Go to page of
A good user manual
The rules should oblige the seller to give the purchaser an operating instrucion of Softwin BitDefender Internet Security 2010, along with an item. The lack of an instruction or false information given to customer shall constitute grounds to apply for a complaint because of nonconformity of goods with the contract. In accordance with the law, a customer can receive an instruction in non-paper form; lately graphic and electronic forms of the manuals, as well as instructional videos have been majorly used. A necessary precondition for this is the unmistakable, legible character of an instruction.
What is an instruction?
The term originates from the Latin word „instructio”, which means organizing. Therefore, in an instruction of Softwin BitDefender Internet Security 2010 one could find a process description. An instruction's purpose is to teach, to ease the start-up and an item's use or performance of certain activities. An instruction is a compilation of information about an item/a service, it is a clue.
Unfortunately, only a few customers devote their time to read an instruction of Softwin BitDefender Internet Security 2010. A good user manual introduces us to a number of additional functionalities of the purchased item, and also helps us to avoid the formation of most of the defects.
What should a perfect user manual contain?
First and foremost, an user manual of Softwin BitDefender Internet Security 2010 should contain:
- informations concerning technical data of Softwin BitDefender Internet Security 2010
- name of the manufacturer and a year of construction of the Softwin BitDefender Internet Security 2010 item
- rules of operation, control and maintenance of the Softwin BitDefender Internet Security 2010 item
- safety signs and mark certificates which confirm compatibility with appropriate standards
Why don't we read the manuals?
Usually it results from the lack of time and certainty about functionalities of purchased items. Unfortunately, networking and start-up of Softwin BitDefender Internet Security 2010 alone are not enough. An instruction contains a number of clues concerning respective functionalities, safety rules, maintenance methods (what means should be used), eventual defects of Softwin BitDefender Internet Security 2010, and methods of problem resolution. Eventually, when one still can't find the answer to his problems, he will be directed to the Softwin service. Lately animated manuals and instructional videos are quite popular among customers. These kinds of user manuals are effective; they assure that a customer will familiarize himself with the whole material, and won't skip complicated, technical information of Softwin BitDefender Internet Security 2010.
Why one should read the manuals?
It is mostly in the manuals where we will find the details concerning construction and possibility of the Softwin BitDefender Internet Security 2010 item, and its use of respective accessory, as well as information concerning all the functions and facilities.
After a successful purchase of an item one should find a moment and get to know with every part of an instruction. Currently the manuals are carefully prearranged and translated, so they could be fully understood by its users. The manuals will serve as an informational aid.
Table of contents for the manual
-
Page 1
User's guide Copyright© 2009 BitDefender[...]
-
Page 2
BitDefender Internet Security 2010 User's guide Published 2009.07.08 Copyright© 2009 BitDefender Legal Notice All rights reserved. No part of this book may be r eproduced or transmitted in any for m or by any means, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without written[...]
-
Page 3
Each man has his price Bob And yours was pretty low BitDefender Inter net Security 2010[...]
-
Page 4
T able of Contents End User Software License Agr eement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xi Pr eface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvi 1. Conventions Used in This Book . . . . . . . . . . . . . . . .[...]
-
Page 5
6.6.1. Game Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 6.6.2. Laptop Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 6.7. Automatic Device Detection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . [...]
-
Page 6
13.1.1. Configuring Status T racking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93 13.2. Quick T asks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95 13.2.1. Updating BitDefender . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .[...]
-
Page 7
18.3. Objects Excluded from Scanning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155 18.3.1. Ex cluding P aths fr om Scanning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157 18.3.2. Excluding Extensions from Scanning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160 18.4. Quara[...]
-
Page 8
21.4. Cookie Contr ol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208 21.4.1. Configuration W indow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 210 21.5. Script Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .[...]
-
Page 9
27.1. Automatic Update . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 255 27.1.1. Requesting an Update . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 256 27.1.2. Disabling Automatic Update . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .[...]
-
Page 10
35. T r oubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 301 35.1. Installation Problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 301 35.1.1. Installation V alidation Err ors . . . . . . . . . . . . . . . . . . . . . . . . .[...]
-
Page 11
End User Softwar e License Agr eement IF Y OU DO NOT AGREE TO THESE TERMS AND CONDITIONS DO NOT INST ALL THE SOFTW ARE. B Y SELECTING "I ACCEPT", "OK", "CONTINUE", "YES" OR B Y INST ALLING OR USING THE SOFTW ARE IN ANY W A Y, Y OU ARE INDICA TING Y OUR COMPLETE UNDERST ANDING AND ACCEPT ANCE OF THE TERMS OF T[...]
-
Page 12
TERM OF LICENSE. The license granted hereunder shall commence on the purchasing date of BitDefender and shall expir e at the end of the period for which the license is pur chased. EXPIR A TION. The product will cease to perform its functions immediately upon expiration of the license. UPGR ADES. If BitDefender is labeled as an upgrade, you must be [...]
-
Page 13
CONDITIONS, INCL UDING, WITHOUT LIMIT A TION, THE IMPLIED W ARR ANTIES OF MER CHANT ABILITY, FITNESS FOR A P AR TICULAR PURPOSE, TITLE, NON INTERFERENCE, ACCUR ACY OF DA T A, ACCUR AC Y OF INFORMA TIONAL CONTENT, SYSTEM INTEGR A TION, AND NON INFRINGEMENT OF THIRD P AR TY RIGHTS B Y FIL TERING, DISABLING, OR REMOVING SUCH THIRD P AR TY’S SOFTW AR[...]
-
Page 14
Y ou acknowledge and accept that BitDefender may pr ovide updates or additions to the pr ogram or pr oduct which automatically download to your computer . By accepting this Agreement, Y ou agree to upload the ex ecutable files for the purpose of being scanned by the BitDefender servers. Similarly, for the purpose of contracting and using the progra[...]
-
Page 15
In the event of invalidity of any provision of this Agreement, the invalidity shall not affect the validity of the r emaining portions of this Agreement. BitDefender and BitDefender logos are trademarks of BITDEFENDER. All other trademarks used in the product or in associated materials are the pr operty of their respective owners. The license will [...]
-
Page 16
P reface This guide is intended to all users who have chosen BitDefender Internet Security 2010 as a security solution for their personal computers. The information presented in this book is suitable not only for computer literates, it is accessible to everyone who is able to work under Windows. This book will describe for you BitDefender Internet [...]
-
Page 17
Note The note is just a short observation. Although you can omit it, the notes can provide valuable information, such as specific feature or a link to some related topic. Important This requir es your attention and is not recommended to skip over it. Usually, it provides non-critical but significant information. W arning This is critical informatio[...]
-
Page 18
3. R equest for Comments W e invite you to help us improve the book. W e have tested and verified all of the information to the best of our ability . Please write to tell us about any flaws you find in this book or how you think it could be impr oved, to help us provide you with the best documentation possible. Let us know by sending an e-mail to d[...]
-
Page 19
Installation and R emoval 1 BitDefender Inter net Security 2010[...]
-
Page 20
1. System R equirements Y ou may install BitDefender Internet Security 2010 only on computers running the following operating systems: ⚫ Windows XP (32/64 bit) with Service P ack 2 or higher ⚫ Windows Vista (32/64 bit) or W indows V ista with Service Pack 1 or higher ⚫ Windows 7 (32/64 bit) Before installation, make sure that your computer me[...]
-
Page 21
⚫ Y ahoo Messenger 8.5 ⚫ Windows Live Messenger 8 Antispam protection is provided for all POP3/SMTP e-mail clients. The BitDefender Antispam toolbar however is integrated only into: ⚫ Microsof t Outlook 2000 / 2003 / 2007 ⚫ Microsof t Outlook Express ⚫ Microsof t Windows Mail ⚫ Thunderbird 2.0.0.17 System R equirements 3 BitDefender Int[...]
-
Page 22
2. Pr eparing for Installation Before you install BitDefender Internet Security 2010, complete these pr eparations to ensur e the installation will go smoothly : ⚫ Mak e sure that the computer where you plan to install BitDefender meets the minimum system r equirements. If the computer does not meet all the minimum system r equirements, BitDefend[...]
-
Page 23
3. Installing BitDefender Y ou can install BitDefender from the BitDefender installation CD or using the installation file downloaded on your computer from the BitDefender website or from other authorized websites (for e xample, the website of a BitDefender partner or an online shop). Y ou can download the installation file from the BitDefender web[...]
-
Page 24
F ollow these steps to install BitDefender Internet Security 2010: 1. Click Next . Y ou can cancel installation anytime you want by clicking Cancel . BitDefender Internet Security 2010 alerts you if you have other antivirus products installed on your computer . Click Remove to uninstall the corresponding product. If you want to continue without rem[...]
-
Page 25
Important W e recommend you to turn off Windows F irewall since BitDefender Internet Security 2010 already includes an advanced firewall. R unning two firewalls on the same computer may cause problems. ⚫ T urn off Windows Defender - to turn off Windows Defender; this option appears only on Windows Vista. Click Install in order to begin the instal[...]
-
Page 26
3.1.1. Step 1/2 - R egister BitDefender Internet Security 2010 R egistration BitDefender Internet Security 2010 comes with 30-day trial period. T o continue evaluating the product, select I want to evaluate BitDefender and click Next . T o register BitDefender Internet Security 2010: 1. Select I want to evaluate BitDefender with a license k ey . 2.[...]
-
Page 27
3.1.2. Step 2/2 - Create a BitDefender Account Account Creation If you do not want to cr eate a BitDefender account at the moment, select Register later and click Finish . Otherwise, pr oceed accor ding to your current situation: ⚫ “I do not have a BitDefender account” (p. 9) ⚫ “I alr eady have a BitDefender account” (p. 10) Important Y[...]
-
Page 28
⚫ Re-type password - type in again the pr eviously specified passwor d. Note Once the account is activated, you can use the provided e-mail address and password to log in to your account at http://myaccount.bitdefender .com . 3. Optionally, BitDefender can inform you about special offers and promotions using the e-mail address of your account. Se[...]
-
Page 29
3.2. Configuration W izard Once you have completed the registration wizard, a configuration wizar d will appear . This wizard helps you configur e the main BitDefender settings and user interface so that they suit your r equirements better . A t the end of the wizard, you can update the product files and malware signatures and scan the system files[...]
-
Page 30
Description Option Click here if this PC is used mainly for browsing and multimedia activities. T ypical Click here if this PC is used by childr en and you want to control their access to Internet using the P arental Control module. Parent Click her e if this PC is used primarily for gaming. Gamer Click here if you want to configure all the main se[...]
-
Page 31
performed, as they r equire more system resources and, implicitly, incr ease power consumption. Click Next to continue. 3.2.3. Step 3 - Select User Interface User Interface View Modes Click the button that best describes your computer skills to select an appropriate user interface view mode. Y ou can choose to view the user interface under any of t[...]
-
Page 32
Description Mode Aimed at users with average computer skills, this mode extends what you can do in Novice Mode. Intermediate Mode Y ou can fix issues separately and choose which issues to be monitor ed. Moreover, you can manage r emotely the BitDefender products installed on the computers in your household. Suited for more technical users, this mod[...]
-
Page 33
1. Select Enable Parental Control . 2. If you are sharing your Windows user account with your children, select the corr esponding check box and type a password in the cor responding fields to protect the P arental Control settings. Anyone trying to change the P arental Contr ol settings must first provide the password that you have configur ed. Cli[...]
-
Page 34
Click Next to continue. 3.2.6. Step 6 - Select the T asks to Be R un T ask Selection Set BitDefender to perform important tasks for the security of your system. The following options are available: ⚫ Update BitDefender and perform a quick system scan now - during the next step, the virus signatur es and pr oduct files of BitDefender will be updat[...]
-
Page 35
3. Click the Virus Scan tab. 4. Right-click the System Scan task and select Schedule . A new window will appear . 5. Change the frequency and the start time as needed. 6. Click OK to save the changes. W e recommend that you have these options enabled befor e moving on to the ne xt step in order to ensur e the security of your system. Click Next to [...]
-
Page 36
Note The scan will take a few minutes. When it is over, open the scan window and check the scan r esults to see if your system is clean. If viruses wer e detected during the scan, you should immediately open BitDefender and run a full system scan. Installing BitDefender 18 BitDefender Inter net Security 2010[...]
-
Page 37
4. Upgrade Y ou can upgrade to BitDefender Internet Security 2010 if you are using BitDefender Internet Security 2010 beta or the 2008 or 2009 version. There are two ways to perfor m the upgrade: ⚫ Install BitDefender Internet Security 2010 dir ectly over the older version. If you install directly over the 2009 version, the F riends and Spammers [...]
-
Page 38
5. R epairing or R emoving BitDefender If you want to repair or remove BitDefender Internet Security 2010, follow the path from the Windows start menu: Start → Programs → BitDefender 2010 → Repair or Remove . Y ou will be requested to confirm your choice by clicking Next . A new window will appear wher e you can select: ⚫ Repair - to re-ins[...]
-
Page 39
Getting Started 21 BitDefender Inter net Security 2010[...]
-
Page 40
6. Overview Once you have installed BitDefender your computer is protected. If you have not completed the configuration wizard , you must open BitDefender as soon as possible and fix the existing issues. Y ou may have to configure specific BitDefender components or take preventive actions to protect your computer and your data. If you want to, you [...]
-
Page 41
Description Mode Y ou can fix issues separately and choose which issues to be monitor ed. Moreover, you can manage r emotely the BitDefender products installed on the computers in your household. Suited for more technical users, this mode allows you to fully configure each functionality of BitDefender . Expert Mode Y ou can also use all tasks provi[...]
-
Page 42
Novice Mode The window is organized into three main sections: ⚫ Security Status informs you of the issues that affect your computer's security and helps you fix them. By clicking Fix All Issues , a wizard will help you easily remove any threats to your computer and data security . F or detailed information, please r efer to “ Fixing Issues[...]
-
Page 43
▸ When the Parent profile is selected, the Parental Control button allows you to configure the P ar ental Control settings. F or more information on how to configure P arental Control, please refer to “ Parental Control ” (p. 180) . ▸ When the Gamer profile is selected, the T urn On/Off Game Mode button allows you to enable/disable Game Mod[...]
-
Page 44
Intermediate Mode The Intermediate Mode window consists of five tabs. The following table briefly describes each tab. F or detailed information, please refer to the “Intermediate Mode” (p. 89) part of this user guide. Description T ab Displays the security status of your system and lets you reset the usage profile. Dashboard Displays the status[...]
-
Page 45
In the upper -right corner of the window, you can see the Settings button. It opens a window where you can change the user interface mode and enable or disable the main settings of BitDefender . F or detailed information, please refer to “ Configuring Basic Settings ” (p. 40) . In the bottom-right corner of the window, you can find several usef[...]
-
Page 46
Expert Mode On the left side of the window ther e is a menu containing all security modules. Each module has one or more tabs where you can configure the corr esponding security settings or perform security or administrative tasks. The following table briefly describes each module. F or detailed information, please r efer to the “Expert Mode” ([...]
-
Page 47
Description Module Allows you to prevent data theft from your computer and protect your privacy while you are online. Privacy Control Allows you to protect your computer from inbound and outbound unauthorized connection attempts. It is quite similar F irewall to a guard at your gate - it will k eep a watchful eye on your Internet connection and k e[...]
-
Page 48
6.3. System T ray Icon T o manage the entire product mor e quickly, you can use the BitDefender icon in the system tray . If you double-click this icon, BitDefender will open. Also, by right-clicking the icon, a contextual menu will allow you to quickly manage the BitDefender pr oduct. T ray Icon ⚫ Show - opens the main interface of BitDefender .[...]
-
Page 49
Scan A ctivity Bar The gray bars (the File Zone ) show the number of scanned files per second, on a scale from 0 to 50. The orange bars displayed in the Net Zone show the number of Kbytes transferr ed (sent and received from the Internet) every second, on a scale from 0 to 100. Note The Scan activity bar will notify you when real-time protection or[...]
-
Page 50
3. In the General Settings category, select the check bo x corr esponding to Scan Activity Bar . 4. Click OK to save and apply the changes. 6.5. BitDefender Manual Scan BitDefender Manual Scan lets you scan a specific folder or hard disk partition without having to create a scan task. This featur e was designed to be used when Windows is running in[...]
-
Page 51
When you are done selecting the locations, click Continue . The Antivirus Scan wizard will appear and guide you through the scanning process. Scanning options. The scanning options ar e pre-configur ed for the best detection results. If infected files are detected, BitDefender will try to disinfect them (remove the malware code). If disinfection fa[...]
-
Page 52
⚫ Scan only the most important files While in Game Mode, you can see the letter G over the BitDefender icon. Using Game Mode By default, BitDefender automatically enters Game Mode when you start a game from the BitDefender's list of known games or when an application goes to full screen. BitDefender will automatically r eturn to the normal o[...]
-
Page 53
6.6.2. Laptop Mode Laptop Mode is especially designed for laptop and notebook users. Its purpose is to minimize BitDefender's impact on power consumption while these devices are running on battery . While in Laptop Mode, scheduled scan tasks are not performed, as they r equire more system resources and, implicitly, incr ease power consumption.[...]
-
Page 54
Device Detection Alert T o scan the storage device, just click Y es . The Antivirus Scan wizard will appear and guide you through the scanning pr ocess. If you do not want to scan the device, you must click No . In this case, you may find one of these options useful: ⚫ Don't ask me again about this type of device - BitDefender will no longer[...]
-
Page 55
7. F ixing Issues BitDefender uses an issue tracking system to detect and inform you about the issues that may affect the security of your computer and data. By default, it will monitor only a series of issues that are considered to be very important. However, you can configure it as needed, choosing which specific issues you want to be notified ab[...]
-
Page 56
F ix All Issues Wizard The wizar d displays the list of existing security vulnerabilities on your computer . All curr ent issues are selected to be fixed. If there is an issue that you do not want to be fix ed, just select the corr esponding check box. If you do so, its status will change to Skip . Note If you do not want to be notified about speci[...]
-
Page 57
⚫ System vulnerabilities. BitDefender automatically checks your system for vulnerabilities and alerts you about them. System vulnerabilities include the following: ▸ weak passwords to Windows user accounts. ▸ outdated softwar e on your computer . ▸ missing Windows updates. ▸ Windows Automatic Updates is disabled. When such issues are to b[...]
-
Page 58
8. Configuring Basic Settings Y ou can configure the main product settings (including changing the user interface view mode) from the basic settings window . T o open it, do any of the following: ⚫ Open BitDefender and click the Settings button in the upper -right corner of the window . ⚫ Right-click the BitDefender icon in the system tray and [...]
-
Page 59
8.1. User Interface Settings In this ar ea, you can switch the user interface view mode and reset the usage profile. Switching the user interface view mode. As described in section “ User Interface View Modes ” (p. 22) , there are three modes for displaying the user interface. Each user interface mode is designed for a specific category of user[...]
-
Page 60
8.2. Security Settings In this area, you can enable or disable product settings that cover various aspects of computer and data security . The current status of a setting is indicated using one of these icons: Green circle with a check mark: The setting is enabled. Red circle with an exclamation mark: The setting is disabled. T o enable / disable a[...]
-
Page 61
Description Setting defined. R estrictions may include blocking inappropriate web sites, as well as limiting gaming and Internet access according to a specified schedule. F irewall protects your computer from hack er and malicious outside attacks. Firewall F ile Encryption keeps your documents private by encrypting them in special vaulted drives. I[...]
-
Page 62
Description Setting Game Mode temporarily modifies protection settings so as to minimize their impact on system perfor mance during games. Game Mode Laptop Mode temporarily modifies protection settings so as to minimize their impact on the life of your laptop battery . Laptop Mode Detection This ensures that the BitDefender settings can only be cha[...]
-
Page 63
9. History and Events The View Logs link at the bottom of the BitDefender main window opens another window with the BitDefender history & events. This window offers you an overview of the security -related events. For instance, you can easily check if the update was successfully perfor med, if malwar e was found on your computer etc. Note The l[...]
-
Page 64
⚫ IM encryption ⚫ File Encryption ⚫ Game/Laptop Mode ⚫ Home Network ⚫ Update ⚫ Registration ⚫ Internet Log A list of events is available for each category . Each event comes with the following information: a short description, the action BitDefender took on it when it happened, and the date and time when it occur red. If you want to f[...]
-
Page 65
10. R egistration and My Account BitDefender Internet Security 2010 comes with 30-day trial period. During the trial period, the product is fully functional and you can test it to see if it meets your expectations. Please note that, after 15 days of evaluation, the pr oduct will cease to update, unless you cr eate a BitDefender account. Cr eating a[...]
-
Page 66
R egistration Y ou can see the BitDefender registration status, the curr ent license key and how many days are left until the license expires. T o register BitDefender Internet Security 2010: 1. T ype the license key in the edit field. Note Y ou can find your license key : ⚫ on the CD label. ⚫ on the pr oduct registration card. ⚫ in the onlin[...]
-
Page 67
10.2. Activating BitDefender T o activate BitDefender, you must create or sign in to a BitDefender account. If you did not register a BitDefender account during the initial registration wizard, you can do that as follows: ⚫ In Novice Mode, click Fix All Issues . The wizard will help you fix all pending issues, including activating the product. ?[...]
-
Page 68
Important Y ou must create an account within 15 days after installing BitDefender (if you register it with a license key, the deadline is extended to 30 days). Otherwise, BitDefender will no longer update. I do not have a BitDefender account T o successfully create a BitDefender account, follow these steps: 1. Select Create a new account . 2. T ype[...]
-
Page 69
2. T ype the e-mail addr ess and the passwor d of your account in the cor responding fields. Note If you have forgotten your password, click Forgot your password? and follow the instructions. 3. Optionally, BitDefender can inform you about special offers and promotions using the e-mail address of your account. Select one of the available options fr[...]
-
Page 70
11. Wizar ds In order to make BitDefender very easy to use, several wizar ds help you carry out specific security tasks or configure more complex product settings. This chapter describes the wizards that may appear when you fix issues or perfor m specific tasks with BitDefender . Other configuration wizards ar e described separately in the “Exper[...]
-
Page 71
Y ou can see the scan status and statistics (scanning speed, elapsed time, number of scanned / infected / suspicious / hidden objects and other). W ait for BitDefender to finish scanning. Note The scanning process may tak e a while, depending on the complexity of the scan. Password-protected archives. If BitDefender detects a password-pr otected ar[...]
-
Page 72
Actions Y ou can see the number of issues affecting your system. The infected objects are displayed in gr oups, based on the malware they ar e infected with. Click the link corr esponding to a thr eat to find out more infor mation about the infected objects. Y ou can choose an overall action to be taken for all issues or you can select separate act[...]
-
Page 73
Description Action to sear ch for and find such files on your computer, if any . Please note that these hidden files ar e not the files that you deliberately hide from Windows. They are the files hidden by special programs, known as rootkits. R ootkits are not malicious in nature. However, they are commonly used to make viruses or spyware undetecta[...]
-
Page 74
Click Close to close the window . BitDefender Could Not Solve Some Issues In most cases BitDefender successfully disinfects the infected files it detects or it isolates the infection. However, ther e are issues that cannot be solved. In these cases, we recommend you to contact the BitDefender Support T eam at www .bitdefender .com . Our support rep[...]
-
Page 75
W elcome Window If you want to skip over this window when running this wizar d in the future, select the Don't show this step the next time this wizard is run check bo x. Click Next . 11.2.2. Step 2/6 - Select T arget Here you can specify the files or folders to be scanned as well as the scan options. Wizar ds 57 BitDefender Inter net Security[...]
-
Page 76
Select T ar get Click Add T arget , select the files or folders that you want to scan and click OK . The paths to the selected locations will appear in the Scan T arget column. If you change your mind about the location, just click the Remove button next to it. Click the Remove All button to remove all the locations that wer e added to the list. Wh[...]
-
Page 77
Description Option Only the files with the extensions specified by the user will be scanned. These e xtensions must be separated by ";". Scan user defined extensions only Click Next . 11.2.3. Step 3/6 - Select Actions Here you can specif y the scanner settings and the scan level. Select A ctions ⚫ Select the actions to be taken on the i[...]
-
Page 78
Description Action Moves infected files into the quarantine. Quarantined files cannot be executed or opened; therefor e, the risk of getting infected disappears. Move files to Quarantine ⚫ Select the action to be tak en on the hidden (rootkits) files. The following options are available: Description Action No action will be tak en on hidden files[...]
-
Page 79
Custom Scan Level Specify the type of malware you want BitDefender to scan for by selecting the appropriate options: Description Option Scans for known viruses. Scan for viruses BitDefender detects incomplete virus bodies, too, thus r emoving any possible threat that could affect your system's security . Scans for adware threats. Detected file[...]
-
Page 80
Click OK to close the window . Click Next . 11.2.4. Step 4/6 - Additional Settings Before scanning begins, additional options are available: Additional Settings ⚫ T o save the custom task you are creating for future use select the Show this task in Intermediate UI check box and enter a name for the task in the pr ovided edit field. The task will [...]
-
Page 81
Scanning Note The scanning process may take a while, depending on the complexity of the scan. Y ou can click the scan progress icon in the system tray to open the scan window and see the scan progress. 11.2.6. Step 6/6 - View R esults When BitDefender completes the scanning process, the scan results will appear in a new window : Wizar ds 63 BitDefe[...]
-
Page 82
Summary Y ou can see the results summary . If you want comprehensive information on the scanning pr ocess, click View Log to view the scan log. Important If requir ed, please restart your system in order to complete the cleaning process. Click Close to close the window . 11.3. V ulnerability Check W izar d This wizar d checks the system for vulnera[...]
-
Page 83
11.3.1. Step 1/6 - Select V ulnerabilities to Check V ulnerabilities Click Next to check the system for the selected vulnerabilities. Wizar ds 65 BitDefender Inter net Security 2010[...]
-
Page 84
11.3.2. Step 2/6 - Checking for V ulnerabilities V ulnerability Check W ait for BitDefender to finish checking for vulnerabilities. Wizar ds 66 BitDefender Inter net Security 2010[...]
-
Page 85
11.3.3. Step 3/6 - Update Windows Windows Updates Y ou can see the list of critical and non-critical Windows updates that are not currently installed on your computer . Click Install All System Updates to install all the available updates. Click Next . Wizar ds 67 BitDefender Inter net Security 2010[...]
-
Page 86
11.3.4. Step 4/6 - Update Applications Applications Y ou can see the list of applications check ed by BitDefender and if they are up to date. If an application is not up to date, click the pr ovided link to download the latest version. Click Next . Wizar ds 68 BitDefender Inter net Security 2010[...]
-
Page 87
11.3.5. Step 5/6 - Change W eak P asswords User P asswords Y ou can see the list of the Windows user accounts configured on your computer and the level of pr otection their password provides. A password can be strong (hard to guess) or weak (easy to crack by malicious people with specialized softwar e). Click Fix to modify the weak passwords. A new[...]
-
Page 88
⚫ Change user password. Y ou must type the new password in the edit fields. Mak e sur e to infor m the user about the password change. Note F or a strong password, use a combination of uppercase and lowercase letters, numbers and special characters (such as # , $ or @ ). Y ou can sear ch the Internet for more information and tips on creating str [...]
-
Page 89
These wizards do not appear when you fix issues, because file vaults are an optional method of protecting your data. They can only be started from the Intermediate Mode interface of BitDefender, the File Storage tab, as follows: ⚫ Add File to V ault - starts the wizard that allows you to store your important files / documents privately by encrypt[...]
-
Page 90
Click Add T arget , select the file or folder that you want to add and click OK . The path to the selected location will appear in the Path column. If you change your mind about the location, just click the Remove button next to it. Note Y ou can select one or several locations. Click Next . Step 2/6 - Select V ault This is where you can create a n[...]
-
Page 91
Step 3/6 - Create V ault This is where you can specify infor mation for the new V ault. Create V ault T o complete the file vault related infor mation follow these steps: 1. Click Browse and choose a location for the bvd file. Note R emember that the file vault is an encrypted file on your computer with the bvd extension. 2. Select a drive letter f[...]
-
Page 92
5. Set the size of the file vault (in MB) by typing a number into the cor responding field. Click Next . Y ou will go to the step 5. Step 4/6 - P assword This is where you will be ask ed to enter the password for the selected vault. Enter passwor d T ype the password into the corr esponding field and click Next . Step 5/6 - Summary This is where yo[...]
-
Page 93
Summary Click Next . Step 6/6 - R esults This is where you can view the vault content. Wizar ds 75 BitDefender Inter net Security 2010[...]
-
Page 94
R esults Click Finish . 11.4.2. R emove V ault F iles This wizar d helps you remove files from a specific file vault. Step 1/5 - Select V ault Here you can specif y the vault to remove files from. Wizar ds 76 BitDefender Inter net Security 2010[...]
-
Page 95
Select V ault If you select Browse for a File V ault , you must click Browse and select the file vault. Y ou will go either to the step 3 if the selected vault is opened (mounted ) or to the step 2 if it is locked (unmounted). If you click Select an existing File V ault , then you must click the desir ed vault name. Y ou will go either to the step [...]
-
Page 96
Enter passwor d T ype the password into the corr esponding field and click Next . Step 3/5 - Select files This is where you will be provided with the list of the files from the previously selected vault. Wizar ds 78 BitDefender Inter net Security 2010[...]
-
Page 97
Select files Select the files to be r emoved and click Next . Step 4/5 - Summary This is where you can review chosen operations. Wizar ds 79 BitDefender Inter net Security 2010[...]
-
Page 98
Summary Click Next . Step 5/5 - R esults This is where you can view operation r esult. Wizar ds 80 BitDefender Inter net Security 2010[...]
-
Page 99
R esults Click Finish . 11.4.3. View F ile V ault This wizar d helps you open a specific file vault and view the files it contains. Step 1/4 - Select V ault Here you can specif y the vault to view files fr om. Wizar ds 81 BitDefender Inter net Security 2010[...]
-
Page 100
Select V ault If you select Browse for a File V ault , you must click Browse and select the file vault. Y ou will go either to the step 3 if the selected vault is opened (mounted ) or to the step 2 if it is locked (unmounted). If you click Select an existing File V ault , then you must click the desir ed vault name. Y ou will go either to the step [...]
-
Page 101
Enter passwor d T ype the password into the corr esponding field and click Next . Step 3/4 - Summary This is where you can review chosen operations. Wizar ds 83 BitDefender Inter net Security 2010[...]
-
Page 102
Summary Click Next . Step 4/4 - R esults This is where you can view the files of the vault. Wizar ds 84 BitDefender Inter net Security 2010[...]
-
Page 103
R esults Click Finish . 11.4.4. Lock F ile V ault This wizar d helps you lock a specific file vault in order to protect its content. Step 1/3 - Select V ault Here you can specif y the vault to lock. Wizar ds 85 BitDefender Inter net Security 2010[...]
-
Page 104
Select V ault If you select Browse for a File V ault , you must click Browse and select the file vault. If you click Select an existing File V ault , then you must click the desir ed vault name. Click Next . Step 2/3 - Summary This is where you can review chosen operations. Wizar ds 86 BitDefender Inter net Security 2010[...]
-
Page 105
Summary Click Next . Step 3/3 - R esults This is where you can view operation r esult. Wizar ds 87 BitDefender Inter net Security 2010[...]
-
Page 106
R esults Click Finish . Wizar ds 88 BitDefender Inter net Security 2010[...]
-
Page 107
Inter mediate Mode 89 BitDefender Inter net Security 2010[...]
-
Page 108
12. Dashboard The Dashboard tab provides information regarding the security status of your computer and allows you to fix pending issues. Dashboard The dashboar d consists of the following sections: ⚫ Overall Status - Indicates the number of issues affecting your computer and helps you fix them. If there are any pending issues, you will see a red[...]
-
Page 109
Click the name of a module to see more details about its status and to configur e status tracking for its components. ⚫ Usage Profile - Indicates the usage profile that is currently selected and offers a link to a relevant task for that pr ofile: ▸ When the T ypical profile is selected, the Scan Now button allows you to perform a System Scan us[...]
-
Page 110
13. Security BitDefender comes with a Security module that helps you keep your BitDefender up to date and your computer virus free. T o enter the Security module, click the Security tab. Security The Security module consists of two sections: ⚫ Status Area - Displays the current status of all monitored security components and allows you to choose [...]
-
Page 111
Red circle with an exclamation mark: Issues affect the component. The sentences describing issues are written in red. Just click the Fix button corr esponding to a sentence to fix the reported issue. If an issue is not fixed on the spot, follow the wizard to fix it. 13.1.1. Configuring Status T racking T o select the components BitDefender should m[...]
-
Page 112
Description Issue The malware signatures of your BitDefender product are not being automatically updated on a regular basis. Automatic Update is disabled The malware signatures of your BitDefender product are outdated. The update has not been performed for x days ⚫ Firewall - BitDefender monitors the status of the F irewall feature. If it is not [...]
-
Page 113
13.2. Quick T asks This is where you can find links to the most important security tasks: ⚫ Update Now - starts an immediate update. ⚫ System Scan - starts a standard scan of your computer (archives e xcluded). F or additional on-demand scan tasks, click the arrow on this button and select a different scan task: My Documents Scan or Deep System[...]
-
Page 114
The update process is performed on the fly, meaning that the files to be updated are replaced pr ogressively . In this way, the update process will not affect product operation and, at the same time, all vulnerabilities will be excluded. If you want to close this window, just click Cancel . However, this will not stop the update pr ocess. Note If y[...]
-
Page 115
the scanning process. For detailed information about this wizard, please refer to “ Antivirus Scan Wizard ” (p. 52) . When you run a Custom Scan, the Custom Scan wizard will guide you through the scanning process. Follow the six-step guided procedur e to scan specific files or folders. For detailed information about this wizard, please refer to[...]
-
Page 116
14. P arental BitDefender Internet Security 2010 includes a Par ental Control module. P ar ental Control enables you to r estrict your children's access to Internet and to specific applications. T o check the status of Par ental Control, click the Parental tab. P ar ental The P arental module consists of two sections: ⚫ Status Area - Allows [...]
-
Page 117
If you want BitDefender to monitor the P arental Control module, click Configure Status T racking and select the Enable alerts check box for this module. 14.2. Quick T asks This is where you can find links to the most important security tasks: ⚫ Update Now - starts an immediate update. ⚫ System Scan - starts a full scan of your computer (archiv[...]
-
Page 118
If you want to close this window, just click Cancel . However, this will not stop the update pr ocess. Note If you are connected to the Internet through a dial-up connection, then it is recommended to r egularly update BitDefender by user r equest. Restart the computer if required. In case of a major update, you will be ask ed to r estart your comp[...]
-
Page 119
15. F ile V ault BitDefender comes with a F ile V ault module that helps you k eep your data not only safe, but confidential. T o achieve this goal, use file encryption. With this feature you can pr otect files by placing them in file vaults. ⚫ The file vault is a secured storage space for personal information or sensitive files. ⚫ The file vau[...]
-
Page 120
⚫ Status Area - Allows you to see the full list of monitored components. Y ou can choose which of the components to be monitored. It is recommended to enable the monitoring option for all of them. ⚫ Quick T asks - This is where you can find links to the most important security tasks: adding, viewing, locking and r emoving file vaults. 15.1. Sta[...]
-
Page 121
16. Network The Network module allows you to manage the BitDefender products installed on your home computers from a single computer . T o enter the Network module, click the Network tab. Network T o be able to manage the BitDefender products installed on your home computers, you must follow these steps: 1. Join the BitDefender home network on your[...]
-
Page 122
⚫ Scan All - allows you to scan all managed computers at the same time. ⚫ Update All allows you to update all managed computers at the same time. ⚫ Register All allows you to register all managed computers at the same time. 16.1.1. Joining the BitDefender Network T o join the BitDefender home network, follow these steps: 1. Click Enable Netwo[...]
-
Page 123
2. T ype the home management password and click OK . A new window will appear . Add Computer Y ou can see the list of computers in the network. The icon meaning is as follows: ⚫ Indicates an online computer with no BitDefender products installed. ⚫ Indicates an online computer with BitDefender installed. ⚫ Indicates an offline computer with B[...]
-
Page 124
Authenticate 5. T ype the home management password configured on the respective computer . 6. Click OK . If you have provided the correct password, the selected computer name will appear in the network map. Note Y ou can add up to five computers to the network map. 16.1.3. Managing the BitDefender Network Once you have successfully cr eated a BitDe[...]
-
Page 125
Network Map If you move the mouse cursor over a computer from the network map, you can see brief information about it (name, IP address, number of issues affecting the system security, BitDefender registration status). If you right-click a computer name in the network map, you can see all the administrative tasks you can run on the remote computer [...]
-
Page 126
Allows you to fix the issues that are affecting the security of this computer by following the F ix All Issues wizard. ⚫ View History/Events Allows you access to the History&Events module of the BitDefender product installed on this computer . ⚫ Update Now Intitiates the Update process for the BitDefender product installed on this computer [...]
-
Page 127
Enter P assword 2. Select a scan type. ⚫ System Scan - starts a full scan of your computer (archives excluded). ⚫ Deep System Scan - starts a full scan of your computer (archives included). ⚫ My Documents Scan - starts a quick scan of your documents and settings. Select Scan T ype 3. Click OK . 16.1.5. Updating All Computers T o update all ma[...]
-
Page 128
2. Click OK . 16.1.6. R egistering All Computers T o register all managed computers, follow these steps: 1. Click Register All . Y ou will be prompted to provide the local home management password. Enter P assword 2. Enter the key you want to r egister with. R egister All 3. Click OK . Network 110 BitDefender Inter net Security 2010[...]
-
Page 129
Expert Mode 111 BitDefender Inter net Security 2010[...]
-
Page 130
17. General The General module pr ovides information on the BitDefender activity and the system. Here you can also change the overall behavior of BitDefender . 17.1. Dashboard T o see if any issues affect your computer, as well as pr oduct activity statistics and your r egistration status, go to General>Dashboard in Expert Mode. Dashboard The da[...]
-
Page 131
⚫ Network Activity - Indicates the evolution of the network traffic filtered by BitDefender F irewall. The height of the bar indicates the intensity of the traffic during that time interval. 17.1.1. Overall Status This is where you can find out the number of issues that are affecting the security of your computer . T o remove all threats, click F[...]
-
Page 132
Description Issue An on demand system scan was never performed to check if files stored on your computer are malware free. Y ou have never scanned your computer for malware A full system scan was started but not completed. The last system scan you started was aborted before it finished R eal-time protection is disabled and a system scan is over due[...]
-
Page 133
Description Status BitDefender does not check for potential vulnerabilities regar ding missing Windows updates, application updates or weak passwords. V ulnerability Check is disabled BitDefender found missing Windows/application updates and/or weak passwords. Multiple vulnerabilities were detected Critical Microsof t updates are available but not [...]
-
Page 134
Description Item scan your computer as soon as possible. T o scan the entir e computer, go to Antivirus , V irus Scan tab, and run either F ull System Scan or Deep System Scan. Indicates the next time when your computer is going to be scanned. Next scan 17.1.3. Overview This is wher e you can see the update status, your account status, registration[...]
-
Page 135
General Settings Here you can set the overall behavior of BitDefender . By default, BitDefender is loaded at Windows startup and then runs minimized in the taskbar . 17.2.1. General Settings ⚫ Enable password protection for product settings - enables setting a password in order to protect the BitDefender configuration. Note If you ar e not the on[...]
-
Page 136
Enter passwor d T ype the password in the Password field, re-type it in the Retype password field and click OK . Once you have set the password, you will be asked for it whenever you want to change the BitDefender settings. The other system administrators (if any) will also have to provide this password in order to change the BitDefender settings. [...]
-
Page 137
Note This option can be configured only for the current Windows user account. The Scan activity bar is only available when the interface is in Expert Mode. 17.2.2. Virus R eport Settings ⚫ Send virus reports - sends to the BitDefender Labs reports regarding viruses identified in your computer . It helps us k eep track of virus- outbr eaks. The re[...]
-
Page 138
System Infor mation The list contains all the items loaded when starting the system as well as the items loaded by different applications. Three buttons are available: ⚫ Restore - changes a current file association to default. A vailable for the File Associations settings only! ⚫ Go to - opens a window wher e the selected item is placed (the Re[...]
-
Page 139
18. Antivirus BitDefender protects your computer from all kinds of malware (viruses, T rojans, spyware, r ootkits and so on). The protection BitDefender offers is divided into two categories: ⚫ R eal-time protection - prevents new malware threats fr om entering your system. BitDefender will, for e xample, scan a word document for known thr eats w[...]
-
Page 140
R eal-time Protection Y ou can see whether Real-time protection is enabled or disabled. If you want to change the R eal-time protection status, clear or select the corr esponding check bo x. Important T o prevent viruses from infecting your computer keep Real-time protection enabled. T o start a system scan, click Scan Now . 18.1.1. Configuring Pr [...]
-
Page 141
Description Pr otection level Only programs and incoming mail messages are scanned for viruses. Besides the classical signature-based scan, the heuristic analysis is also used. The actions tak en on infected files are the following: disinfect file/move file to quarantine. Offers standar d security . The r esource consumption level is low . Default [...]
-
Page 142
Shield Settings The scan options ar e organized as an expandable menu, very similar to those used for exploration in Windows. Click the bo x with "+" to open an option or the box with "-" to close an option. Note Y ou can observe that some scan options, although the "+" sign appears, cannot be opened. The reason is tha[...]
-
Page 143
Description Option .doc ; .dot ; .xls ; .ppt ; .wbk ; .wiz ; .pot ; .ppa ; .xla ; .xlt ; .vbs ; .vbe ; .mdb ; .rtf ; .htm ; .hta ; .html ; .xml ; .xtp ; .php ; .asp ; .js ; .shs ; .chm ; .lnk ; .pif ; .prc ; .url ; .smm ; .pdf ; .msi ; .ini ; .csc ; .cmd ; .bas ; .eml and .nws . Only the files with the extensions specified by the user will be scann[...]
-
Page 144
Description Option Moves infected files into the quarantine. Quarantined files cannot be ex ecuted or Move file to quarantine opened; therefor e, the risk of getting infected disappears. Select from the drop-down menu the second action to tak e on infected files, in case the first action fails. Second action In case an infected file is detected, th[...]
-
Page 145
Description Option Scans all incoming e-mail messages. Scan incoming e-mail Scans all outgoing e-mail messages. Scan outgoing e-mail ⚫ Scan web (HTTP) traffic - scans the http traffic. ⚫ Show warning when a virus is found - opens an alert window when a virus is found in a file or in an e-mail message. F or an infected file the alert window will[...]
-
Page 146
BitDefender A VC Alert If you know and trust the detected application, click Allow . If you want to immediately close the application, click OK . Select the Rememeber this action for this application check bo x before making your choice and BitDefender will tak e the same action for the detected application in the future. The rule that is thus crea[...]
-
Page 147
Important K eep the Active Virus Control enabled in order to be protected against unknown viruses. If you want to be alerted and prompted for action by Active V irus Control whenever an application tries to perform a possible malicious action, select the Ask me before taking an action check box. Configuring the Pr otection Level The A VC protection[...]
-
Page 148
⚫ Remove - remove an application fr om the list. ⚫ Edit - edit an application rule. 18.1.4. Disabling R eal-time Pr otection If you want to disable r eal-time protection, a war ning window will appear . Y ou must confirm your choice by selecting fr om the menu how long you want the real-time protection to be disabled. Y ou can disable real-time[...]
-
Page 149
Antiphishing White List Y ou can see the web sites that BitDefender does not currently check for phishing content. T o add a new web site to the white list, type its url address in the New address field and click Add . The white list should contain only web sites you fully trust. For example, add the web sites where you currently shop online. Note [...]
-
Page 150
There is a risk that a virus is already lodged in your system, before you even install BitDefender . This is why it's a very good idea to scan your computer for resident viruses after you've installed BitDefender . And it's definitely a good idea to fr equently scan your computer for viruses. T o configur e and initiate on-demand sca[...]
-
Page 151
There are three categories of scan tasks: ⚫ System tasks - contains the list of default system tasks. The following tasks are available: Description Default T ask Scans the entir e system. In the default configuration, it scans for all types of malware threatening your Deep System Scan system's security, such as viruses, spywar e, adware, ro[...]
-
Page 152
⚫ Delete - removes the selected task. Note Not available for system tasks. Y ou cannot r emove a system task. ⚫ Scan Now - runs the selected task, initiating an immediate scan . T o the left of each task you can see the Properties button, that allows you to configure the task and view the scan logs. 18.2.2. Using Shortcut Menu A shortcut menu i[...]
-
Page 153
⚫ Clone task - duplicates the selected task. This is useful when cr eating new tasks, as you can modify the settings of the task duplicate. ⚫ Delete - deletes the selected task. Note Not available for system tasks. Y ou cannot r emove a system task. ⚫ Properties - opens the Properties window, Overview tab, where you can change the settings of[...]
-
Page 154
Overview Here you can see information about the task (name, last run and schedule status) and set the scan settings. Choosing Scan L evel Y ou can easily configur e the scan settings by choosing the scan level. Drag the slider along the scale to set the appropriate scan level. There are 3 scan levels: Description Pr otection level Offers reasonable[...]
-
Page 155
Description Pr otection level All files and archives are scanned for viruses and spywar e. Besides the classical signature-based scan, the heuristic analysis is also used. A series of general options for the scanning process are also available: ⚫ Run the task with Low priority. Decr eases the priority of the scan pr ocess. Y ou will allow other p[...]
-
Page 156
The scan options ar e organized as an expandable menu, very similar to those used for exploration in Windows. Click the bo x with "+" to open an option or the box with "-" to close an option. The scan options are grouped into 3 categories: ⚫ Scan Level. Specify the type of malware you want BitDefender to scan for by selecting [...]
-
Page 157
Description Option wbk ; wiz ; pot ; ppa ; xla ; xlt ; vbs ; vbe ; mdb ; rtf ; htm ; hta ; html ; xml ; xtp ; php ; asp ; js ; shs ; chm ; lnk ; pif ; prc ; url ; smm ; pdf ; msi ; ini ; csc ; cmd ; bas ; eml and nws . Only the files with the extensions specified by the user will be scanned. These extensions must be separated by ";". Scan[...]
-
Page 158
Description Action No action will be tak en on infected files. These files will appear in the r eport file. T ake No Action R emove the malwar e code from the infected files detected. Disinfect files Deletes infected files immediately, without any warning. Delete files Moves infected files into the quarantine. Quarantined files cannot be ex ecuted [...]
-
Page 159
Description Action Moves hidden files into the quarantine. Quarantined files cannot be ex ecuted or opened; therefor e, the risk of getting infected disappears. Move files to Quarantine Note Please note that these hidden files are not the files that you deliberately hide from Windows. They are the files hidden by special programs, known as rootkits[...]
-
Page 160
– Action to take when an encrypted suspect file is found. Select the action to be tak en on suspicious files that are encrypted using Windows. The following options are available: Description Action Only log the suspicious files that are encrypted using Windows. Af ter the scan is completed, you T ake no action can open the scan log to view infor[...]
-
Page 161
Scan T ar get Y ou can see the list of local, network and removable drives as well as the files or folders added previously, if any . All checked items will be scanned when running the task. The section contains the following buttons: ⚫ Add F older(s) - opens a browsing window where you can select the file(s) / folder(s) that you want to be scann[...]
-
Page 162
⚫ All Entries - to scan all drives, no matter if they are local, in the network or removable. Note If you want to scan your entir e computer, select the checkbo x corr esponding to All Entries . Click OK to save the changes and close the window . T o run the task, just click Scan . Viewing the Scan T arget of System T asks Y ou can not modify the[...]
-
Page 163
Scheduling Scan T asks With complex tasks, the scanning process will tak e some time and it will work best if you close all other programs. That is why it is best for you to schedule such tasks when you are not using your computer and it has gone into the idle mode. T o see the schedule of a specific task or to modify it, right-click the task and s[...]
-
Page 164
Click OK to save the changes and close the window . T o run the task, just click Scan . 18.2.5. Scanning F iles and F olders Before you initiate a scanning process, you should make sure that BitDefender is up to date with its malware signatures. Scanning your computer using an outdated signature database may prevent BitDefender from detecting new m[...]
-
Page 165
Immediate Scanning T o scan your computer or part of it you can run the default scan tasks or your own scan tasks. This is called immediate scanning. T o run a scan task, use one of the following methods: ⚫ double-click the desired scan task in the list. ⚫ click the Scan now button corr esponding to the task. ⚫ select the task and then click [...]
-
Page 166
Drag F ile Drop F ile The Antivirus Scan wizard will appear and guide you through the scanning process. Manual Scanning Manual scanning consists in dir ectly selecting the object to be scanned using the BitDefender Manual Scan option from the BitDefender program group in the Start Menu. Note Manual scanning is very useful, as it can be performed wh[...]
-
Page 167
Manual Scanning Click Add F older , select the location you want to scan and click OK . If you want to scan multiple folders, repeat this action for each additional location. The paths to the selected locations will appear in the Scan T arget column. If you change your mind about the location, just click the Remove button next to it. Click the Remo[...]
-
Page 168
Scanning Y ou can see the scan status and statistics (scanning speed, elapsed time, number of scanned / infected / suspicious / hidden objects and other). W ait for BitDefender to finish scanning. Note The scanning process may tak e a while, depending on the complexity of the scan. Password-protected archives. If BitDefender detects a password-pr o[...]
-
Page 169
Stopping or pausing the scan. Y ou can stop scanning anytime you want by clicking Stop&Y es . Y ou will go directly to the last step of the wizar d. T o temporarily stop the scanning process, just click P ause . Y ou will have to click Resume to r esume scanning. Step 2/3 - Select A ctions When the scanning is completed, a new window will appea[...]
-
Page 170
Description Action R emoves the malware code from infected files. Disinfect Deletes detected files. Delete Moves detected files to quarantine. Quarantined files cannot be ex ecuted or opened; therefor e, the risk of getting infected disappears. Move to quarantine Changes the name of hidden files by appending .bd.ren to their name. As a result, you [...]
-
Page 171
Summary Y ou can see the results summary . If you want comprehensive information on the scanning pr ocess, click View log to view the scan log. Important If requir ed, please restart your system in order to complete the cleaning process. Click Close to close the window . BitDefender Could Not Solve Some Issues In most cases BitDefender successfully[...]
-
Page 172
18.2.6. Viewing Scan Logs T o see the scan results after a task has run, right-click the task and select Logs . The following window will appear: Scan L ogs Here you can see the report files generated each time the task was e xecuted. F or each file you are provided with information on the status of the logged scanning process, the date and time wh[...]
-
Page 173
Scan L og Example The scan log contains detailed information about the logged scanning process, such as scanning options, the scanning target, the threats found and the actions tak en on these threats. 18.3. Objects Ex cluded fr om Scanning There are cases when you may need to exclude certain files from scanning. F or example, you may want to ex cl[...]
-
Page 174
Note The objects excluded from on-access scanning will not be scanned, no matter if they are accessed by you or by an application. T o see and manage the objects ex cluded fr om scanning, go to Antivirus>Exceptions in Expert Mode. Exceptions Y ou can see the objects (files, folders, extensions) that ar e ex cluded fr om scanning. F or each objec[...]
-
Page 175
type of scanning you want them to be excluded from, as needed. Make the necessary changes and click OK . Note Y ou can also right-click an object and use the options on the shortcut menu to edit or delete it. Y ou can click Discard to revert the changes made to the rule table, pr ovided that you have not saved them by clicking Apply . 18.3.1. Exclu[...]
-
Page 176
Step 2/4 - Specify Excluded P aths Excluded P aths T o specify the paths to be excluded from scanning use either of the following methods: ⚫ Click Browse , select the file or folder that you want to be ex cluded from scanning and then click Add . ⚫ T ype the path that you want to be ex cluded fr om scanning in the edit field and click Add . Not[...]
-
Page 177
Step 3/4 - Select Scanning T ype Scanning T ype Y ou can see a table containing the paths to be e xcluded from scanning and the type of scanning they are excluded from. By default, the selected paths are ex cluded from both on-access and on-demand scanning. T o change when to apply the exception, click on the right column and select the desired opt[...]
-
Page 178
Step 4/4 - Scan Excluded F iles Scan Ex cluded F iles It is highly recommended to scan the files in the specified paths to mak e sure that they are not infected. Select the check box to scan these files befor e excluding them fr om scanning. Click Finish . 18.3.2. Excluding Extensions fr om Scanning T o exclude extensions from scanning, click the A[...]
-
Page 179
Step 1/4 - Select Object T ype Object T ype Select the option of ex cluding extensions from scanning. Click Next . Antivirus 161 BitDefender Inter net Security 2010[...]
-
Page 180
Step 2/4 - Specify Excluded Extensions Excluded Extensions T o specify the extensions to be ex cluded from scanning use either of the following methods: ⚫ Select from the menu the extension that you want to be excluded from scanning and then click Add . Note The menu contains a list of all the extensions registered on your system. When you select[...]
-
Page 181
Step 3/4 - Select Scanning T ype Scanning T ype Y ou can see a table containing the extensions to be ex cluded from scanning and the type of scanning they ar e ex cluded fr om. By default, the selected extensions are excluded from both on-access and on-demand scanning. T o change when to apply the exception, click on the right column and select the[...]
-
Page 182
Step 4/4 - Select Scanning T ype Scanning T ype It is highly recommended to scan the files having the specified extensions to make sure that they ar e not infected. Click Finish . 18.4. Quarantine Ar ea BitDefender allows isolating the infected or suspicious files in a secur e ar ea, named quarantine. By isolating these files in the quarantine, the[...]
-
Page 183
Quarantine The Quarantine section displays all the files currently isolated in the Quarantine folder . For each quarantined file, you can see its name, the name of the detected virus, the path to its original location and the submission date. Note When a virus is in quarantine it cannot do any harm because it cannot be ex ecuted or read. 18.4.1. Ma[...]
-
Page 184
18.4.2. Configuring Quarantine Settings T o configure the quarantine settings, click Settings . A new window will appear . Quarantine Settings Using the quarantine settings, you can set BitDefender to automatically perform the following actions: Delete old files. T o automatically delete old quarantined files, check the corr esponding option. Y ou [...]
-
Page 185
Automatically submit files. T o automatically submit quarantined files, check the cor responding option. Y ou must specify the frequency with which to submit files. Note By default, BitDefender will automatically submit quarantined files every 60 minutes. Scan quarantined files after update. T o automatically scan quarantined files after each updat[...]
-
Page 186
19. Antispam BitDefender Antispam employs remark able technological innovations and industry standard antispam filters to weed out spam befor e it r eaches the user's Inbox. 19.1. Antispam Insights Spam is a growing problem, both for individuals and for or ganizations. It's not pretty, you wouldn't want your kids to see it, it can ge[...]
-
Page 187
Image F ilter Since avoiding heuristic filter detection has become quite a challenge, nowadays' inbo x folders are full with more and more messages only containing an image with unsolicited content. T o cope with this growing pr oblem, BitDefender introduced the Image filter that compar es the image signature from the e-mail with those from th[...]
-
Page 188
trace a certain scent. Sometimes the filter must be corr ected too - prompted to adjust when it makes a wrong decision. Important Y ou can correct the Bayesian filter using the Is Spam and Not Spam buttons from the Antispam toolbar . 19.1.2. Antispam Operation The BitDefender Antispam Engine uses all antispam filters combined to determine whether a[...]
-
Page 189
characteristics of SP AM. The result is that it will add a Spam score to the e-mail, too. Note If the e-mail is tagged as SEXUALL Y EXPLICIT in the subject line, BitDefender will consider it SP AM. The Bayesian filter module will further analyze the message, according to statistical information regar ding the rate at which specific words appear in [...]
-
Page 190
Antispam Status Y ou can see whether Antispam is enabled or disabled. If you want to change the Antispam status, clear or select the corresponding check bo x. Important T o prevent spam from entering your Inbox , k eep the Antispam filter enabled. In the Statistics section you can view the r esults of the antispam activity presented per session (si[...]
-
Page 191
Description Pr otection level Offers protection for accounts that receive a lot of legitimate commercial mail. The filter will let most Permissive e-mail pass through, but it may produce false negatives (spam classified as legitimate mail). Offers protection for accounts that r eceive some legitimate commercial mail. The filter will let most Permis[...]
-
Page 192
F riends List Here you can add or remove entries from the F riends list . If you want to add an e-mail address check the E-mail address option, type in the address and click . The addr ess will appear in the F riends list . Important Syntax: name@domain.com. If you want to add a domain check the Domain name option, type in the domain and click . Th[...]
-
Page 193
Y ou can save the F riends list to a file so that you can use it on another computer or after reinstalling the product. T o save the F riends list, click the Save button and save it to the desired location. The file will have a .bwl e xtension. T o load a previously saved F riends list, click the Load button and open the corr esponding .bwl file. T[...]
-
Page 194
Spammers List Here you can add or remove entries from the Spammers list . If you want to add an e-mail address check the Email address option, type in the address and click . The addr ess will appear in the Spammers list . Important Syntax: name@domain.com. If you want to add a domain check the Domain name option, type in the domain and click . The[...]
-
Page 195
from any r egistered user of such a service will be detected as spam. If, for example, you add yahoo.com to the Spammers list, all e-mail messages coming from yahoo.com addresses will be mark ed as [spam] . T o delete an item from the list, select it and click the Remove button. T o delete all entries fr om the list, click the Clear list button and[...]
-
Page 196
Antispam Settings Three categories of options are available ( Antispam settings , Basic Antispam filters and Advanced Antispam filters ) organized lik e an expandable menu, similar to those from Windows. Note Click the box labeled "+" to open a category or click the one labeled "-" to close it. T o enable/disable an option selec[...]
-
Page 197
19.3.2. Basic Antispam F ilters ⚫ Enable F riends/Spammers lists - filter e-mail messages using the F riends/Spammers lists . ▸ Automatically add recipients to F riends list - automatically add recipients of sent mail to F riends list. ▸ Automatically add to F riends list - when you click the Not Spam button from the Antispam toolbar , the se[...]
-
Page 198
20. P arental Contr ol BitDefender P arental Control enables you to control the access to the Inter net and to specific applications for each user holding a user account on the system. Y ou can configure P arental Control to block: ⚫ inappropriate web pages. ⚫ Internet access, for specific periods of time (such as when it's time for lesson[...]
-
Page 199
P ar ental Control Y ou can see information regarding the P arental Control status for each Windows user account. The age category is listed below each user name if P ar ental Control is enabled. If P arental Control is disabled, the status is not configured . Additionally, you can see the status of each P arental Control featur e per user : Green [...]
-
Page 200
P ar ental Control Status T o configure the P arental Control for this user account, follow these steps: 1. Enable the P arental Control for this user account by selecting the Parental Control check box. Important K eep the P arental Control enabled in order to protect your children against inappropriate content by using your customized computer ac[...]
-
Page 201
⚫ W eb - to filter web navigation according to the rules set by you in the W eb section. ⚫ Applications - to block access to the applications specified by you in the Applications section. ⚫ Keywords - to filter web, mail and instant messaging access accor ding to the rules set by you in the Keywor ds section. ⚫ IM - to allow or block chat w[...]
-
Page 202
T o set the password pr otection, do the following: 1. T ype the password in the Password field. 2. T ype the password again in the Retype Password field to confirm it. 3. Click OK to save the password and close the window . Once you set the password, if you want to change the P arental Control settings, you will be ask ed to provide the password. [...]
-
Page 203
W eb F ilter Categories Select the check bo x cor responding to a category you want to block and the user will no longer be allowed to access websites matching that category . T o mak e your selection easier, the categories of web content are listed according to the age group for which one could consider them appropriate: ⚫ Child Profile Categori[...]
-
Page 204
⚫ T eenager Profile Categories includes content that may be consider ed safe for children between 14 and 18 years old. Description Category W ebsites used to mask the URL of a requested website. W eb Proxy Block er Online magazines. T abloids Online casinos, betting websites, websites offering betting tips, betting forums, etc. Gambling Online sh[...]
-
Page 205
⚫ Send me an activity report via e-mail. An e-mail notification is sent every time BitDefender Par ental Control blocks an activity . ⚫ Save an internet traffic log. Logs the websites visited by users for whom P ar ental Control is enabled. 20.2.1. Checking Visited W ebsites BitDefender logs by default the websites visited by your childr en. T [...]
-
Page 206
⚫ If the server uses a different port than the default port 25, type it in the corr esponding field. ⚫ Sender's e-mail address - type the address you want to appear in the F rom field of the e-mail. ⚫ Recipient's e-mail address - type the address where you want the r eports to be e-mailed. ⚫ If the server requir es authentication,[...]
-
Page 207
W eb Control T o enable this protection select the check bo x corresponding to Enable W eb Control . 20.3.1. Creating W eb Control R ules T o allow or block access to a website, follow these steps: 1. Click Allow Site or Block Site . A new window will appear: P arental Control 189 BitDefender Inter net Security 2010[...]
-
Page 208
Specify W ebsite 2. Enter the website address in the W ebsite field. Syntax: ⚫ *.xxx.com - the action of the rule will apply on all web sites finished with .xxx.com ; ⚫ *porn* - the action of the rule will apply on all web sites containing porn in the web site address; ⚫ www.*.com - the action of the rule will apply on all web sites having th[...]
-
Page 209
⚫ Allow all sites, except the ones in the list . Select this option to allow access to all websites except those for which you have set the Block action. ⚫ Block all sites, except the ones in the list . Select this option to block access to all websites except those for which you have set the Allow action. 20.4. W eb Time Limiter The Web Time L[...]
-
Page 210
can click Block all to select all the cells and, implicitly, to block all the web access. If you click Allow all , the internet connections will be per mitted all the time. Important The bo xes coloured in grey repr esent the time intervals when all internet connections are block ed. 20.5. Applications Contr ol The Applications Control helps you to[...]
-
Page 211
20.5.1. Creating Application Control R ules T o block or restrict access to an application, follow these steps: 1. Click Block Application or Restrict Application . A new window will appear: Specify Application 2. Click Browse to locate the application to which you want to block/r estrict access. 3. Select the action of the rule: ⚫ Block permanen[...]
-
Page 212
T o edit a rule, select it, click the Edit button and make the necessary changes in the configuration window . T o delete a rule, select it and click the Delete button. 20.6. K eywords Control K eywords Control helps you block users' access to e-mail messages, web pages and instant messages that contain specific words. Using K eywords Control,[...]
-
Page 213
20.6.1. Creating K eywords Control R ules T o block a word or phrase, follow these steps: 1. Click Block Keyword . A new window will appear : Specify K eyword 2. T ype the word or phrase you want to block in the edit field. If you want only whole words to be detected, select the Match whole words check box. 3. Select the traffic type BitDefender sh[...]
-
Page 214
20.7. Instant Messaging (IM) Contr ol The Instant Messaging (IM) Control allows you to specify the IM contacts your children are allowed to chat with. Note The IM Control is only available for Y ahoo Messenger and Windows Live (MSN) Messenger . T o configure IM Control for a specific user account, click the Modify button corr esponding to that user[...]
-
Page 215
Add IM contact 2. T ype the contact's name in the Name field. 3. T ype the e-mail addr ess or the user name used by the IM contact in the E-mail or IM ID field. 4. Choose the IM program the contact associates with. 5. Select the action for this rule - Block or Allow 6. Click Finish to add the rule. 20.7.2. Managing Instant Messaging (IM) Contr[...]
-
Page 216
21. Privacy Control BitDefender monitors dozens of potential “hotspots” in your system where spyware might act, and also checks any changes made to your system and softwar e. It is effective in blocking T rojan horses and other tools installed by hack ers, who try to compromise your privacy and send your personal information, like credit card n[...]
-
Page 217
⚫ Identity Control - protects your confidential data by filtering all outgoing web (HTTP), e-mail (SMTP) and instant messaging traffic according to the rules you create in the Identity section. ⚫ R egistry Control - asks for your per mission whenever a program tries to modify a r egistry entry in order to be ex ecuted at W indows start-up. ⚫ [...]
-
Page 218
Y ou can create rules to protect any piece of infor mation you might consider personal or confidential, from your phone number or e-mail address to your bank account information. Multiuser support is provided so that users logging on to different Windows user accounts can configure and use their own identity protection rules. If your Windows accoun[...]
-
Page 219
Identity Contr ol If you want to use Identity Control, follow these steps: 1. Select the Enable Identity Control check bo x. 2. Create rules to protect your sensitive data. For more infor mation, please refer to “ Creating Identity Rules ” (p. 201) . 3. If needed, define specific ex clusions from the rules you have created. F or more informatio[...]
-
Page 220
Step 1/4 - W elcome Window W elcome Window Click Next . Step 2/4 - Set R ule T ype and Data Set R ule T ype and Data Y ou must set the following parameters: Privacy Control 202 BitDefender Inter net Security 2010[...]
-
Page 221
⚫ Rule Name - type the name of the rule in this edit field. ⚫ Rule T ype - choose the rule type (addr ess, name, cr edit card, PIN, SSN etc). ⚫ Rule Data - type the data you want to protect in this edit field. For example, if you want to protect your credit card number, type all or part of it here. Note If you enter less than three characters[...]
-
Page 222
Y ou can choose to apply the rule only if the rule data matches whole words or if the rule data and the detected string case match. Specify the users for which the rule applies. ⚫ Only for me (current user) - the rule will apply only to your user account. ⚫ Limited user accounts - the rule will apply to you and all limited Windows accounts. ⚫[...]
-
Page 223
T o open the window where you can manage ex ceptions, click Exclusions . Exclusions T o add an exception, follow these steps: 1. Click the Add button to add a new entry in the table. 2. Double-click Specify excluded item and provide the web site, the e-mail addr ess or the IM contact that you want to add as e xception. 3. Double-click T raffic type[...]
-
Page 224
Edit R ule Here you can change the name, description and parameters of the rule (type, data and traffic). Click OK to save the changes. 21.2.4. R ules Defined by Other Administrators When you ar e not the only user with administrative rights on your system, the other administrators can create identity rules of their own. In case you want rules crea[...]
-
Page 225
Registry Control keeps an eye on the Windows R egistry - this is again useful for detecting T rojan horses. It will alert you whenever a program will try to modify a registry entry in or der to be executed at Windows start-up. R egistry Alert Y ou can see the program that is trying to modify Windows R egistry . If you do not recognize the program a[...]
-
Page 226
R egistry Control Y ou can see the rules created so far listed in the table. T o delete a rule, select it and click the Delete button. 21.4. Cookie Contr ol Cookies are a very common occurr ence on the Internet. They are small files stor ed on your computer . W ebsites create these cookies in order to k eep track of specific information about you. [...]
-
Page 227
Cookie Alert Y ou can see the name of the application that is trying to send the cookie file. Click Y es or No and a rule will be cr eated, applied and listed in the rules table. This will help you to choose which websites you trust and which you don't. Note Because of the great number of cookies used on the Internet today, Cookie Control can [...]
-
Page 228
Cookie Contr ol Y ou can see the rules created so far listed in the table. Important The rules are listed in order of their priority starting fr om the top, meaning the first rule has the highest priority . Drag&drop rules in order to change their priority . T o delete a rule, select it and click the Delete button. T o modify the rule parameter[...]
-
Page 229
Select A ddress, Action and Direction Y ou can set the parameters: ⚫ Domain address - type in the domain on which the rule should apply . ⚫ Action - select the action of the rule. Description Action The cookies on that domain will execute. Allow The cookies on that domain will not ex ecute. Deny ⚫ Direction - select the traffic dir ection. De[...]
-
Page 230
21.5. Script Contr ol Scripts and other codes such as ActiveX controls and Java applets , which are used to create interactive web pages, can be programmed to have har mful effects. A ctiveX elements, for e xample, can gain total access to your data and they can read data from your computer, delete information, capture passwor ds and intercept mess[...]
-
Page 231
Script Contr ol Y ou can see the rules created so far listed in the table. Important The rules are listed in order of their priority starting fr om the top, meaning the first rule has the highest priority . Drag&drop rules in order to change their priority . T o delete a rule, select it and click the Delete button. T o modify the rule parameter[...]
-
Page 232
Select A ddress and Action Y ou can set the parameters: ⚫ Domain address - type in the domain on which the rule should apply . ⚫ Action - select the action of the rule. Description Action The scripts on that domain will execute. Allow The scripts on that domain will not ex ecute. Deny Click Finish . Privacy Control 214 BitDefender Inter net Sec[...]
-
Page 233
22. F irewall The F irewall protects your computer from inbound and outbound unauthorized connection attempts. It is quite similar to a guard at your gate - it will keep a watchful eye on your Internet connection and k eep track of who to allow access to the Internet and who to block. Note A firewall is essential if you have a broadband or DSL conn[...]
-
Page 234
Y ou can see whether the BitDefender firewall is enabled or disabled. If you want to change the firewall status, clear or select the corresponding check bo x. Important T o be protected against Internet attacks k eep the Firewall enabled. There are two categories of infor mation: ⚫ Network Configuration Brief . Y ou can see your computer's n[...]
-
Page 235
Description Default action Applies the curr ent rules and allows all traffic attempts that do not match any of the current rules without Allow All prompting. This policy is strongly discouraged, but it might be useful for network administrators and gamers. Applies the current rules and allows all outgoing connection attempts from programs which are[...]
-
Page 236
Note This option does not automatically enable ICS on your system, but only allows this type of connection in case you enable it from your operating system. Internet Connection Sharing (ICS) enables members of local area networks to connect to the Inter net through your computer . This is useful when you benefit from a special/particular Internet c[...]
-
Page 237
⚫ Enable Intrusion Detection (IDS) - activates the heuristic monitoring of the applications trying to access network services or the Internet. 22.2. Network T o configure the firewall settings, go to Firewall>Network in Expert Mode. Network The columns in the Network Configuration table provide detailed information on the network you are conne[...]
-
Page 238
22.2.1. Changing the T rust Level BitDefender assigns each network adapter a trust level. The trust level assigned to the adapter indicates how trustworthy the respective network is. Based on the trust level, specific rules are cr eated for the adapter regar ding how the system and BitDefender processes access the network and the Internet. Y ou can[...]
-
Page 239
Description Stealth option Y our computer cannot be detected from the Inter net. Local network users can ping and detect your computer . Remote 22.2.3. Configuring Generic Settings If the IP address of a network adapter is changed, BitDefender modifies the trust level accordingly . If you want to keep the same trust level, click the arr ow fr om th[...]
-
Page 240
2. Select the action: ⚫ Allow - to allow all traffic between your computer and the selected computer . ⚫ Deny - to block all traffic between your computer and the selected computer . 3. Click OK . 22.3. R ules T o manage the firewall rules controlling applications' access to network resour ces and Inter net, go to Firewall>Rules in Expe[...]
-
Page 241
through any adapter . Y ou can manually create rules or edit existing rules to filter an application's network or Internet access through a specific adapter (for example, a wir eless network adapter). ⚫ Command Line - the command used to start the process in the W indows command line interface ( cmd ). ⚫ Protocol - the IP protocol the rule[...]
-
Page 242
⚫ Action - whether the application is allowed or denied access to network or Internet under the specified circumstances. 22.3.1. Adding R ules Automatically With Firewall enabled, BitDefender will ask for your permission whenever a connection to the Internet has been made: F irewall Alert Y ou can see the following: the application that is trying[...]
-
Page 243
3. Click OK to add the new rule. Modifying rules. T o modify an existing rule, follow these steps: 1. Click the Edit rule button or double-click the rule. The configuration window will appear . 2. Configure the main and the advanced parameters as needed. 3. Click OK to save the changes. Configuring Main P arameters The Main tab of the configuration[...]
-
Page 244
▸ If you want the rule to apply to UDP, select UDP . ▸ If you want the rule to apply to a specific protocol, select Other . An edit field will appear . T ype the number assigned to the protocol you want to filter in the edit field. Note IP protocol numbers are assigned by the Internet Assigned Numbers Authority (IANA). Y ou can find the complet[...]
-
Page 245
Advanced P arameters Y ou can configure the following advanced parameters: ⚫ Direction. Select from the menu the traffic direction the rule applies to. Description Direction The rule applies only for the outgoing traffic. Outbound The rule applies only for the incoming traffic. Inbound The rule applies in both dir ections. Both ⚫ IP version. Se[...]
-
Page 246
▸ T o filter traffic between your computer and a specific computer, clear the Any check bo x and type its IP addr ess. ▸ If you have selected T CP or UDP as protocol you can set a specific port or a range between 0 and 65535. If you want the rule to apply to all ports, select Any . ⚫ Apply this rule only to directly connected computers. Selec[...]
-
Page 247
Note When a connection attempt is made (whether incoming or outgoing), BitDefender applies the action of the first rule matching the respective connection. Therefore, the order by which rules are check ed is very important. T o delete a rule, select it and click the Delete rule button. T o edit an existing rule, select it and click the Edit rule bu[...]
-
Page 248
Y ou can see the total traffic sorted by application. F or each application, you can see the connections and the open ports, as well as statistics regarding the outgoing & incoming traffic speed and the total amount of data sent / received. If you want to see the inactive processes too, clear the Hide inactive processes check bo x. The meaning [...]
-
Page 249
23. V ulnerability An important step in protecting your computer against malicious persons and applications is to k eep up to date the operating system and the applications you regularly use. Moreover, to prevent unauthorized physical access to your computer, strong passwor ds (passwords that cannot be easily guessed) must be configured for each Wi[...]
-
Page 250
Important T o be automatically notified about system or application vulnerabilities, keep the Automatic V ulnerability Checking enabled. 23.1.1. F ixing V ulnerabilities Depending on the issue, to fix a specific vulnerability pr oceed as follows: ⚫ If Windows updates are available, click Install in the Action column to install them. ⚫ If an app[...]
-
Page 251
Automatic V ulnerability Checking Settings Select the check box es corr esponding to the system vulnerabilities you want to be regularly check ed. ⚫ Critical Windows Updates ⚫ Regular Windows Updates ⚫ Application Updates ⚫ W eak Passwords Note If you clear the check box corresponding to a specific vulnerability, BitDefender will no longer [...]
-
Page 252
24. Encryption BitDefender offers encryption capabilities to protect your confidential documents and your instant messaging conversations through Y ahoo Messenger and MSN Messenger . 24.1. Instant Messaging (IM) Encryption By default, BitDefender encrypts all your instant messaging chat sessions provided that: ⚫ Y our chat partner has a BitDefend[...]
-
Page 253
Instant Messaging Encryption By default, IM Encryption is enabled for both Y ahoo Messenger and Windows Live (MSN) Messenger . Y ou can choose to disable IM Encryption for a specific chat application only or completely . T wo tables ar e displayed: ⚫ Encryption Exclusions - lists the user IDs and the associated IM program for which encryption is [...]
-
Page 254
1. Click the Add button to open the configuration window . Adding Contacts 2. T ype in the edit field the user ID of your contact. 3. Select the instant messaging application associated with the contact. 4. Click OK . 24.2. F ile Encryption BitDefender F ile Encryption enables you to create encrypted, password-pr otected logical drives (or vaults) [...]
-
Page 255
F ile V ault T o disable F ile Encryption, clear the File Encryption is enabled check box and click Y es to confirm. If you disable F ile V ault, all file vaults will be lock ed and you will no longer be able to access the files they contain. The table at the top displays the file vaults on your computer . Y ou can see the name, the status (opened [...]
-
Page 256
Create F ile V ault Pr oceed as follows: 1. Specify the location and the name of the vault file. ⚫ Click Browse , select the location of the vault and save the vault file under the desired name. ⚫ Just type the name of the vault in the corr esponding field to create it in My Documents. T o open My Documents, click the Windows Start menu and the[...]
-
Page 257
24.2.2. Opening a V ault In or der to access and work with the files stored in a vault, you must open the vault. When you open the vault, a virtual disk drive appears in My Computer . The drive is labeled with the drive letter assigned to the vault. T o open a vault, use any of these methods: ⚫ Select the vault from the table and click Open vault[...]
-
Page 258
⚫ Select the vault from the table and click Lock vault . ⚫ Right-click the vault in the table and select Lock . ⚫ Right-click the corresponding virtual disk drive from My Computer, point to BitDefender File V ault and select Lock . BitDefender will immediately inform you about the result of the operation. If an error has occurr ed, use the er[...]
-
Page 259
Note The password must have at least 8 characters. For a strong password, use a combination of upper case and lower case letters, numbers and special characters (such as # , $ or @ ). 3. Click OK to change the password. BitDefender will immediately inform you about the result of the operation. If an error has occurr ed, use the err or message to tr[...]
-
Page 260
3. R emove files or folders as you normally do in Windows (for example, right-click a file you want to delete and select Delete ). Encryption 242 BitDefender Inter net Security 2010[...]
-
Page 261
25. Game / Laptop Mode The Game / Laptop Mode module allows you to configure the special operation modes of BitDefender: ⚫ Game Mode temporarily modifies the product settings so as to minimize the resour ce consumption when you play . ⚫ Laptop Mode pr events scheduled tasks fr om running when the laptop is running on battery in order to save ba[...]
-
Page 262
Game Mode At the top of the section, you can see the status of the Game Mode. Y ou can click T urn On Game Mode Mode or T urn Off Game Mode to change the curr ent status. 25.1.1. Configuring Automatic Game Mode Automatic Game Mode allows BitDefender to automatically enter Game Mode when a game is detected. Y ou can configure the following options: [...]
-
Page 263
Note If you do not want BitDefender to automatically enter Game Mode, clear the Automatic Game Mode check box. 25.1.2. Managing the Game List BitDefender automatically enters Game Mode when you start an application fr om the game list. T o view and manage the game list, click Manage Games . A new window will appear . Game List New applications are [...]
-
Page 264
Adding or Editing Games When you add or edit an entry from the game list, the following window will appear: Add Game Click Browse to select the application or type the full path to the application in the edit field. If you do not want to automatically enter Game Mode when the selected application is started, select Disable . Click OK to add the ent[...]
-
Page 265
3. Click OK to save the changes. 25.1.4. Changing Game Mode Hotk ey Y ou can manually enter Game Mode using the default Ctrl+Alt+Shift+G hotk ey . If you want to change the hotkey, follow these steps: 1. Click Advanced Settings . A new window will appear . Advanced Settings 2. Under the Use HotKey option, set the desired hotk ey : ⚫ Choose the mo[...]
-
Page 266
T o configur e Laptop Mode, go to Game / Laptop Mode>Laptop Mode in Expert Mode. Laptop Mode Y ou can see whether Laptop Mode is enabled or not. If Laptop Mode is enabled, BitDefender will apply the configur ed settings while the laptop is running on battery . 25.2.1. Configuring Laptop Mode Settings T o configure the behaviour on scheduled task[...]
-
Page 267
26. Home Network The Network module allows you to manage the BitDefender products installed on your home computers from a single computer . Network Map T o be able to manage the BitDefender products installed on your home computers, you must follow these steps: 1. Join the BitDefender home network on your computer . Joining the network consists in [...]
-
Page 268
Configure P assword 2. T ype the same password in each of the edit fields. 3. Click OK . Y ou can see the computer name appearing in the network map. 26.2. Adding Computers to the BitDefender Network Before you can add a computer to the BitDefender home network, you must configure the BitDefender home management password on the r espective computer[...]
-
Page 269
Add Computer Y ou can see the list of computers in the network. The icon meaning is as follows: ⚫ Indicates an online computer with no BitDefender products installed. ⚫ Indicates an online computer with BitDefender installed. ⚫ Indicates an offline computer with BitDefender installed. 3. Do one of the following: ⚫ Select fr om the list the [...]
-
Page 270
Authenticate 5. T ype the home management password configured on the respective computer . 6. Click OK . If you have provided the correct password, the selected computer name will appear in the network map. Note Y ou can add up to five computers to the network map. 26.3. Managing the BitDefender Network Once you have successfully cr eated a BitDefe[...]
-
Page 271
Network Map If you move the mouse cursor over a computer from the network map, you can see brief information about it (name, IP address, number of issues affecting the system security, BitDefender registration status). If you click a computer name in the network map, you can see all the administrative tasks you can run on the remote computer . ⚫ [...]
-
Page 272
⚫ Fix all issues on this PC Allows you to fix the issues that are affecting the security of this computer by following the F ix All Issues wizard. ⚫ View History/Events Allows you access to the History&Events module of the BitDefender product installed on this computer . ⚫ Update Now Intitiates the Update process for the BitDefender produ[...]
-
Page 273
27. Update New malware is found and identified every day . This is why it is very important to k eep BitDefender up to date with the latest malware signatures. If you are connected to the Internet thr ough broadband or DSL, BitDefender tak es care of this itself . By default, it checks for updates when you turn on your computer and every hour after[...]
-
Page 274
Automatic Update Here you can see when the last check for updates and the last update were performed, as well as information about the last update performed (if successful or the errors that occurred). Also, information about the current engine version and the number of signatures is displayed. If you open this section during an update, you can see[...]
-
Page 275
The Update module will connect to the BitDefender update server and will verif y if any update is available. If an update was detected, depending on the options set in the Manual Update Settings section, you will be asked to confirm the update or the update will be made automatically . Important It may be necessary to restart the computer when you [...]
-
Page 276
Update Settings The update settings are grouped into 4 categories ( Update Location Settings , Automatic Update Settings , Manual Update Settings and Advanced Settings ). Each category will be described separately . 27.2.1. Setting Update Locations T o set the update locations, use the options from the Update Location Settings category . Note Confi[...]
-
Page 277
Note W e recommend you to set as primary update location the local mirr or and to leave the alternate update location unchanged, as a fail-safe plan in case the local mirr or becomes unavailable. In case the company uses a pro xy server to connect to the Internet, check Use proxy and then click Proxy Settings to configure the pro xy settings. F or [...]
-
Page 278
Note If BitDefender is updated while a scan is in progr ess, the scan process will be aborted. ⚫ Don't update if game mode is on - BitDefender will not update if the game mode is tur ned on. In this way, you can minimize the product’s influence on system performance during games. 27.2.5. Managing Pr o xies If your company uses a pro xy ser[...]
-
Page 279
on to that account. If the pr oxy server r equires a user name and a password, you must specif y them in the corr esponding fields. ⚫ Default Browser Proxy - pr o xy settings of the cur rent user, extracted from the default browser . If the pro xy server requires a username and a password, you must specif y them in the corr esponding fields. Note[...]
-
Page 280
28. R egistration T o find complete information on your BitDefender product and the registration status, go to Registration in Expert Mode. R egistration This section displays: ⚫ Product Information : the BitDefender product and version. ⚫ Registration Information : the e-mail address used to log your BitDefender account (if configured), the cu[...]
-
Page 281
R egistration Y ou can see the BitDefender registration status, the curr ent license key and how many days are left until the license expires. T o register BitDefender Internet Security 2010: 1. T ype the license key in the edit field. Note Y ou can find your license key : ⚫ on the CD label. ⚫ on the pr oduct registration card. ⚫ in the onlin[...]
-
Page 282
Important Y ou must create an account within 15 days after installing BitDefender (if you register it with a license key, the deadline is extended to 30 days). Otherwise, BitDefender will no longer update. If you have not yet cr eated a BitDefender account, click Activate Product to open the account registration window . Account Creation If you do [...]
-
Page 283
⚫ P assword - type in a passwor d for your BitDefender account. The password must be between 6 and 16 characters long. ⚫ Re-type password - type in again the pr eviously specified passwor d. Note Once the account is activated, you can use the provided e-mail address and password to log in to your account at http://myaccount.bitdefender .com . 3[...]
-
Page 284
4. Click Sign in . 5. Click Finish to complete the wizard. R egistration 266 BitDefender Inter net Security 2010[...]
-
Page 285
Integration into Windows and Third-P arty Sof twar e 267 BitDefender Inter net Security 2010[...]
-
Page 286
29. Integration into W indows Contextual Menu The W indows contextual menu appears whenever you right-click a file or folder on your computer or objects on your desktop. Windows Contextual Menu BitDefender integrates into the Windows contextual menu to help you easily scan files for viruses and pr event other users from accessing your sensitive fil[...]
-
Page 287
3. Click the Virus Scan tab. 4. Right-click the Contextual Scan task and select Open . A window will appear . 5. Click Custom and configure the scanning options as needed. T o find out what an option does, k eep the mouse over it and r ead the description displayed at the bottom of the window . 6. Click OK to save the changes. 7. Click OK to confir[...]
-
Page 288
29.2.1. Create V ault K eep in mind that a vault is actually just a file with the .bvd extension. Only when you open the vault, a virtual disk drive appears in My Computer and you can safely store files inside it. When creating a vault, you must specif y wher e and under which name to save it on your computer . Y ou must also specif y a password to[...]
-
Page 289
7. Click Create if you only want to create the vault at the selected location. T o create and display the vault as a virtual disk drive in My Computer, click Create&Open . BitDefender will immediately inform you about the result of the operation. If an error has occurr ed, use the err or message to troubleshoot the error . Click OK to close the[...]
-
Page 290
29.2.3. Lock V ault When you are done with your work in a file vault, you must lock it in order to protect your data. By locking the vault, the corr esponding virtual disk drive disappears from My Computer . Consequently, access to the data stored in the vault is completely block ed. T o lock a vault, follow these steps: 1. Open My Computer (click [...]
-
Page 291
29.2.5. R emove from F ile V ault In order to remove files or folders from a vault, the vault must be open. T o remove files or folders from a vault, follow these steps: 1. Open My Computer (click the Windows Start menu and then My Computer ). 2. Enter the virtual disk drive cor responding to the vault. L ook for the drive letter you assigned to th[...]
-
Page 292
Note The password must have at least 8 characters. For a strong password, use a combination of upper case and lower case letters, numbers and special characters (such as # , $ or @ ). 5. Click OK to change the password. BitDefender will immediately inform you about the result of the operation. If an error has occurr ed, use the err or message to tr[...]
-
Page 293
30. Integration into W eb Browsers BitDefender protects you against phishing attempts when you are surfing the Internet. It scans the accessed web sites and alerts you if there are any phishing threats. A White List of web sites that will not be scanned by BitDefender can be configured. BitDefender integrates directly through an intuitive and easy-[...]
-
Page 294
⚫ Enable / Disable - enables / disables the BitDefender antiphishing protection in the cur rent web browser . ⚫ Settings - opens a window where you can specify the antiphishing toolbar's settings. The following options are available: ▸ Real-time Antiphishing W eb Protection - detects and alerts you in real-time if a web site is phished ([...]
-
Page 295
Y ou can add the sites that you fully trust to the White List, so that they will not be scanned by the antiphishing engines anymor e. T o add a site to the White List, provide its address in the cor responding field and click Add . ⚫ Report as Phishing - informs the BitDefender Lab that you consider the respective web site to be used for phishing[...]
-
Page 296
31. Integration into Instant Messenger Pr ograms BitDefender offers encryption capabilities to protect your confidential documents and your instant messaging conversations through Y ahoo Messenger and MSN Messenger . By default, BitDefender encrypts all your instant messaging chat sessions provided that: ⚫ Y our chat partner has a BitDefender ver[...]
-
Page 297
32. Integration into Mail Clients BitDefender Internet Security 2010 includes an Antispam module. Antispam verifies the e-mail messages you receive and identifies those that are spam. The spam messages detected by BitDefender are mark ed with the [SPAM] prefix in the subject line. Note Antispam protection is provided for all POP3/SMTP e-mail client[...]
-
Page 298
32.1.1. Step 1/6 - W elcome Window W elcome Window Click Next . Integration into Mail Clients 280 BitDefender Inter net Security 2010[...]
-
Page 299
32.1.2. Step 2/6 - F ill in the F riends List F ill in the F riends List Here you can see all the addresses fr om your Address Book . Please select those you want to be added to your F riends list (we r ecommend to select them all). Y ou will receive all the e-mail messages from these addr esses, regar dless of their content. T o add all your conta[...]
-
Page 300
32.1.3. Step 3/6 - Delete Bayesian Database Delete Bayesian Database Y ou may find that your antispam filter has begun to lose efficiency . This may be due to improper training. (i.e. you have mistak enly tagged a number of legitimate messages as spam, or vice versa). If your filter is very inaccurate, you may need to wipe the filter database and r[...]
-
Page 301
32.1.4. Step 4/6 - T rain Bayesian F ilter with Legitimate Mail T rain Bayesian F ilter with Legitimate Mail Please select a folder that contains legitimate e-mail messages. These messages will be used to train the antispam filter . There are two advanced options under the directory list: ⚫ Include all subfolders - to include the subfolders to yo[...]
-
Page 302
32.1.5. Step 5/6 - T rain Bayesian F ilter with Spam T rain Bayesian F ilter with Spam Please select a folder that contains spam e-mail messages. These messages will be used to train the antispam filter . Important Please make sure that the folder you choose contains no legitimate e-mail at all, otherwise the antispam performance will be considerab[...]
-
Page 303
32.1.6. Step 6/6 - Summary Summary Here you can view all the settings for the configuration wizard. Y ou can mak e any changes, by returning to the pr evious steps (click Back ). If you do not want to mak e any modifications, click Finish to end the wizard. 32.2. Antispam T oolbar In the upper area of your mail client window you can see the Antispa[...]
-
Page 304
Antispam T oolbar Each button from the BitDefender toolbar will be explained below : ⚫ Is Spam - sends a message to the Bayesian module indicating that the selected e-mail is spam. The e-mail will be tagged as SP AM and moved to the Spam folder . The futur e e-mail messages that fit the same patterns will be tagged as SP AM. Note Y ou can select [...]
-
Page 305
Add Spammer Select Don't show this message again if you don't want to be prompted for confirmation when you add a spammer's address to the list. Click OK to close the window . The futur e e-mail messages from that address will be tagged as SP AM. Note Y ou can select one sender or as many senders as you want. ⚫ Add F riend - adds t[...]
-
Page 306
Note Any e-mail message received from an addr ess contained in the Spammers list will be automatically marked as SP AM, without further processing. Spammers List Here you can add or remove entries from the Spammers list . If you want to add an e-mail address check the Email address option, type in the address and click the button. The address will [...]
-
Page 307
W arning Do not add domains of legitimate web-based e-mail services (such as Y ahoo, Gmail, Hotmail or other) to the Spammers list. Otherwise, the e-mail messages received from any registered user of such a service will be detected as spam. If, for example, you add yahoo.com to the Spammers list, all e-mail messages coming from yahoo.com addresses [...]
-
Page 308
F riends List Here you can add or remove entries from the F riends list . If you want to add an e-mail address check the Email address option, type in the addr ess and click the button. The address will appear in the F riends list . Important Syntax: name@domain.com. If you want to add a domain check the Domain name option, type in the domain and c[...]
-
Page 309
F or Microsoft Outlook Express / Windows Mail a new window will appear from where you can select the folder that contains the e-mail addr esses you want to add to the F riends list . Choose them and click Select . In both cases the e-mail addresses will appear in the import list. Select the desired ones and click to add them to the F riends list . [...]
-
Page 310
The following options are available: ▸ Move message to Deleted Items - moves the spam messages to the Deleted Items (only for Microsof t Outlook Expr ess / W indows Mail); ▸ Mark message as 'read' - marks all the spam messages as read so as not to be disturbing when new spam messages arrive. If your antispam filter is very inaccurate,[...]
-
Page 311
How T o 293 BitDefender Inter net Security 2010[...]
-
Page 312
33. How to Scan F iles and F olders Scanning is easy and flexible with BitDefender . There ar e 4 ways to set BitDefender to scan files and folders for viruses and other malwar e: ⚫ Using W indows Conte xtual Menu ⚫ Using Scan T asks ⚫ Using BitDefender Manual Scan ⚫ Using Scan Activity Bar Once you initiate a scan, the Antivirus Scan wizar[...]
-
Page 313
R unning Scan T asks in Intermediate Mode In Inter mediate Mode, you can run a number of pre-configur ed scan tasks. Y ou can also configure and run custom scan tasks to scan specific locations on your computer using custom scanning options. Follow these steps to run a scan task in Intermediate Mode: 1. Click the Security tab. 2. On the left-side Q[...]
-
Page 314
2. Click the Virus Scan tab. Here you can find a number of default scan tasks and you can create your own scan tasks. These ar e the default scan tasks that you can use: Description Default T ask Scans the entire system. In the default configuration, it scans for all types of malware threatening your Deep System Scan system's security, such as[...]
-
Page 315
5. Click Continue to start the scan. 6. F ollow the Antivirus Scan wizard to complete the scan. What is Safe Mode? Safe Mode is a special way to start W indows, used mainly to troubleshoot problems affecting normal operation of Windows. Such problems range from conflicting drivers to viruses preventing Windows from starting normally . In Safe Mode,[...]
-
Page 316
34. How to Schedule Computer Scan Scanning your computer periodically is a best practice to k eep your computer free from malware. BitDefender allows you to schedule scan tasks so that you can automatically scan your computer . T o schedule BitDefender to scan your computer, follow these steps: 1. Open BitDefender and switch the user interface to E[...]
-
Page 317
4. Right-click the desir ed scan task and select Schedule . A new window will appear . 5. Schedule the task to run as needed: ⚫ T o run the scan task one-time only, select Once and specif y the start date and time. ⚫ T o run the scan task after the system startup, select On system startup . Y ou can specify how long after the startup the task s[...]
-
Page 318
T r oubleshooting and Getting Help 300 BitDefender Inter net Security 2010[...]
-
Page 319
35. T r oubleshooting This chapter pr esents some pr oblems you may encounter when using BitDefender and pr ovides you with possible solutions to these problems. Most of these problems can be solved through the appropriate configuration of the pr oduct settings. If you cannot find your problem here, or if the presented solutions do not solve it, yo[...]
-
Page 320
Description&Solution Err or 2. R un the uninstall tool using administrator privileges. 3. R estart your computer . 4. Start the setup wizard again to install BitDefender . Y ou ar e trying to install BitDefender on an unsupported operating system. Please check the “ System The BitDefender product is not compatible with your operating system. [...]
-
Page 321
1. Clean up the system after the failed installation. If the installation fails, some BitDefender registry keys and files may remain in your system. Such remainders may prevent a new installation of BitDefender . They may also affect system perfor mance and stability . This is why you must remove them before you try to install the product again. If[...]
-
Page 322
⚫ temporary communication errors between the BitDefender services. ⚫ some of the BitDefender services are stopped. ⚫ other security solutions running on your computer at the same time with BitDefender . ⚫ viruses on your system affect the normal operation of BitDefender . T o troubleshoot this err or, try these solutions: 1. W ait a few mom[...]
-
Page 323
Unsecured Wi-F i networks present a great security risk because your computer is connected to unknown computers. Without the proper protection pr ovided by a firewall, anyone connected to the network can access your shares and even break into your computer . When connected to an unsecured Wi-F i network, BitDefender automatically blocks communicati[...]
-
Page 324
▸ If the Windows F irewall is used, it can be configured to allow file and printer sharing as follows: open the Windows F irewall settings window, Exceptions tab and select the File and Printer Sharing check box. ▸ If another firewall program is used, please refer to its documentation or help file. ⚫ General conditions that may prevent using [...]
-
Page 325
5. Depending on the level of security you want to obtain, choose one of the following options: ⚫ Unsafe - to access the files and printers shared in the Wi-F i network, without allowing access to your shares. ⚫ Safe - to allow file and printer sharing both ways. This means that the users connected to the Wi-F i network can also access your shar[...]
-
Page 326
If you suspect the problem is with the BitDefender firewall, you can contact BitDefender for support as described in section “ Support ” (p. 316) . 35.4. Antispam F ilter Does Not W ork P roperly This article helps you troubleshoot the following problems concerning the BitDefender Antispam filtering operation: ⚫ A number of legitimate e-mail [...]
-
Page 327
Note BitDefender integrates into the most commonly used mail clients through an easy-to-use antispam toolbar . F or a complete list of supported mail clients, please refer to “ Supported Software ” (p. 2) . If you are using a different mail client, you cannot indicate detection errors and train the Learning Engine. T o solve the problem, try de[...]
-
Page 328
4. Click the Add F riend button on the BitDefender antispam toolbar to add the sender to the F riends list. Y ou may need to click OK to acknowledge. Y ou will always receive e-mail messages from this address no matter what they contain. 5. Click the Not Spam button on the BitDefender antispam toolbar (normally located in the upper part of the mail[...]
-
Page 329
8. Click Finish to start the training process. 9. When training is completed, click Close . Ask for Help If this information was not helpful, you can contact BitDefender for support as described in section “ Support ” (p. 316) . 35.4.2. Many Spam Messages Are Not Detected If you are receiving many spam messages that are not marked as [spam] , y[...]
-
Page 330
2. Go to the Inbox folder . 3. Select the undetected spam messages. 4. Click the Is Spam button on the BitDefender antispam toolbar (normally located in the upper part of the mail client window). This indicates to the Lear ning Engine that the selected messages are spam. They ar e immediately marked as [spam] and moved to the junk mail folder . The[...]
-
Page 331
R etrain Learning Engine (Bayesian) Before training the Learning Engine (Bayesian), prepare a folder containing only SP AM messages and another one containing only legitimate messages. The Learning Engine will analyze them and learn the characteristics that define the spam or legitimate messages that you usually receive. In or der for the training [...]
-
Page 332
Note POP3 is one of the most widely used pr otocols for downloading e-mail messages from a mail server . If you do not know the protocol that your e-mail client uses to download e-mail messages, ask the person who configur ed your e-mail client. ⚫ BitDefender Internet Security 2010 doesn't scan Lotus Notes POP3 traffic. Y ou should also veri[...]
-
Page 333
2. R un the uninstall tool using administrator privileges. The uninstall tool will r emove all the files and registry keys that were not r emoved during the automatic r emoval process. 3. R estart your computer . If this information was not helpful, you can contact BitDefender for support as described in section “ Support ” (p. 316) . T roubles[...]
-
Page 334
36. Support As a valued provider, BitDefender strives to provide its customers with an unparalleled level of fast and accurate support. The BitDefender Knowledge Base provides you with articles that contain solutions to most of your problems and questions related to BitDefender . If you cannot find the solution in the Knowledge Base, you can contac[...]
-
Page 335
36.3. Contact Infor mation Efficient communication is the k ey to a successful business. During the past 10 years BITDEFENDER has established an unquestionable reputation by constantly striving for better communication so as to exceed the expectations of our clients and partners. Should you have any questions, do not hesitate to contact us. 36.3.1.[...]
-
Page 336
Deutschland Office: +49 2301 91 84 222 Sales: vertrieb@bitdefender .de T echnical support: http://kb.bitdefender .de W eb: http://www .bitdefender .de UK and Ireland Business Centr e 10 Queen Street Newcastle, Staffor dshire ST5 1ED E-mail: info@bitdefender .co.uk Phone: +44 (0) 8451-305096 Sales: sales@bitdefender .co.uk T echnical support: http:/[...]
-
Page 337
BitDefender R escue CD 319 BitDefender Inter net Security 2010[...]
-
Page 338
37. Overview BitDefender Internet Security 2010 comes with a bootable CD (BitDefender R escue CD) capable to scan and disinfect all existing hard drives before your operating system starts. Y ou should use BitDefender R escue CD any time your operating system is not working properly because of virus infections. That usually happens when you don&apo[...]
-
Page 339
37.2. Included Sof tware BitDefender R escue CD includes the following softwar e packages. Xedit This is a text file editor . Vim This is a powerful text file editor, containing syntax highlighting, a GUI, and much mor e. F or mor e information, please refer to the V im homepage . Xcalc This is a calculator . RoxFiler R o xF iler is a fast and powe[...]
-
Page 340
F or mor e information, please refer to the Nessus homepage . Iptraf Iptraf is an IP Network Monitoring Software. F or mor e information, please refer to the Iptraf homepage . Iftop Iftop displays bandwidth usage on an interface. F or mor e information, please refer to the Iftop homepage . MTR MTR is a network diagnostic tool. F or mor e informatio[...]
-
Page 341
38. BitDefender R escue CD Howto This chapter contains information on how to start and stop the BitDefender R escue CD, scan your computer for malware as well as save data fr om your compromised Windows PC to a removable device. However, by using the softwar e applications that come with the CD, you can do many tasks the description of which goes f[...]
-
Page 342
The Desktop 38.2. Stop BitDefender R escue CD Choose "EXIT" Y ou can safely shut down your computer by selecting Exit from the BitDefender R escue CD contextual menu (right-click to open it) or by issuing the halt command in a terminal. When BitDefender Rescue CD has successfully closed all programs it will show a screen lik e the followi[...]
-
Page 343
W ait for this message when shutting down 38.3. How do I perfor m an antivirus scan? A wizard will appear when the boot process has finished and allow you to full scan your computer . All you have to do is click the Start button. Note If your screen resolution isn't high enough, you will be asked to start scanning in text-mode. F ollow the thr[...]
-
Page 344
1. Double click the ST AR T SCANNER icon on the Desktop. This will launch the BitDefender Scanner for Unices . 2. Click Scanner , a new window will appear . 3. Select the directory you wish to scan and click Open to start scanning using the same wizard that appeared when you first booted. ⚫ Use the contextual menu - br owse your folders, right-cl[...]
-
Page 345
Description Connection Select this type of connection when you are using a local area network (L AN) to access the Inter net. It is also suitable for wir eless connections. netcardconfig Select this type of connection when you are accessing the Internet over a mobile phone network by using GPRS gprsconnect (General Pack et R adio Service) pr otocol[...]
-
Page 346
Update Signatur es 2. Do one of the following: ▸ Select Cumulative to install signatur es already saved on your hard disk by browsing your computer and loading the cumulative.zip file. ▸ Select Update to immediately connect to the internet and download the latest virus signatures. 3. Click OK . 38.5.1. How do I update BitDefender over a pro xy?[...]
-
Page 347
6. Pr ess F2 to save the curr ent file, confirm saving, and then press F10 to close it. 7. T ype the command: bdscan update . 38.6. How do I save my data? Let's assume that you cannot start your W indows PC due to some unknown issues. At the same time, you desperately need to access some important data fr om your computer . This is wher e BitD[...]
-
Page 348
Desktop Scr een 3. Double-click the partition where the data you want to save is located (e.g. [sda3] ). Note When working with BitDefender Rescue CD, you will deal with Linux-type partition names. So, [sda1] will probably correspond to the (C:) Windows-type partition, [sda3] to (F:) , and [sdb1] to the memory stick. Important If the computer was n[...]
-
Page 349
Saving Data 6. T ype /media/sdb1/ into the corr esponding te xtbox and click Copy . Please be awar e that depending on your computer configuration it might be sda1 instead of sdb1 . 38.7. How do I use console mode? If your screen resolution is not high enough to run the graphical user interface, you can run the BitDefender Rescue CD in console mode[...]
-
Page 350
Glossary ActiveX ActiveX is a model for writing programs so that other programs and the operating system can call them. ActiveX technology is used with Microsof t Internet Explorer to mak e interactive W eb pages that look and behave like computer programs, rather than static pages. With ActiveX, users can ask or answer questions, use push buttons,[...]
-
Page 351
Internet Explor er . Both of these are graphical browsers, which means that they can display graphics as well as text. In addition, most modern browsers can present multimedia information, including sound and video, though they requir e plug-ins for some formats. Command line In a command line interface, the user types commands in the space pr ovid[...]
-
Page 352
Filename extension The portion of a filename, following the final point, which indicates the kind of data stor ed in the file. Many operating systems use filename extensions, e.g. Unix, VMS, and MS-DOS. They ar e usually from one to three letters (some sad old OSes support no more than thr ee). Examples include "c" for C source code, &quo[...]
-
Page 353
exists on tapes or disks. Every computer comes with a certain amount of physical memory, usually referr ed to as main memory or RAM. Non-heuristic This method of scanning relies on specific virus signatures. The advantage of the non-heuristic scan is that it is not fooled by what might seem to be a virus, and does not generate false alar ms. Pack e[...]
-
Page 354
Report file A file that lists actions that have occurred. BitDefender maintains a report file listing the path scanned, the folders, the number of archives and files scanned, how many infected and suspicious files were found. Rootkit A rootkit is a set of software tools which offer administrator -level access to a system. The term was first used fo[...]
-
Page 355
sends information back to the spyware's home base via the user's Internet connection. Because spyware is using memory and system resour ces, the applications running in the background can lead to system crashes or general system instability . Startup items Any files placed in this folder will open when the computer starts. For example, a [...]
-
Page 356
itself over and over again is relatively easy to produce. Even such a simple virus is danger ous because it will quickly use all available memory and bring the system to a halt. An even more dangerous type of virus is one capable of transmitting itself across networks and bypassing security systems. Virus definition The binary pattern of a virus, u[...]