any changes made to your system and softwar e. It is effective in blocking T rojan horses and other tools installed by hackers, who try to compromise your privacy and send your personal infor mation, lik e cr edit ca[...]
-
Page 268
⚫ Identity Contr ol - pr otects your confidential data by filtering all outgoing web (HTTP), e-mail (SMTP) and instant messaging traffic according to the rules you create in the Identity section. ⚫ R egistry Contr ol - asks for your permission whenever a program tries to modify a registry entry in order to be ex ecuted at Windows start-up. ⚫ [...]
-
Page 269
Y ou can create rules to protect any piece of information you might consider personal or confidential, from your phone number or e-mail address to your bank account information. Multiuser support is pr ovided so that users logging on to different Windows user accounts can configure and use their own identity protection rules. If your W indows accou[...]
-
Page 270
Identity Control If you want to use Identity Control, follow these steps: 1. Select the Enable Identity Control check box. 2. Create rules to protect your sensitive data. For more infor mation, please refer to “ Creating Identity Rules ” (p. 244) . 3. If needed, define specific exclusions from the rules you have cr eated. F or more information,[...]
-
Page 271
Step 1/4 - W elcome W indow W elcome Window Click Next . Step 2/4 - Set R ule T ype and Data Set R ule T ype and Data Y ou must set the following parameters: Privacy Control 245 BitDefender T otal Security 2010[...]
-
Page 272
⚫ Rule Name - type the name of the rule in this edit field. ⚫ Rule T ype - choose the rule type (address, name, credit card, PIN, SSN etc). ⚫ Rule Data - type the data you want to pr otect in this edit field. For e xample, if you want to protect your credit card number, type all or part of it here. Note If you enter less than three characters[...]
-
Page 273
Y ou can choose to apply the rule only if the rule data matches whole words or if the rule data and the detected string case match. Specify the users for which the rule applies. ⚫ Only for me (current user) - the rule will apply only to your user account. ⚫ Limited user accounts - the rule will apply to you and all limited W indows accounts. ?[...]
-
Page 274
T o open the window where you can manage ex ceptions, click Exclusions . Exclusions T o add an exception, follow these steps: 1. Click the Add button to add a new entry in the table. 2. Double-click Specify excluded item and provide the web site, the e-mail addr ess or the IM contact that you want to add as ex ception. 3. Double-click T raffic type[...]
-
Page 275
Edit R ule Here you can change the name, description and parameters of the rule (type, data and traffic). Click OK to save the changes. 21.2.4. R ules Defined by Other Administrators When you are not the only user with administrative rights on your system, the other administrators can create identity rules of their own. In case you want rules creat[...]
-
Page 276
Registry Control keeps an eye on the Windows R egistry - this is again useful for detecting T rojan horses. It will alert you whenever a program will try to modify a registry entry in order to be ex ecuted at Windows start-up. R egistry Alert Y ou can see the pr ogram that is trying to modify Windows R egistry . If you do not recognize the program [...]
-
Page 277
R egistry Control Y ou can see the rules created so far listed in the table. T o delete a rule, select it and click the Delete button. 21.4. Cookie Control Cookies are a very common occurr ence on the Internet. They are small files stored on your computer . W ebsites create these cookies in order to k eep track of specific information about you. Co[...]
-
Page 278
Cookie Alert Y ou can see the name of the application that is trying to send the cookie file. Click Y es or No and a rule will be created, applied and listed in the rules table. This will help you to choose which websites you trust and which you don't. Note Because of the gr eat number of cookies used on the Internet today, Cookie Control can [...]
-
Page 279
Cookie Control Y ou can see the rules created so far listed in the table. Important The rules are listed in order of their priority starting from the top, meaning the first rule has the highest priority . Drag&drop rules in order to change their priority . T o delete a rule, select it and click the Delete button. T o modify the rule parameters,[...]
-
Page 280
Select Addr ess, Action and Direction Y ou can set the parameters: ⚫ Domain address - type in the domain on which the rule should apply . ⚫ Action - select the action of the rule. Description Action The cookies on that domain will ex ecute. Allow The cookies on that domain will not execute. Deny ⚫ Direction - select the traffic direction. Des[...]
-
Page 281
21.5. Script Control Scripts and other codes such as ActiveX controls and Java applets , which ar e used to create interactive web pages, can be programmed to have harmful effects. ActiveX elements, for example, can gain total access to your data and they can read data from your computer, delete information, capture passwords and inter cept message[...]
-
Page 282
Script Control Y ou can see the rules created so far listed in the table. Important The rules are listed in order of their priority starting from the top, meaning the first rule has the highest priority . Drag&drop rules in order to change their priority . T o delete a rule, select it and click the Delete button. T o modify the rule parameters,[...]
-
Page 283
Select Addr ess and Action Y ou can set the parameters: ⚫ Domain address - type in the domain on which the rule should apply . ⚫ Action - select the action of the rule. Description Action The scripts on that domain will ex ecute. Allow The scripts on that domain will not execute. Deny Click Finish . Privacy Control 257 BitDefender T otal Securi[...]
-
Page 284
22. F irewall The F irewall pr otects your computer fr om inbound and outbound unauthorized connection attempts. It is quite similar to a guard at your gate - it will k eep a watchful eye on your Internet connection and k eep track of who to allow access to the Internet and who to block. Note A firewall is essential if you have a broadband or DSL c[...]
-
Page 285
Y ou can see whether the BitDefender firewall is enabled or disabled. If you want to change the firewall status, clear or select the corresponding check box. Important T o be protected against Inter net attacks keep the Firewall enabled. There are two categories of infor mation: ⚫ Network Configuration Brief . Y ou can see your computer's na[...]
-
Page 286
Description Default action Applies the curr ent rules and allows all traffic attempts that do not match any of the curr ent rules without Allow All prompting. This policy is strongly discouraged, but it might be useful for network administrators and gamers. Applies the cur rent rules and allows all outgoing connection attempts from programs which a[...]
-
Page 287
Note This option does not automatically enable ICS on your system, but only allows this type of connection in case you enable it from your operating system. Internet Connection Sharing (ICS) enables members of local ar ea networks to connect to the Inter net through your computer . This is useful when you benefit from a special/particular Inter net[...]
-
Page 288
⚫ Enable Intrusion Detection (IDS) - activates the heuristic monitoring of the applications trying to access network services or the Internet. 22.2. Network T o configure the firewall settings, go to Firewall>Network in Expert Mode. Network The columns in the Network Configuration table provide detailed information on the network you are conne[...]
-
Page 289
22.2.1. Changing the T rust Level BitDefender assigns each network adapter a trust level. The trust level assigned to the adapter indicates how trustworthy the respective network is. Based on the trust level, specific rules ar e cr eated for the adapter r egarding how the system and BitDefender processes access the network and the Internet. Y ou ca[...]
-
Page 290
Description Stealth option Y our computer cannot be detected from the Internet. Local network users can ping and detect your computer . Remote 22.2.3. Configuring Generic Settings If the IP address of a network adapter is changed, BitDefender modifies the trust level accordingly . If you want to k eep the same trust level, click the ar row from the[...]
-
Page 291
2. Select the action: ⚫ Allow - to allow all traffic between your computer and the selected computer . ⚫ Deny - to block all traffic between your computer and the selected computer . 3. Click OK . 22.3. R ules T o manage the fir ewall rules contr olling applications' access to network r esources and Internet, go to Firewall>Rules in Exp[...]
-
Page 292
through any adapter . Y ou can manually create rules or edit existing rules to filter an application's network or Inter net access thr ough a specific adapter (for example, a wireless network adapter). ⚫ Command Line - the command used to start the process in the Windows command line interface ( cmd ). ⚫ Protocol - the IP protocol the rule[...]
-
Page 293
⚫ Action - whether the application is allowed or denied access to network or Internet under the specified circumstances. 22.3.1. Adding R ules Automatically With Firewall enabled, BitDefender will ask for your permission whenever a connection to the Internet has been made: F ir ewall Alert Y ou can see the following: the application that is tryin[...]
-
Page 294
3. Click OK to add the new rule. Modifying rules. T o modify an existing rule, follow these steps: 1. Click the Edit rule button or double-click the rule. The configuration window will appear . 2. Configure the main and the advanced parameters as needed. 3. Click OK to save the changes. Configuring Main P arameters The Main tab of the configuration[...]
-
Page 295
▸ If you want the rule to apply to UDP, select UDP . ▸ If you want the rule to apply to a specific pr otocol, select Other . An edit field will appear . T ype the number assigned to the pr otocol you want to filter in the edit field. Note IP protocol numbers are assigned by the Internet Assigned Numbers Authority (IANA). Y ou can find the compl[...]
-
Page 296
Advanced P arameters Y ou can configure the following advanced parameters: ⚫ Direction. Select from the menu the traffic direction the rule applies to. Description Direction The rule applies only for the outgoing traffic. Outbound The rule applies only for the incoming traffic. Inbound The rule applies in both directions. Both ⚫ IP version. Sel[...]
-
Page 297
▸ T o filter traffic between your computer and a specific computer, clear the Any check bo x and type its IP addr ess. ▸ If you have selected T CP or UDP as protocol you can set a specific port or a range between 0 and 65535. If you want the rule to apply to all ports, select Any . ⚫ Apply this rule only to directly connected computers. Selec[...]
-
Page 298
Note When a connection attempt is made (whether incoming or outgoing), BitDefender applies the action of the first rule matching the r espective connection. Therefore, the order by which rules are check ed is very important. T o delete a rule, select it and click the Delete rule button. T o edit an existing rule, select it and click the Edit rule b[...]
-
Page 299
Y ou can see the total traffic sorted by application. F or each application, you can see the connections and the open ports, as well as statistics r egar ding the outgoing & incoming traffic speed and the total amount of data sent / received. If you want to see the inactive processes too, clear the Hide inactive processes check bo x. The meanin[...]
-
Page 300
23. V ulnerability An important step in protecting your computer against malicious persons and applications is to k eep up to date the operating system and the applications you regularly use. Moreover, to pr event unauthorized physical access to your computer, strong passwor ds (passwords that cannot be easily guessed) must be configured for each W[...]
-
Page 301
Important T o be automatically notified about system or application vulnerabilities, k eep the Automatic V ulnerability Checking enabled. 23.1.1. F ixing V ulnerabilities Depending on the issue, to fix a specific vulnerability proceed as follows: ⚫ If Windows updates ar e available, click Install in the Action column to install them. ⚫ If an ap[...]
-
Page 302
Automatic V ulnerability Checking Settings Select the check bo xes corr esponding to the system vulnerabilities you want to be regularly check ed. ⚫ Critical Windows Updates ⚫ Regular Windows Updates ⚫ Application Updates ⚫ W eak P asswords Note If you clear the check box corr esponding to a specific vulnerability, BitDefender will no longe[...]
-
Page 303
24. Back up BitDefender comes with a Backup module that helps you make r eserve copies of any valuable data on your system. Y ou can backup your data on your computer, removable disks or a network location to make sure you can restore them when necessary . The r estoration of your data is an easy process. T o backup your data, go to Backup in Exper[...]
-
Page 304
⚫ Settings - opens BitDefender Backup, which allows you to set up and ex ecute back up operations in detail . 24.1. Back up Settings If you need to perform more complex backup and r estore operations, you can use the fully-featur ed BitDefender Back up solution. BitDefender Backup offers: ⚫ a variety of backup options, such as compression, encr[...]
-
Page 305
There ar e two ways you can set up and ex ecute back up operations. Y ou either access the upper Menu Bar or click a certain tab from the Navigator Bar . The Navigator Bar , displayed at the top of the main window and under the Menu Bar , gives access to four sections: ⚫ Get Started ⚫ Job Manager ⚫ Log Viewer ⚫ T oolbox 24.1.1. Get Started [...]
-
Page 306
T o backup your emails only, click the Backup My Emails button and follow the three step procedur e. T o back up your chat recor ds only, click the Backup My Chat Records button and follow the three step procedur e. Note The three step procedur e is described in the “ Create New Job ” (p. 281) section. 24.1.2. Job Manager Job Manager is used to[...]
-
Page 307
On the left, you will see a list of quick operation links, as follows: Job Management ⚫ Create New Job ⚫ Backup Job ⚫ Scheduled Job ⚫ Delete Job Schedule ⚫ Modify Job Options ⚫ Modify Job Properties Job Restoration ⚫ Restore File ⚫ Restore Time-Point Data Job Control ⚫ P ause Job ⚫ Stop Job ⚫ Stop All Cr eate New Job T o back [...]
-
Page 308
2. T ype a name for your backup job or accept the default job name. Default job name is automatically generated when files or directories are selected to be back ed up, but it can be modified. 3. Click Browse to choose where to save your backup job. Note Do not forget to click Backup to begin or Cancel to stop. T o refine your settings, click Optio[...]
-
Page 309
Incremental and F ull Backup can also combine into a Rotation Backup . F or example, you can set an Incr emental Back up of the job while setting a F ull Back up once a week, let's say on Sunday . This is how it is done: Select W eekly from the drop-down menu, 1 fr om the Every week field and check Sunday . This Sunday F ull Back up will r epl[...]
-
Page 310
T o encrypt data before backup, follow these steps: 1. Click Encryption . 2. Choose an encryption type from the dr op-down menu. 3. T ype your password into the corresponding field. 4. R etype your password into the corresponding field. 5. Click OK . External Program The job can run other command before or after backup, and the command can be .exe [...]
-
Page 311
1. Click File Filter . 2. Click Filter File . 3. Exclude or include specific files in the pop-up dialog box by checking the Include only the rule-specified files or Exclude the rule-specified files options. 4. Click Browse and select the file. The path to the file location will be automatically added in the Applied to the following directories fiel[...]
-
Page 312
Note T o avoid being overwhelmed by information on network errors, click No error report is generated when network is not available . Split Backup Set The generated back up set can be split into several other backup sets, so that back up can be e x ecuted nor mally even when the destination or file system is limited. BitDefender Back up pr ovides t[...]
-
Page 313
Schedule Job This is wher e you can schedule the backup job at a convenient time. Y ou can schedule job to be ex ecuted daily, weekly, monthly or at any specified time (for example at system startup). Schedule Job is the basis of automated backup. Schedule Job If your computer is a member of a domain network, a series of extra steps are necessary t[...]
-
Page 314
▸ Delete the task if it is not scheduled to run again. This task is useful for tasks scheduled to run only once. ▸ Stop the task if it runs for: Specify how long after the task has begun it should be stopped. ⚫ Idle Time ▸ Only start the task if the computer has been idle for at least: Specify how long (in minutes) must pass without mouse o[...]
-
Page 315
Modify Job Options The selected job can be either a backup job or a burn job. F or mor e information on how to modify backup jobs, please refer to “ Backup Options Dialog Box ” (p. 282) . Let's take a look at how burn job options can be modified. Modify Options of Burn Job Several sub-options are available in the burn job dialog box. Burn [...]
-
Page 316
2. The Running User dialog bo x will appear . If you are the domain user, please enter the domain password. 3. Otherwise select Run as the following Windows user . 4. T ype the user name, passwor d and the domain server name. 5. Click OK . Once you set the running user, BitDefender Backup will display the Schedule dialog box so that you can set a c[...]
-
Page 317
Specify whether the task should be stopped when your computer starts running on batteries. ▸ W ak e the computer to run this task. Specify whether the computer should run the scheduled task even when in the Sleep mode. External Program The job can run other command before or after backup, and the command can be .exe , .com or .bat , or a specific[...]
-
Page 318
2. Click Filter File . 3. Exclude or include specific files in the pop-up dialog box by checking the Include only the rule-specified files or Exclude the rule-specified files options. 4. Click Browse and select the file. The path to the file location will be automatically added in the Applied to the following directories field. T o include or exclu[...]
-
Page 319
Modify Job Properties 1. Click the check box to select partitions, directories, or files to backup. When you select an item in the left side window, its content will be displayed on the right side window to help you refine your selection. 2. T ype a name for your backup job or accept the default job name. Default job name is automatically generated[...]
-
Page 320
R estor e F ile 1. Check the box es next to the partitions, directories, or files selected to be restor ed. When you select an item in the left side window, its content will be displayed in the right side window to help you refine your selection. 2. In the Select Restore Location window, you can use the original location without any changes, or spe[...]
-
Page 321
File Modified Date If the option is selected, BitDefender uses the curr ent date to indicate the date when the files and directories were restor ed. If not, BitDefender uses as file or directory modification date the date when they were back ed up. Directory Structure It only becomes active when you choose another location to restor e data to. Y ou[...]
-
Page 322
R estor e Options Dialog Bo x The r estore options allow specif ying whether the files to be r estored already e xist at destination at r estoration time, and whether to update the modified date of each restor ed file. When files to restore already exist ⚫ Only replace file older than backup file BitDefender replaces older files only . Older file[...]
-
Page 323
Log Viewer View L ogs The log viewing option allows tracing back your operation, and finding out the reason of the operation failure. The description of a log item on BitDefender Back up contains the following elements: T ype A classification of the log item severity . Ther e ar e four degr ees of severity on BitDefender Back up: ⚫ F atal: A sign[...]
-
Page 324
Date The date the log item occurred on. Time The local time when the logged item occurred. Source The sour ce that logged the respective item, which can be a job or the BitDefender Back up application. F or example, a System mark ed item indicates that it was logged by the BitDefender Backup application. Other possible marks are the names of the Bi[...]
-
Page 325
Import and Export Logs BitDefender Backup curr ently supports file import and export in two formats: .TXT and .XML Note W e r ecommend you to export and save the log to a file before clearing it. T o export logs to specified file, follow these steps: 1. Click Export to .TXT file or Export to .XML file in the Log Management menu. 2. T ype the file n[...]
-
Page 326
T oolbo x Burn to CD/D VD T o burn data to a CD/DVD manually, follow these steps: 1. Click Burn data to CD/DVD . 2. Click Erase if you want to reuse a r ewritable disk. If you want to erase it quickly, click F ast . If you need to erase the information track r ecor d completely, click Complete , but this will take some time. 3. Click Burn with Dial[...]
-
Page 327
2. Click Erase if you want to reuse a r ewritable disk. If you want to erase it quickly, click F ast . If you need to erase the information track r ecor d completely, click Complete , but this will take some time. 3. Click Burn with Dialog . This is where you can set to eject disc af ter bur n, to finalize disc (if you plan to share it with others)[...]
-
Page 328
⚫ Restore Time-Point Data: R estores the selected job to a certain time-point. If there are more than one selected jobs, it ex ecutes all of the selected jobs. ⚫ Schedule: Creates the job schedule or modifies the existing one. ⚫ Delete Schedule: Deletes the schedule of the selected job. ⚫ Delete: Deletes the selected job. If there are mor e[...]
-
Page 329
⚫ Import Logs: Imports logs from a .TXT file or an .XML file. ▸ F r om a TXT file ▸ F r om an XML file ⚫ Options: Modifies your global backup options. ▸ General ▸ Report & Log ▸ Job Schedule Help ⚫ Help T opic: Displays help topics. ⚫ Search: Allows sear ching help topics based on the entered or selected k eyword. ⚫ BitDefen[...]
-
Page 330
25. Encryption BitDefender offers encryption capabilities to protect your confidential documents and your instant messaging conversations thr ough Y ahoo Messenger and MSN Messenger . 25.1. Instant Messaging (IM) Encryption By default, BitDefender encrypts all your instant messaging chat sessions provided that: ⚫ Y our chat partner has a BitDefen[...]
-
Page 331
Instant Messaging Encryption By default, IM Encryption is enabled for both Y ahoo Messenger and W indows Live (MSN) Messenger . Y ou can choose to disable IM Encryption for a specific chat application only or completely . T wo tables are displayed: ⚫ Encryption Exclusions - lists the user IDs and the associated IM program for which encryption is [...]
-
Page 332
1. Click the Add button to open the configuration window . Adding Contacts 2. T ype in the edit field the user ID of your contact. 3. Select the instant messaging application associated with the contact. 4. Click OK . 25.2. F ile Encryption BitDefender F ile Encryption enables you to create encrypted, passwor d-protected logical drives (or vaults) [...]
-
Page 333
F ile V ault T o disable F ile Encryption, clear the File Encryption is enabled check box and click Y es to confirm. If you disable F ile V ault, all file vaults will be lock ed and you will no longer be able to access the files they contain. The table at the top displays the file vaults on your computer . Y ou can see the name, the status (opened [...]
-
Page 334
Create F ile V ault Pr oceed as follows: 1. Specify the location and the name of the vault file. ⚫ Click Browse , select the location of the vault and save the vault file under the desired name. ⚫ Just type the name of the vault in the corresponding field to create it in My Documents. T o open My Documents, click the Windows Start menu and then[...]
-
Page 335
25.2.2. Opening a V ault In or der to access and work with the files stor ed in a vault, you must open the vault. When you open the vault, a virtual disk drive appears in My Computer . The drive is labeled with the drive letter assigned to the vault. T o open a vault, use any of these methods: ⚫ Select the vault from the table and click Open vaul[...]
-
Page 336
⚫ Select the vault from the table and click Lock vault . ⚫ Right-click the vault in the table and select Lock . ⚫ Right-click the corresponding virtual disk drive from My Computer, point to BitDefender File V ault and select Lock . BitDefender will immediately infor m you about the result of the operation. If an err or has occurr ed, use the [...]
-
Page 337
Note The passwor d must have at least 8 characters. F or a strong password, use a combination of upper case and lower case letters, numbers and special characters (such as # , $ or @ ). 3. Click OK to change the password. BitDefender will immediately infor m you about the result of the operation. If an err or has occurr ed, use the err or message t[...]
-
Page 338
3. R emove files or folders as you normally do in Windows (for example, right-click a file you want to delete and select Delete ). Encryption 312 BitDefender T otal Security 2010[...]
-
Page 339
26. T une-Up BitDefender comes with a T une-Up module that helps you maintain the integrity of your system. The maintenance tools offer ed are critical for the impr ovement of your system's responsiveness and the efficient management of the hard drive space. T o perfor m maintenance operations on your PC, go to T une-Up in Expert Mode and use [...]
-
Page 340
⚫ R ecover R egistry can retrieve registry k eys previously deleted from the Windows R egistry using BitDefender R egistry Cleaner . ⚫ Shred F iles permanently erases files and their traces from your system. T o perform one of the tune-up tasks, click the corresponding Run Now button and follow the wizard. 26.1. Defragmenting Hard Disk V olumes[...]
-
Page 341
Cookies are also stor ed on your computer when you visit a web page. Cookies are small files containing information about your web surfing pr efer ences. They might be seen as a privacy issue as well, as they can be analyzed and used by advertisers to track your online interests and tastes. PC Cleaner helps you free disk space and protect your priv[...]
-
Page 342
operating system, installed applications, users, preferences of your computer and others. Many applications write keys in the Windows Registry at installation time. When removing such applications, some of their associated registry keys might not be deleted and continue to remain in the W indows R egistry, slowing down your system and even causing [...]
-
Page 343
T o find duplicate files on your computer, follow these steps: 1. In Expert Mode, click T une-Up on the left menu. 2. Click Run Now corr esponding to F ind Duplicates. 3. F ollow the four -step guided pr ocedur e. For more information, please refer to “ Duplicate Finder Wizard ” (p. 95) . T une-Up 317 BitDefender T otal Security 2010[...]
-
Page 344
27. Game / Laptop Mode The Game / Laptop Mode module allows you to configure the special operation modes of BitDefender: ⚫ Game Mode temporarily modifies the pr oduct settings so as to minimize the resour ce consumption when you play . ⚫ Laptop Mode prevents scheduled tasks from running when the laptop is running on battery in order to save bat[...]
-
Page 345
Game Mode At the top of the section, you can see the status of the Game Mode. Y ou can click T urn On Game Mode Mode or T urn Off Game Mode to change the curr ent status. 27.1.1. Configuring Automatic Game Mode Automatic Game Mode allows BitDefender to automatically enter Game Mode when a game is detected. Y ou can configure the following options: [...]
-
Page 346
Note If you do not want BitDefender to automatically enter Game Mode, clear the Automatic Game Mode check box. 27.1.2. Managing the Game List BitDefender automatically enters Game Mode when you start an application from the game list. T o view and manage the game list, click Manage Games . A new window will appear . Game List New applications are a[...]
-
Page 347
Adding or Editing Games When you add or edit an entry fr om the game list, the following window will appear : Add Game Click Browse to select the application or type the full path to the application in the edit field. If you do not want to automatically enter Game Mode when the selected application is started, select Disable . Click OK to add the e[...]
-
Page 348
Description Option R un the scheduled task immediately after you exit Game Mode. Postpone T ask T o automatically disable the BitDefender firewall while in Game Mode, follow these steps: 1. Click Advanced Settings . A new window will appear . 2. Select the Set Firewall on Allow All (Game Mode) when in Game Mode check bo x. 3. Click OK to save the c[...]
-
Page 349
3. Click OK to save the changes. 27.2. Laptop Mode Laptop Mode is especially designed for laptop and notebook users. Its purpose is to minimize BitDefender's impact on power consumption while these devices are running on battery . While in Laptop Mode, scheduled tasks are by default not performed. BitDefender detects when your laptop has switc[...]
-
Page 350
27.2.1. Configuring Laptop Mode Settings T o configure the behaviour on scheduled tasks, use these options: ⚫ Enable this module to modify Antivirus scan tasks schedules - to prevent scheduled scan tasks from running while in Laptop Mode. Y ou can choose one of the following options: Description Option Do not run the scheduled task at all. Skip T[...]
-
Page 351
28. Home Network The Network module allows you to manage the BitDefender products installed on your home computers from a single computer . Network Map T o be able to manage the BitDefender products installed on your home computers, you must follow these steps: 1. Join the BitDefender home network on your computer . Joining the network consists in [...]
-
Page 352
Configure P assword 2. T ype the same passwor d in each of the edit fields. 3. Click OK . Y ou can see the computer name appearing in the network map. 28.2. A dding Computers to the BitDefender Network Before you can add a computer to the BitDefender home network, you must configure the BitDefender home management password on the respective compute[...]
-
Page 353
Add Computer Y ou can see the list of computers in the network. The icon meaning is as follows: ⚫ Indicates an online computer with no BitDefender products installed. ⚫ Indicates an online computer with BitDefender installed. ⚫ Indicates an offline computer with BitDefender installed. 3. Do one of the following: ⚫ Select from the list the n[...]
-
Page 354
Authenticate 5. T ype the home management password configured on the respective computer . 6. Click OK . If you have pr ovided the cor rect password, the selected computer name will appear in the network map. Note Y ou can add up to five computers to the network map. 28.3. Managing the BitDefender Network Once you have successfully cr eated a BitDe[...]
-
Page 355
Network Map If you move the mouse cursor over a computer from the network map, you can see brief information about it (name, IP address, number of issues affecting the system security, BitDefender registration status). If you click a computer name in the network map, you can see all the administrative tasks you can run on the remote computer . ⚫ [...]
-
Page 356
⚫ Fix all issues on this PC Allows you to fix the issues that are affecting the security of this computer by following the F ix All Issues wizard. ⚫ View History/Events Allows you access to the History&Events module of the BitDefender pr oduct installed on this computer . ⚫ Update Now Intitiates the Update pr ocess for the BitDefender pro[...]
-
Page 357
29. Update New malwar e is found and identified every day . This is why it is very important to k eep BitDefender up to date with the latest malware signatures. If you ar e connected to the Inter net thr ough broadband or DSL, BitDefender tak es care of this itself . By default, it checks for updates when you tur n on your computer and every hour a[...]
-
Page 358
Automatic Update Here you can see when the last check for updates and the last update wer e performed, as well as information about the last update performed (if successful or the errors that occurred). Also, information about the current engine version and the number of signatures is displayed. If you open this section during an update, you can se[...]
-
Page 359
The Update module will connect to the BitDefender update server and will verif y if any update is available. If an update was detected, depending on the options set in the Manual Update Settings section, you will be ask ed to confir m the update or the update will be made automatically . Important It may be necessary to restart the computer when yo[...]
-
Page 360
Update Settings The update settings are grouped into 4 categories ( Update Location Settings , Automatic Update Settings , Manual Update Settings and Advanced Settings ). Each category will be described separately . 29.2.1. Setting Update Locations T o set the update locations, use the options from the Update Location Settings category . Note Confi[...]
-
Page 361
Note W e recommend you to set as primary update location the local mir ror and to leave the alternate update location unchanged, as a fail-safe plan in case the local mirror becomes unavailable. In case the company uses a pro xy server to connect to the Internet, check Use proxy and then click Proxy Settings to configur e the pr o xy settings. F or[...]
-
Page 362
Note If BitDefender is updated while a scan is in progress, the scan pr ocess will be aborted. ⚫ Don't update if game mode is on - BitDefender will not update if the game mode is turned on. In this way, you can minimize the pr oduct’s influence on system performance during games. 29.2.5. Managing Pr o xies If your company uses a pro xy ser[...]
-
Page 363
on to that account. If the pro xy server requires a username and a password, you must specify them in the corresponding fields. ⚫ Default Browser Proxy - pro xy settings of the current user, extracted from the default browser . If the pr o xy server requires a username and a password, you must specify them in the corresponding fields. Note The su[...]
-
Page 364
30. R egistration T o find complete information on your BitDefender product and the r egistration status, go to Registration in Expert Mode. R egistration This section displays: ⚫ Product Information : the BitDefender product and version. ⚫ Registration Information : the e-mail address used to log your BitDefender account (if configured), the c[...]
-
Page 365
R egistration Y ou can see the BitDefender registration status, the current license k ey and how many days are left until the license expir es. T o register BitDefender T otal Security 2010: 1. T ype the license key in the edit field. Note Y ou can find your license key : ⚫ on the CD label. ⚫ on the product registration car d. ⚫ in the online[...]
-
Page 366
Important Y ou must create an account within 15 days after installing BitDefender (if you register it with a license k ey, the deadline is e xtended to 30 days). Otherwise, BitDefender will no longer update. If you have not yet cr eated a BitDefender account, click Activate Product to open the account registration window . Account Creation If you d[...]
-
Page 367
⚫ P assword - type in a passwor d for your BitDefender account. The passwor d must be between 6 and 16 characters long. ⚫ Re-type password - type in again the previously specified passwor d. Note Once the account is activated, you can use the pr ovided e-mail addr ess and password to log in to your account at http://myaccount.bitdefender .com .[...]
-
Page 368
activate Online Back up later . Online Backup is only available to users having register ed to BitDefender Account. 4. Optionally, BitDefender can infor m you about special offers and promotions using the e-mail address of your account. Select one of the available options from the menu: ⚫ Send me all messages ⚫ Send me only product related mess[...]
-
Page 369
Integration into W indows and Thir d-P arty Softwar e 343 BitDefender T otal Security 2010[...]
-
Page 370
31. Integration into W indows Contextual Menu The Windows contextual menu appears whenever you right-click a file or folder on your computer or objects on your desktop. Windows Contextual Menu BitDefender integrates into the Windows contextual menu to help you easily scan files for viruses and prevent other users fr om accessing your sensitive file[...]
-
Page 371
2. Click Antivirus on the left-side menu. 3. Click the Virus Scan tab. 4. Right-click the Contextual Scan task and select Open . A window will appear . 5. Click Custom and configure the scanning options as needed. T o find out what an option does, k eep the mouse over it and read the description displayed at the bottom of the window . 6. Click OK t[...]
-
Page 372
⚫ For a mor e straightforward approach, switch the user interface to Expert Mode and click Encryption on the lef t-side menu. On the F ile Encryption tab, you can see and manage the existing file vaults and their content. 31.2.1. Create V ault K eep in mind that a vault is actually just a file with the .bvd extension. Only when you open the vault[...]
-
Page 373
5. Select F ormat drive to format the virtual drive assigned to the vault. Y ou must format the drive before you can add files to the vault. 6. If you want to change the default size (50 MB) of the vault, type the desired value in the V ault size field. 7. Click Create if you only want to create the vault at the selected location. T o create and di[...]
-
Page 374
5. Click Open . BitDefender will immediately infor m you about the result of the operation. If an err or has occurr ed, use the err or message to troubleshoot the error . Click OK to close the window . 31.2.3. Lock V ault When you are done with your work in a file vault, you must lock it in order to protect your data. By locking the vault, the corr[...]
-
Page 375
1. Open My Computer (click the Windows Start menu and then My Computer ). 2. Enter the virtual disk drive corr esponding to the vault. Look for the drive letter you assigned to the vault when you opened it. 3. Copy-paste or drag&drop files and folders directly to this virtual disk drive. 31.2.5. R emove from F ile V ault In order to r emove fil[...]
-
Page 376
4. T ype the new password of the vault in the New Password and Confirm New Password fields. Note The passwor d must have at least 8 characters. F or a strong password, use a combination of upper case and lower case letters, numbers and special characters (such as # , $ or @ ). 5. Click OK to change the password. BitDefender will immediately infor m[...]
-
Page 377
32. Integration into W eb Browsers BitDefender pr otects you against phishing attempts when you ar e surfing the Internet. It scans the accessed web sites and alerts you if there are any phishing threats. A White List of web sites that will not be scanned by BitDefender can be configured. BitDefender integrates dir ectly through an intuitive and ea[...]
-
Page 378
▸ Real-time Antiphishing W eb Protection - detects and alerts you in real-time if a web site is phished (set up to steal personal information). This option controls the BitDefender antiphishing protection in the current web browser only . ▸ Ask before adding to whitelist - prompts you before adding a web site to the White List. ⚫ Add to White[...]
-
Page 379
⚫ Report as Phishing - informs the BitDefender Lab that you consider the respective web site to be used for phishing. By reporting phished web sites you help protect other people against identity theft. ⚫ Help - opens the help file. ⚫ About - opens a window where you can see information about BitDefender and where to look for help in case som[...]
-
Page 380
33. Integration into Instant Messenger Pr ograms BitDefender offers encryption capabilities to protect your confidential documents and your instant messaging conversations thr ough Y ahoo Messenger and MSN Messenger . By default, BitDefender encrypts all your instant messaging chat sessions provided that: ⚫ Y our chat partner has a BitDefender ve[...]
-
Page 381
34. Integration into Mail Clients BitDefender T otal Security 2010 includes an Antispam module. Antispam verifies the e-mail messages you r eceive and identifies those that are spam. The spam messages detected by BitDefender ar e marked with the [SPAM] prefix in the subject line. Note Antispam protection is provided for all POP3/SMTP e-mail clients[...]
-
Page 382
34.1.1. Step 1/6 - W elcome W indow W elcome Window Click Next . Integration into Mail Clients 356 BitDefender T otal Security 2010[...]
-
Page 383
34.1.2. Step 2/6 - F ill in the F riends List F ill in the F riends List Here you can see all the addr esses from your Address Book . Please select those you want to be added to your F riends list (we recommend to select them all). Y ou will receive all the e-mail messages from these addr esses, regar dless of their content. T o add all your contac[...]
-
Page 384
34.1.3. Step 3/6 - Delete Bayesian Database Delete Bayesian Database Y ou may find that your antispam filter has begun to lose efficiency . This may be due to impr oper training. (i.e. you have mistakenly tagged a number of legitimate messages as spam, or vice versa). If your filter is very inaccurate, you may need to wipe the filter database and r[...]
-
Page 385
34.1.4. Step 4/6 - T rain Bayesian F ilter with Legitimate Mail T rain Bayesian F ilter with Legitimate Mail Please select a folder that contains legitimate e-mail messages. These messages will be used to train the antispam filter . There are two advanced options under the directory list: ⚫ Include all subfolders - to include the subfolders to yo[...]
-
Page 386
34.1.5. Step 5/6 - T rain Bayesian F ilter with Spam T rain Bayesian F ilter with Spam Please select a folder that contains spam e-mail messages. These messages will be used to train the antispam filter . Important Please make sure that the folder you choose contains no legitimate e-mail at all, otherwise the antispam performance will be considerab[...]
-
Page 387
34.1.6. Step 6/6 - Summary Summary Here you can view all the settings for the configuration wizar d. Y ou can mak e any changes, by retur ning to the previous steps (click Back ). If you do not want to make any modifications, click Finish to end the wizard. 34.2. Antispam T oolbar In the upper area of your mail client window you can see the Antispa[...]
-
Page 388
Antispam T oolbar Each button from the BitDefender toolbar will be e xplained below : ⚫ Is Spam - sends a message to the Bayesian module indicating that the selected e-mail is spam. The e-mail will be tagged as SP AM and moved to the Spam folder . The future e-mail messages that fit the same patter ns will be tagged as SP AM. Note Y ou can select[...]
-
Page 389
Important The Not Spam button becomes active when you select a message marked as SP AM by BitDefender (normally these messages ar e located in the Spam folder). ⚫ Add Spammer - adds the sender of the selected e-mail to the Spammers list. Add Spammer Select Don't show this message again if you don't want to be prompted for confirmation w[...]
-
Page 390
⚫ Spammers - opens the Spammers list that contains all the e-mail addresses from which you don't want to r eceive messages, regardless of their content. Note Any e-mail message r eceived fr om an address contained in the Spammers list will be automatically marked as SP AM, without further pr ocessing. Spammers List Here you can add or remove[...]
-
Page 391
▸ *domain* - all the received e-mail messages from domain (no matter the domain suffix es) will be tagged as SP AM; ▸ *com - all the r eceived e-mail messages having the domain suffix com will be tagged as SP AM. W ar ning Do not add domains of legitimate web-based e-mail services (such as Y ahoo, Gmail, Hotmail or other) to the Spammers list. [...]
-
Page 392
F riends List Here you can add or remove entries from the F riends list . If you want to add an e-mail address check the Email address option, type in the address and click the button. The address will appear in the F riends list . Important Syntax: name@domain.com. If you want to add a domain check the Domain name option, type in the domain and cl[...]
-
Page 393
F or Microsoft Outlook Express / Windows Mail a new window will appear from where you can select the folder that contains the e-mail addr esses you want to add to the F riends list . Choose them and click Select . In both cases the e-mail addr esses will appear in the import list. Select the desired ones and click to add them to the F riends list .[...]
-
Page 394
The following options are available: ▸ Move message to Deleted Items - moves the spam messages to the Deleted Items (only for Microsof t Outlook Express / Windows Mail); ▸ Mark message as 'read' - marks all the spam messages as read so as not to be disturbing when new spam messages arrive. If your antispam filter is very inaccurate, y[...]
-
Page 395
How T o 369 BitDefender T otal Security 2010[...]
-
Page 396
35. How to Scan F iles and F olders Scanning is easy and fle xible with BitDefender . Ther e are 4 ways to set BitDefender to scan files and folders for viruses and other malware: ⚫ Using Windows Contextual Menu ⚫ Using Scan T asks ⚫ Using BitDefender Manual Scan ⚫ Using Scan Activity Bar Once you initiate a scan, the Antivirus Scan wizar d[...]
-
Page 397
R unning Scan T asks in Intermediate Mode In Intermediate Mode, you can run a number of pre-configur ed scan tasks. Y ou can also configure and run custom scan tasks to scan specific locations on your computer using custom scanning options. F ollow these steps to run a scan task in Intermediate Mode: 1. Click the Security tab. 2. On the left-side Q[...]
-
Page 398
2. Click the Virus Scan tab. Here you can find a number of default scan tasks and you can cr eate your own scan tasks. These are the default scan tasks that you can use: Description Default T ask Scans the entir e system. In the default configuration, it scans for all types of malware threatening your Deep System Scan system's security, such a[...]
-
Page 399
5. Click Continue to start the scan. 6. F ollow the Antivirus Scan wizard to complete the scan. What is Safe Mode? Safe Mode is a special way to start W indows, used mainly to troubleshoot problems affecting normal operation of Windows. Such problems range from conflicting drivers to viruses preventing W indows fr om starting normally . In Safe Mod[...]
-
Page 400
36. How to Schedule Computer Scan Scanning your computer periodically is a best practice to k eep your computer free from malware. BitDefender allows you to schedule scan tasks so that you can automatically scan your computer . T o schedule BitDefender to scan your computer, follow these steps: 1. Open BitDefender and switch the user interface to E[...]
-
Page 401
4. Right-click the desired scan task and select Schedule . A new window will appear . 5. Schedule the task to run as needed: ⚫ T o run the scan task one-time only, select Once and specify the start date and time. ⚫ T o run the scan task after the system startup, select On system startup . Y ou can specify how long af ter the startup the task sh[...]
-
Page 402
37. How to Back Up Data With BitDefender T otal Security 2010, you can mak e reserve copies of your valuable data (documents, images etc) on various storage media: ⚫ your computer ⚫ a USB storage device ⚫ a network location ⚫ CD/DVD ⚫ an FTP server ⚫ the BitDefender online servers Backing data up helps protect against data loss. If you [...]
-
Page 403
If you need more back up options, or if you want to manage the back up jobs you have created, open BitDefender in Expert Mode, go to Backup and click Settings . F or detailed information, please refer to “ Backup Settings ” (p. 278) . Backing up data online. T o back up data on secur e online servers, follow these steps: 1. Open BitDefender . 2[...]
-
Page 404
38. How to R estore Back ed-up Data Y ou can easily recover lost data that you previously back ed up with BitDefender . Before r estoring any data, mak e sure that the device wher e you backed the data up is available. Depending on the device you used, you may need to tak e one of these actions: ⚫ Insert the back up USB stick into a USB port. ⚫[...]
-
Page 405
⚫ In Novice Mode, Protect Y our PC area, click Backup and select Online Restore from the menu. ⚫ In Intermediate Mode, go to the File Storage tab, click the arr ow on the Backup Online button and select Online Restore . ⚫ In Expert Mode, go to Backup and click Online Restore . 3. F ollow the wizar d steps to restore the data. F or detailed in[...]
-
Page 406
T r oubleshooting and Getting Help 380 BitDefender T otal Security 2010[...]
-
Page 407
39. T r oubleshooting This chapter presents some problems you may encounter when using BitDefender and pr ovides you with possible solutions to these pr oblems. Most of these pr oblems can be solved through the appropriate configuration of the product settings. If you cannot find your problem here, or if the presented solutions do not solve it, you[...]
-
Page 408
Description&Solution Err or 2. R un the uninstall tool using administrator privileges. 3. R estart your computer . 4. Start the setup wizard again to install BitDefender . Y ou ar e trying to install BitDefender on an unsupported operating system. Please check the “ System The BitDefender product is not compatible with your operating system. [...]
-
Page 409
1. Clean up the system after the failed installation. If the installation fails, some BitDefender r egistry k eys and files may remain in your system. Such remainders may prevent a new installation of BitDefender . They may also affect system perfor mance and stability . This is why you must remove them befor e you try to install the product again.[...]
-
Page 410
⚫ temporary communication errors between the BitDefender services. ⚫ some of the BitDefender services are stopped. ⚫ other security solutions running on your computer at the same time with BitDefender . ⚫ viruses on your system affect the normal operation of BitDefender . T o troubleshoot this error, try these solutions: 1. W ait a few mome[...]
-
Page 411
Unsecured W i-F i networks pr esent a great security risk because your computer is connected to unknown computers. Without the pr oper protection provided by a firewall, anyone connected to the network can access your shares and even break into your computer . When connected to an unsecur ed Wi-F i network, BitDefender automatically blocks communic[...]
-
Page 412
▸ If the Windows F ir ewall is used, it can be configured to allow file and printer sharing as follows: open the W indows F ir ewall settings window, Exceptions tab and select the File and Printer Sharing check box. ▸ If another firewall pr ogram is used, please refer to its documentation or help file. ⚫ General conditions that may prevent us[...]
-
Page 413
5. Depending on the level of security you want to obtain, choose one of the following options: ⚫ Unsafe - to access the files and printers shared in the Wi-F i network, without allowing access to your shares. ⚫ Safe - to allow file and printer sharing both ways. This means that the users connected to the Wi-F i network can also access your shar[...]
-
Page 414
If you suspect the problem is with the BitDefender firewall, you can contact BitDefender for support as described in section “ Support ” (p. 396) . 39.4. Antispam F ilter Does Not W ork P roperly This article helps you tr oubleshoot the following problems concerning the BitDefender Antispam filtering operation: ⚫ A number of legitimate e-mail[...]
-
Page 415
Note BitDefender integrates into the most commonly used mail clients through an easy-to-use antispam toolbar . F or a complete list of supported mail clients, please refer to “ Supported Software ” (p. 2) . If you ar e using a different mail client, you cannot indicate detection er rors and train the Learning Engine. T o solve the pr oblem, try[...]
-
Page 416
4. Click the Add F riend button on the BitDefender antispam toolbar to add the sender to the F riends list. Y ou may need to click OK to acknowledge. Y ou will always receive e-mail messages from this address no matter what they contain. 5. Click the Not Spam button on the BitDefender antispam toolbar (normally located in the upper part of the mail[...]
-
Page 417
8. Click Finish to start the training process. 9. When training is completed, click Close . Ask for Help If this infor mation was not helpful, you can contact BitDefender for support as described in section “ Support ” (p. 396) . 39.4.2. Many Spam Messages Ar e Not Detected If you ar e r eceiving many spam messages that are not mark ed as [spam[...]
-
Page 418
2. Go to the Inbox folder . 3. Select the undetected spam messages. 4. Click the Is Spam button on the BitDefender antispam toolbar (nor mally located in the upper part of the mail client window). This indicates to the Lear ning Engine that the selected messages are spam. They are immediately mark ed as [spam] and moved to the junk mail folder . Th[...]
-
Page 419
R etrain L earning Engine (Bayesian) Before training the L earning Engine (Bayesian), prepar e a folder containing only SP AM messages and another one containing only legitimate messages. The L earning Engine will analyze them and learn the characteristics that define the spam or legitimate messages that you usually receive. In or der for the train[...]
-
Page 420
Note POP3 is one of the most widely used protocols for downloading e-mail messages from a mail server . If you do not know the protocol that your e-mail client uses to download e-mail messages, ask the person who configured your e-mail client. ⚫ BitDefender T otal Security 2010 doesn't scan Lotus Notes POP3 traffic. Y ou should also verify t[...]
-
Page 421
2. R un the uninstall tool using administrator privileges. The uninstall tool will r emove all the files and registry keys that wer e not removed during the automatic removal process. 3. R estart your computer . If this infor mation was not helpful, you can contact BitDefender for support as described in section “ Support ” (p. 396) . T r ouble[...]
-
Page 422
40. Support As a valued pr ovider, BitDefender strives to provide its customers with an unparalleled level of fast and accurate support. The BitDefender Knowledge Base provides you with articles that contain solutions to most of your problems and questions r elated to BitDefender . If you cannot find the solution in the Knowledge Base, you can cont[...]
-
Page 423
40.3. Contact Information Efficient communication is the key to a successful business. During the past 10 years BITDEFENDER has established an unquestionable reputation by constantly striving for better communication so as to exceed the expectations of our clients and partners. Should you have any questions, do not hesitate to contact us. 40.3.1. W[...]
-
Page 424
Deutschland Office: +49 2301 91 84 222 Sales: vertrieb@bitdefender .de T echnical support: http://kb.bitdefender .de W eb: http://www .bitdefender .de UK and Ireland Business Centre 10 Queen Street Newcastle, Staffordshir e ST5 1ED E-mail: info@bitdefender .co.uk Phone: +44 (0) 8451-305096 Sales: sales@bitdefender .co.uk T echnical support: http://[...]
-
Page 425
BitDefender R escue CD 399 BitDefender T otal Security 2010[...]
-
Page 426
41. Overview BitDefender T otal Security 2010 comes with a bootable CD (BitDefender R escue CD) capable to scan and disinfect all e xisting hard drives before your operating system starts. Y ou should use BitDefender R escue CD any time your operating system is not working properly because of virus infections. That usually happens when you don&apos[...]
-
Page 427
41.2. Included Softwar e BitDefender R escue CD includes the following softwar e packages. Xedit This is a text file editor . Vim This is a powerful text file editor, containing syntax highlighting, a GUI, and much more. For more information, please refer to the Vim homepage . Xcalc This is a calculator . RoxFiler R o xF iler is a fast and powerful[...]
-
Page 428
F or more information, please refer to the Nessus homepage . Iptraf Iptraf is an IP Network Monitoring Software. F or more information, please refer to the Iptraf homepage . Iftop Iftop displays bandwidth usage on an interface. F or more information, please refer to the Iftop homepage . MTR MTR is a network diagnostic tool. F or more information, p[...]
-
Page 429
42. BitDefender R escue CD Howto This chapter contains information on how to start and stop the BitDefender Rescue CD, scan your computer for malwar e as well as save data fr om your compromised Windows PC to a removable device. However, by using the softwar e applications that come with the CD, you can do many tasks the description of which goes f[...]
-
Page 430
The Desktop 42.2. Stop BitDefender R escue CD Choose "EXIT" Y ou can safely shut down your computer by selecting Exit from the BitDefender Rescue CD contextual menu (right-click to open it) or by issuing the halt command in a terminal. When BitDefender Rescue CD has successfully closed all programs it will show a screen lik e the followin[...]
-
Page 431
W ait for this message when shutting down 42.3. How do I perfor m an antivirus scan? A wizard will appear when the boot pr ocess has finished and allow you to full scan your computer . All you have to do is click the Start button. Note If your screen resolution isn't high enough, you will be asked to start scanning in text-mode. F ollow the th[...]
-
Page 432
1. Double click the ST AR T SCANNER icon on the Desktop. This will launch the BitDefender Scanner for Unices . 2. Click Scanner , a new window will appear . 3. Select the dir ectory you wish to scan and click Open to start scanning using the same wizard that appeared when you first booted. ⚫ Use the contextual menu - browse your folders, right-cl[...]
-
Page 433
Description Connection Select this type of connection when you ar e using a local area network (LAN) to access the Internet. It is also suitable for wireless connections. netcardconfig Select this type of connection when you are accessing the Internet over a mobile phone network by using GPRS gprsconnect (General Pack et Radio Service) pr otocol. O[...]
-
Page 434
Update Signatures 2. Do one of the following: ▸ Select Cumulative to install signatures already saved on your hard disk by browsing your computer and loading the cumulative.zip file. ▸ Select Update to immediately connect to the inter net and download the latest virus signatures. 3. Click OK . 42.5.1. How do I update BitDefender over a pr o xy?[...]
-
Page 435
6. Pr ess F2 to save the curr ent file, confir m saving, and then press F10 to close it. 7. T ype the command: bdscan update . 42.6. How do I save my data? Let's assume that you cannot start your Windows PC due to some unknown issues. At the same time, you desperately need to access some important data from your computer . This is where BitDef[...]
-
Page 436
Desktop Screen 3. Double-click the partition where the data you want to save is located (e.g. [sda3] ). Note When working with BitDefender R escue CD, you will deal with Linux-type partition names. So, [sda1] will probably correspond to the (C:) Windows-type partition, [sda3] to (F:) , and [sdb1] to the memory stick. Important If the computer was n[...]
-
Page 437
Saving Data 6. T ype /media/sdb1/ into the corr esponding textbo x and click Copy . Please be aware that depending on your computer configuration it might be sda1 instead of sdb1 . 42.7. How do I use console mode? If your screen resolution is not high enough to run the graphical user interface, you can run the BitDefender R escue CD in console mode[...]
-
Page 438
Glossary ActiveX ActiveX is a model for writing programs so that other pr ograms and the operating system can call them. A ctiveX technology is used with Microsoft Internet Explorer to mak e interactive W eb pages that look and behave lik e computer programs, rather than static pages. With ActiveX, users can ask or answer questions, use push button[...]
-
Page 439
Internet Explor er . Both of these are graphical br owsers, which means that they can display graphics as well as text. In addition, most moder n browsers can present multimedia information, including sound and video, though they requir e plug-ins for some formats. Command line In a command line interface, the user types commands in the space pr ov[...]
-
Page 440
Filename extension The portion of a filename, following the final point, which indicates the kind of data stored in the file. Many operating systems use filename extensions, e.g. Unix, VMS, and MS-DOS. They ar e usually from one to three letters (some sad old OSes support no mor e than thr ee). Examples include "c" for C sour ce code, &qu[...]
-
Page 441
exists on tapes or disks. Every computer comes with a certain amount of physical memory, usually refer red to as main memory or R AM. Non-heuristic This method of scanning relies on specific virus signatur es. The advantage of the non-heuristic scan is that it is not fooled by what might seem to be a virus, and does not generate false alarms. Pack [...]
-
Page 442
Report file A file that lists actions that have occur red. BitDefender maintains a r eport file listing the path scanned, the folders, the number of archives and files scanned, how many infected and suspicious files were found. Rootkit A rootkit is a set of sof tware tools which offer administrator -level access to a system. The term was first used[...]
-
Page 443
sends infor mation back to the spyware's home base via the user's Internet connection. Because spyware is using memory and system resour ces, the applications running in the background can lead to system crashes or general system instability . Startup items Any files placed in this folder will open when the computer starts. F or e xample,[...]
-
Page 444
itself over and over again is relatively easy to produce. Even such a simple virus is danger ous because it will quickly use all available memory and bring the system to a halt. An even mor e danger ous type of virus is one capable of transmitting itself across networks and bypassing security systems. Virus definition The binary patter n of a virus[...]