SOFTWIN Internet Security 2010 User's Guide

Browse online or download User's Guide for Antivirus security software SOFTWIN Internet Security 2010. Bitdefender Internet Security 2010 User Manual

  • Download
  • Add to my manuals
  • Print
  • Page
    / 356
  • Table of contents
  • TROUBLESHOOTING
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews

Summary of Contents

Page 1 - User's guide

User's guideCopyright© 2009 BitDefender

Page 2

35. Troubleshooting .. . ... . ... . ... . .. . ... . ... . ... . ... . ... . ... . .. . . .. . ... 30135.1. Installation Problems . . . . . . . . . .

Page 3 - And yours was pretty low

Select VaultIf you select Browse for a File Vault, you must click Browse and select the filevault. You will go either to the step 3 if the selected va

Page 4 - Table of Contents

Enter passwordType the password into the corresponding field and click Next.Step 3/4 - SummaryThis is where you can review chosen operations.Wizards83

Page 5

SummaryClick Next.Step 4/4 - ResultsThis is where you can view the files of the vault.Wizards84BitDefender Internet Security 2010

Page 6

ResultsClick Finish.11.4.4. Lock File VaultThis wizard helps you lock a specific file vault in order to protect its content.Step 1/3 - Select VaultHer

Page 7

Select VaultIf you select Browse for a File Vault, you must click Browse and select the filevault.If you click Select an existing File Vault, then you

Page 8

SummaryClick Next.Step 3/3 - ResultsThis is where you can view operation result.Wizards87BitDefender Internet Security 2010

Page 9

ResultsClick Finish.Wizards88BitDefender Internet Security 2010

Page 10

Intermediate Mode89BitDefender Internet Security 2010

Page 11

12. DashboardThe Dashboard tab provides information regarding the security status of yourcomputer and allows you to fix pending issues.DashboardThe da

Page 12

Click the name of a module to see more details about its status and to configurestatus tracking for its components.⚫ Usage Profile - Indicates the usa

Page 13

End User Software License AgreementIF YOU DO NOT AGREE TO THESE TERMS AND CONDITIONS DO NOT INSTALL THESOFTWARE. BY SELECTING "I ACCEPT", &q

Page 14

13. SecurityBitDefender comes with a Security module that helps you keep your BitDefenderup to date and your computer virus free. To enter the Securit

Page 15

Red circle with an exclamation mark: Issues affect the component.The sentences describing issues are written in red. Just click the Fix buttoncorrespo

Page 16 - 1.2. Admonitions

DescriptionIssueThe malware signatures of your BitDefender productare not being automatically updated on a regularbasis.Automatic Update isdisabledThe

Page 17 - 2. Book Structure

13.2. Quick TasksThis is where you can find links to the most important security tasks:⚫ Update Now - starts an immediate update.⚫ System Scan - start

Page 18 - 3. Request for Comments

The update process is performed on the fly, meaning that the files to be updatedare replaced progressively. In this way, the update process will not a

Page 19 - Installation and Removal

the scanning process. For detailed information about this wizard, please refer to“Antivirus Scan Wizard” (p. 52).When you run a Custom Scan, the Custo

Page 20 - 1. System Requirements

14. ParentalBitDefender Internet Security 2010 includes a Parental Control module. ParentalControl enables you to restrict your children's access

Page 21 - System Requirements

If you want BitDefender to monitor the Parental Control module, click ConfigureStatus Tracking and select the Enable alerts check box for this module.

Page 22 - 2. Preparing for Installation

If you want to close this window, just click Cancel. However, this will not stop theupdate process.NoteIf you are connected to the Internet through a

Page 23 - 3. Installing BitDefender

15. File VaultBitDefender comes with a File Vault module that helps you keep your data not onlysafe, but confidential. To achieve this goal, use file

Page 24 - Installing BitDefender

TERM OF LICENSE. The license granted hereunder shall commence on the purchasingdate of BitDefender and shall expire at the end of the period for which

Page 25 - 3.1. Registration Wizard

⚫ Status Area - Allows you to see the full list of monitored components. You canchoose which of the components to be monitored. It is recommended to e

Page 26

16. NetworkThe Network module allows you to manage the BitDefender products installed onyour home computers from a single computer. To enter the Netwo

Page 27

⚫ Scan All - allows you to scan all managed computers at the same time.⚫ Update All allows you to update all managed computers at the same time.⚫ Regi

Page 28

2. Type the home management password and click OK. A new window will appear.Add ComputerYou can see the list of computers in the network. The icon mea

Page 29 - 3.2. Configuration Wizard

Authenticate5. Type the home management password configured on the respective computer.6. Click OK. If you have provided the correct password, the sel

Page 30

Network MapIf you move the mouse cursor over a computer from the network map, you can seebrief information about it (name, IP address, number of issue

Page 31

Allows you to fix the issues that are affecting the security of this computer byfollowing the Fix All Issues wizard.⚫ View History/EventsAllows you ac

Page 32

Enter Password2. Select a scan type.⚫ System Scan - starts a full scan of your computer (archives excluded).⚫ Deep System Scan - starts a full scan of

Page 33

2. Click OK.16.1.6. Registering All ComputersTo register all managed computers, follow these steps:1. Click Register All. You will be prompted to prov

Page 34

Expert Mode111BitDefender Internet Security 2010

Page 35 - 3.2.7. Step 7 - Finish

CONDITIONS, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OFMERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE, NONINTERFERENCE, ACCURAC

Page 36

17. GeneralThe General module provides information on the BitDefender activity and the system.Here you can also change the overall behavior of BitDefe

Page 37 - 4. Upgrade

⚫ Network Activity - Indicates the evolution of the network traffic filtered byBitDefender Firewall. The height of the bar indicates the intensity of

Page 38

DescriptionIssueAn on demand system scan was never performedto check if files stored on your computer are malwarefree.You have never scannedyour compu

Page 39 - Getting Started

DescriptionStatusBitDefender does not check for potentialvulnerabilities regarding missing Windows updates,application updates or weak passwords.Vulne

Page 40 - 6. Overview

DescriptionItemscan your computer as soon as possible. To scan the entirecomputer, go to Antivirus, Virus Scan tab, and run eitherFull System Scan or

Page 41 - 6.2.1. Novice Mode

General SettingsHere you can set the overall behavior of BitDefender. By default, BitDefender isloaded at Windows startup and then runs minimized in t

Page 42

Enter passwordType the password in the Password field,re-type it in the Retype password fieldand click OK.Once you have set the password, you willbe a

Page 43 - 6.2.2. Intermediate Mode

NoteThis option can be configured only for the current Windows user account. The Scanactivity bar is only available when the interface is in Expert Mo

Page 44

System InformationThe list contains all the items loaded when starting the system as well as the itemsloaded by different applications.Three buttons a

Page 45 - 6.2.3. Expert Mode

18. AntivirusBitDefender protects your computer from all kinds of malware (viruses, Trojans,spyware, rootkits and so on). The protection BitDefender o

Page 46

You acknowledge and accept that BitDefender may provide updates or additions tothe program or product which automatically download to your computer.By

Page 47

Real-time ProtectionYou can see whether Real-time protection is enabled or disabled. If you want tochange the Real-time protection status, clear or se

Page 48 - 6.4. Scan Activity Bar

DescriptionProtection levelOnly programs and incoming mail messages are scanned forviruses. Besides the classical signature-based scan, the heuristica

Page 49 - 6.4.1. Scan Files and Folders

Shield SettingsThe scan options are organized as an expandable menu, very similar to those usedfor exploration in Windows. Click the box with "+&

Page 50 - 6.5. BitDefender Manual Scan

DescriptionOption.doc; .dot; .xls; .ppt; .wbk; .wiz; .pot;.ppa; .xla; .xlt; .vbs; .vbe; .mdb; .rtf;.htm; .hta; .html; .xml; .xtp; .php;.asp; .js; .shs

Page 51 - 6.6.1. Game Mode

DescriptionOptionMoves infected files into the quarantine.Quarantined files cannot be executed orMove file toquarantineopened; therefore, the risk of

Page 52 - Changing Game Mode Hotkey

DescriptionOptionScans all incoming e-mail messages.Scan incoming e-mailScans all outgoing e-mail messages.Scan outgoing e-mail⚫ Scan web (HTTP) traff

Page 53 - 6.6.2. Laptop Mode

BitDefender AVC AlertIf you know and trust the detected application,click Allow.If you want to immediately close the application,click OK.Select the R

Page 54

ImportantKeep the Active Virus Control enabled in order to be protected against unknownviruses.If you want to be alerted and prompted for action by Ac

Page 55 - 7. Fixing Issues

⚫ Remove - remove an application from the list.⚫ Edit - edit an application rule.18.1.4. Disabling Real-time ProtectionIf you want to disable real-tim

Page 56 - Fixing Issues

Antiphishing White ListYou can see the web sites that BitDefender does not currently check for phishingcontent.To add a new web site to the white list

Page 57

In the event of invalidity of any provision of this Agreement, the invalidity shall notaffect the validity of the remaining portions of this Agreement

Page 58 - 8. Configuring Basic Settings

There is a risk that a virus is already lodged in your system, before you even installBitDefender. This is why it's a very good idea to scan your

Page 59 - 8.1. User Interface Settings

There are three categories of scan tasks:⚫ System tasks - contains the list of default system tasks. The following tasks areavailable:DescriptionDefau

Page 60 - 8.2. Security Settings

⚫Delete - removes the selected task.NoteNot available for system tasks. You cannot remove a system task.⚫Scan Now - runs the selected task, initiating

Page 61 - 8.3. General Settings

⚫ Clone task - duplicates the selected task. This is useful when creating new tasks,as you can modify the settings of the task duplicate.⚫ Delete - de

Page 62 - Configuring Basic Settings

OverviewHere you can see information about the task (name, last run and schedule status)and set the scan settings.Choosing Scan LevelYou can easily co

Page 63 - 9. History and Events

DescriptionProtection levelAll files and archives are scanned for viruses and spyware. Besidesthe classical signature-based scan, the heuristic analys

Page 64 - History and Events

The scan options are organized as an expandable menu, very similar to those usedfor exploration in Windows. Click the box with "+" to open a

Page 65 - Registration and My Account

DescriptionOptionwbk; wiz; pot; ppa; xla; xlt; vbs; vbe;mdb; rtf; htm; hta; html; xml; xtp; php;asp; js; shs; chm; lnk; pif; prc; url; smm;pdf; msi; i

Page 66

DescriptionActionNo action will be taken on infected files. Thesefiles will appear in the report file.Take No ActionRemove the malware code from the i

Page 67 - 10.2. Activating BitDefender

DescriptionActionMoves hidden files into the quarantine.Quarantined files cannot be executed or opened;therefore, the risk of getting infected disappe

Page 68

PrefaceThis guide is intended to all users who have chosen BitDefender Internet Security2010 as a security solution for their personal computers. The

Page 69 - 10.4. Renewing Your License

– Action to take when an encrypted suspect file is found. Select theaction to be taken on suspicious files that are encrypted using Windows. Thefollow

Page 70 - 11. Wizards

Scan TargetYou can see the list of local, network and removable drives as well as the files orfolders added previously, if any. All checked items will

Page 71

⚫ All Entries - to scan all drives, no matter if they are local, in the network orremovable.NoteIf you want to scan your entire computer, select the c

Page 72 - DescriptionAction

Scheduling Scan TasksWith complex tasks, the scanning process will take some time and it will work bestif you close all other programs. That is why it

Page 73

Click OK to save the changes and close the window. To run the task, just click Scan.18.2.5. Scanning Files and FoldersBefore you initiate a scanning p

Page 74 - 11.2. Custom Scan Wizard

Immediate ScanningTo scan your computer or part of it you can run the default scan tasks or your ownscan tasks. This is called immediate scanning.To r

Page 75

Drag FileDrop FileThe Antivirus Scan wizard will appear and guide you through the scanning process.Manual ScanningManual scanning consists in directly

Page 76 - DescriptionOption

Manual ScanningClick Add Folder, select the location you want to scan and click OK. If you want toscan multiple folders, repeat this action for each a

Page 77

ScanningYou can see the scan status and statistics (scanning speed, elapsed time, numberof scanned / infected / suspicious / hidden objects and other)

Page 78 - DescriptionScan Level

Stopping or pausing the scan. You can stop scanning anytime you want byclicking Stop&Yes. You will go directly to the last step of the wizard. To

Page 79

NoteThe note is just a short observation. Although you can omit it, the notes can providevaluable information, such as specific feature or a link to s

Page 80 - 11.2.5. Step 5/6 - Scanning

DescriptionActionRemoves the malware code from infected files.DisinfectDeletes detected files.DeleteMoves detected files to quarantine. Quarantined fi

Page 81 - Scanning

SummaryYou can see the results summary. If you want comprehensive information on thescanning process, click View log to view the scan log.ImportantIf

Page 82

18.2.6. Viewing Scan LogsTo see the scan results after a task has run, right-click the task and select Logs.The following window will appear:Scan Logs

Page 83 - Vulnerabilities

Scan Log ExampleThe scan log contains detailed information about the logged scanning process, suchas scanning options, the scanning target, the threat

Page 84 - Vulnerability Check

NoteThe objects excluded from on-access scanning will not be scanned, no matter if theyare accessed by you or by an application.To see and manage the

Page 85

type of scanning you want them to be excluded from, as needed. Make the necessarychanges and click OK.NoteYou can also right-click an object and use t

Page 86

Step 2/4 - Specify Excluded PathsExcluded PathsTo specify the paths to be excluded from scanning use either of the followingmethods:⚫ Click Browse, se

Page 87

Step 3/4 - Select Scanning TypeScanning TypeYou can see a table containing the paths to be excluded from scanning and the typeof scanning they are exc

Page 88 - 11.4. File Vault Wizards

Step 4/4 - Scan Excluded FilesScan Excluded FilesIt is highly recommended to scan the files in the specified paths to make sure thatthey are not infec

Page 89 - 11.4.1. Add Files to Vault

Step 1/4 - Select Object TypeObject TypeSelect the option of excluding extensions from scanning.Click Next.Antivirus161BitDefender Internet Security 2

Page 90 - Step 2/6 - Select Vault

3. Request for CommentsWe invite you to help us improve the book. We have tested and verified all of theinformation to the best of our ability. Please

Page 91 - Step 3/6 - Create Vault

Step 2/4 - Specify Excluded ExtensionsExcluded ExtensionsTo specify the extensions to be excluded from scanning use either of the followingmethods:⚫ S

Page 92 - Step 5/6 - Summary

Step 3/4 - Select Scanning TypeScanning TypeYou can see a table containing the extensions to be excluded from scanning andthe type of scanning they ar

Page 93 - Step 6/6 - Results

Step 4/4 - Select Scanning TypeScanning TypeIt is highly recommended to scan the files having the specified extensions to makesure that they are not i

Page 94 - 11.4.2. Remove Vault Files

QuarantineThe Quarantine section displays all the files currently isolated in the Quarantinefolder. For each quarantined file, you can see its name, t

Page 95 - Step 2/5 - Password

18.4.2. Configuring Quarantine SettingsTo configure the quarantine settings, click Settings. A new window will appear.Quarantine SettingsUsing the qua

Page 96 - Step 3/5 - Select files

Automatically submit files. To automatically submit quarantined files, checkthe corresponding option. You must specify the frequency with which to sub

Page 97 - Step 4/5 - Summary

19. AntispamBitDefender Antispam employs remarkable technological innovations and industrystandard antispam filters to weed out spam before it reaches

Page 98 - Step 5/5 - Results

Image FilterSince avoiding heuristic filter detection has become quite a challenge, nowadays'inbox folders are full with more and more messages o

Page 99 - 11.4.3. View File Vault

trace a certain scent. Sometimes the filter must be corrected too - prompted toadjust when it makes a wrong decision.ImportantYou can correct the Baye

Page 100 - Step 2/4 - Password

characteristics of SPAM. The result is that it will add a Spam score to the e-mail,too.NoteIf the e-mail is tagged as SEXUALLY EXPLICIT in the subject

Page 101 - Step 3/4 - Summary

Installation and Removal1BitDefender Internet Security 2010

Page 102 - Step 4/4 - Results

Antispam StatusYou can see whether Antispam is enabled or disabled. If you want to change theAntispam status, clear or select the corresponding check

Page 103 - 11.4.4. Lock File Vault

DescriptionProtection levelOffers protection for accounts that receive a lot oflegitimate commercial mail. The filter will let mostPermissivee-mail pa

Page 104 - Step 2/3 - Summary

Friends ListHere you can add or remove entries from the Friends list.If you want to add an e-mail address check the E-mail address option, type in the

Page 105 - Step 3/3 - Results

You can save the Friends list to a file so that you can use it on another computer orafter reinstalling the product. To save the Friends list, click t

Page 106 - Click Finish

Spammers ListHere you can add or remove entries from the Spammers list.If you want to add an e-mail address check the Email address option, type in th

Page 107 - Intermediate Mode

from any registered user of such a service will be detected as spam. If, for example,you add yahoo.com to the Spammers list, all e-mail messages comin

Page 108 - 12. Dashboard

Antispam SettingsThree categories of options are available (Antispam settings, Basic Antispamfilters and Advanced Antispam filters) organized like an

Page 109 - Dashboard

19.3.2. Basic Antispam Filters⚫ Enable Friends/Spammers lists - filter e-mail messages using theFriends/Spammers lists.▸ Automatically add recipients

Page 110 - 13. Security

20. Parental ControlBitDefender Parental Control enables you to control the access to the Internet andto specific applications for each user holding a

Page 111 - Security

Parental ControlYou can see information regarding the Parental Control status for each Windowsuser account. The age category is listed below each user

Page 112

BitDefender Internet Security 2010User's guidePublished 2009.07.08Copyright© 2009 BitDefenderLegal NoticeAll rights reserved. No part of this boo

Page 113 - 13.2. Quick Tasks

1. System RequirementsYou may install BitDefender Internet Security 2010 only on computers running thefollowing operating systems:⚫ Windows XP (32/64

Page 114

Parental Control StatusTo configure the Parental Control for this user account, follow these steps:1. Enable the Parental Control for this user accoun

Page 115

⚫ Web - to filter web navigation according to the rules set by you in the Websection.⚫ Applications - to block access to the applications specified by

Page 116 - 14. Parental

To set the password protection, do the following:1. Type the password in the Password field.2. Type the password again in the Retype Password field to

Page 117 - 14.2. Quick Tasks

Web Filter CategoriesSelect the check box corresponding to a category you want to block and the userwill no longer be allowed to access websites match

Page 118 - Parental

⚫ Teenager Profile Categories includes content that may be considered safe forchildren between 14 and 18 years old.DescriptionCategoryWebsites used to

Page 119 - 15. File Vault

⚫ Send me an activity report via e-mail. An e-mail notification is sent everytime BitDefender Parental Control blocks an activity.⚫ Save an internet t

Page 120 - 15.2. Quick Tasks

⚫ If the server uses a different port than the default port 25, type it in thecorresponding field.⚫ Sender's e-mail address - type the address yo

Page 121 - 16. Network

Web ControlTo enable this protection select the check box corresponding to Enable WebControl.20.3.1. Creating Web Control RulesTo allow or block acces

Page 122

Specify Website2. Enter the website address in the Website field.Syntax:⚫*.xxx.com - the action of the rule will apply on all web sites finished with.

Page 123

⚫ Allow all sites, except the ones in the list. Select this option to allow accessto all websites except those for which you have set the Block action

Page 124

⚫ Yahoo Messenger 8.5⚫ Windows Live Messenger 8Antispam protection is provided for all POP3/SMTP e-mail clients. The BitDefenderAntispam toolbar howev

Page 125

can click Block all to select all the cells and, implicitly, to block all the web access.If you click Allow all, the internet connections will be perm

Page 126

20.5.1. Creating Application Control RulesTo block or restrict access to an application, follow these steps:1. Click Block Application or Restrict App

Page 127

To edit a rule, select it, click the Edit button and make the necessary changes inthe configuration window. To delete a rule, select it and click the

Page 128

20.6.1. Creating Keywords Control RulesTo block a word or phrase, follow these steps:1. Click Block Keyword. A new window will appear:Specify Keyword2

Page 129 - Expert Mode

20.7. Instant Messaging (IM) ControlThe Instant Messaging (IM) Control allows you to specify the IM contacts your childrenare allowed to chat with.Not

Page 130 - 17. General

Add IM contact2. Type the contact's name in the Name field.3. Type the e-mail address or the user name used by the IM contact in the E-mailor IM

Page 131 - 17.1.1. Overall Status

21. Privacy ControlBitDefender monitors dozens of potential “hotspots” in your system where spywaremight act, and also checks any changes made to your

Page 132 - DescriptionIssue

⚫ Identity Control - protects your confidential data by filtering all outgoing web(HTTP), e-mail (SMTP) and instant messaging traffic according to the

Page 133 - 17.1.2. Statistics

You can create rules to protect any piece of information you might consider personalor confidential, from your phone number or e-mail address to your

Page 134 - 17.2. Settings

Identity ControlIf you want to use Identity Control, follow these steps:1. Select the Enable Identity Control check box.2. Create rules to protect you

Page 135 - 17.2.1. General Settings

2. Preparing for InstallationBefore you install BitDefender Internet Security 2010, complete these preparationsto ensure the installation will go smoo

Page 136 - Important

Step 1/4 - Welcome WindowWelcome WindowClick Next.Step 2/4 - Set Rule Type and DataSet Rule Type and DataYou must set the following parameters:Privacy

Page 137 - 17.3. System Information

⚫ Rule Name - type the name of the rule in this edit field.⚫ Rule Type - choose the rule type (address, name, credit card, PIN, SSN etc).⚫ Rule Data -

Page 138

You can choose to apply the rule only if the rule data matches whole words or if therule data and the detected string case match.Specify the users for

Page 139 - 18. Antivirus

To open the window where you can manage exceptions, click Exclusions.ExclusionsTo add an exception, follow these steps:1. Click the Add button to add

Page 140 - Antivirus

Edit RuleHere you can change the name, description and parameters of the rule (type, dataand traffic). Click OK to save the changes.21.2.4. Rules Defi

Page 141

Registry Control keeps an eye on the Windows Registry - this is again useful fordetecting Trojan horses. It will alert you whenever a program will try

Page 142

Registry ControlYou can see the rules created so far listed in the table.To delete a rule, select it and click the Delete button.21.4. Cookie ControlC

Page 143

Cookie AlertYou can see the name of the application that is tryingto send the cookie file.Click Yes or No and a rule will be created, applied andliste

Page 144

Cookie ControlYou can see the rules created so far listed in the table.ImportantThe rules are listed in order of their priority starting from the top,

Page 145

Select Address, Action and DirectionYou can set the parameters:⚫ Domain address - type in the domain on which the rule should apply.⚫ Action - select

Page 146

3. Installing BitDefenderYou can install BitDefender from the BitDefender installation CD or using theinstallation file downloaded on your computer fr

Page 147

21.5. Script ControlScripts and other codes such as ActiveX controls and Java applets, which are usedto create interactive web pages, can be programme

Page 148

Script ControlYou can see the rules created so far listed in the table.ImportantThe rules are listed in order of their priority starting from the top,

Page 149 - 18.2. On-demand Scanning

Select Address and ActionYou can set the parameters:⚫ Domain address - type in the domain on which the rule should apply.⚫ Action - select the action

Page 150 - 18.2.1. Scan Tasks

22. FirewallThe Firewall protects your computer from inbound and outbound unauthorizedconnection attempts. It is quite similar to a guard at your gate

Page 151

You can see whether the BitDefender firewall is enabled or disabled. If you want tochange the firewall status, clear or select the corresponding check

Page 152 - 18.2.2. Using Shortcut Menu

DescriptionDefault actionApplies the current rules and allows all traffic attemptsthat do not match any of the current rules withoutAllow Allprompting

Page 153 - 18.2.3. Creating Scan Tasks

NoteThis option does not automatically enable ICS on your system, but only allows thistype of connection in case you enable it from your operating sys

Page 154

⚫ Enable Intrusion Detection (IDS) - activates the heuristic monitoring of theapplications trying to access network services or the Internet.22.2. Net

Page 155

22.2.1. Changing the Trust LevelBitDefender assigns each network adapter a trust level. The trust level assigned tothe adapter indicates how trustwort

Page 156

DescriptionStealth optionYour computer cannot be detected from the Internet.Local network users can ping and detect yourcomputer.Remote22.2.3. Configu

Page 157

Follow these steps to install BitDefender Internet Security 2010:1. Click Next. You can cancel installation anytime you want by clicking Cancel.BitDef

Page 158

2. Select the action:⚫ Allow - to allow all traffic between your computer and the selected computer.⚫ Deny - to block all traffic between your compute

Page 159

through any adapter. You can manually create rules or edit existing rules to filteran application's network or Internet access through a specific

Page 160 - Setting Scan Target

⚫ Action - whether the application is allowed or denied access to network or Internetunder the specified circumstances.22.3.1. Adding Rules Automatica

Page 161

3. Click OK to add the new rule.Modifying rules. To modify an existing rule, follow these steps:1. Click the Edit rule button or double-click the rule

Page 162

▸ If you want the rule to apply to UDP, select UDP.▸ If you want the rule to apply to a specific protocol, select Other. An edit fieldwill appear. Typ

Page 163 - Scheduling Scan Tasks

Advanced ParametersYou can configure the following advanced parameters:⚫ Direction. Select from the menu the traffic direction the rule applies to.Des

Page 164 - Scanning Methods

▸ To filter traffic between your computer and a specific computer, clear the Anycheck box and type its IP address.▸ If you have selected TCP or UDP as

Page 165

NoteWhen a connection attempt is made (whether incoming or outgoing), BitDefenderapplies the action of the first rule matching the respective connecti

Page 166

You can see the total traffic sorted by application. For each application, you can seethe connections and the open ports, as well as statistics regard

Page 167 - Antivirus Scan Wizard

23. VulnerabilityAn important step in protecting your computer against malicious persons andapplications is to keep up to date the operating system an

Page 168

ImportantWe recommend you to turn off Windows Firewall since BitDefender InternetSecurity 2010 already includes an advanced firewall. Running two fire

Page 169

ImportantTo be automatically notified about system or application vulnerabilities, keep theAutomatic Vulnerability Checking enabled.23.1.1. Fixing Vul

Page 170

Automatic Vulnerability Checking SettingsSelect the check boxes corresponding to the system vulnerabilities you want to beregularly checked.⚫ Critical

Page 171

24. EncryptionBitDefender offers encryption capabilities to protect your confidential documentsand your instant messaging conversations through Yahoo

Page 172 - 18.2.6. Viewing Scan Logs

Instant Messaging EncryptionBy default, IM Encryption is enabled for both Yahoo Messenger and Windows Live(MSN) Messenger. You can choose to disable I

Page 173

1. Click the Add button to open the configuration window.Adding Contacts2. Type in the edit field the user ID of your contact.3. Select the instant me

Page 174

File VaultTo disable File Encryption, clear the File Encryption is enabled check box andclick Yes to confirm. If you disable File Vault, all file vaul

Page 175 - Step 1/4 - Select Object Type

Create File VaultProceed as follows:1. Specify the location and the name of the vault file.⚫ Click Browse, select the location of the vault and save t

Page 176

24.2.2. Opening a VaultIn order to access and work with the files stored in a vault, you must open the vault.When you open the vault, a virtual disk d

Page 177

⚫ Select the vault from the table and click Lock vault.⚫ Right-click the vault in the table and select Lock.⚫ Right-click the corresponding virtual di

Page 178

NoteThe password must have at least 8 characters. For a strong password, use acombination of uppercase and lowercase letters, numbers and special char

Page 179

3.1.1. Step 1/2 - Register BitDefender Internet Security 2010RegistrationBitDefender Internet Security 2010 comes with 30-day trial period. To continu

Page 180

3. Remove files or folders as you normally do in Windows (for example, right-clicka file you want to delete and select Delete).Encryption242BitDefende

Page 181

25. Game / Laptop ModeThe Game / Laptop Mode module allows you to configure the special operationmodes of BitDefender:⚫ Game Mode temporarily modifies

Page 182 - 18.4. Quarantine Area

Game ModeAt the top of the section, you can see the status of the Game Mode. You can clickTurn On Game Mode Mode or Turn Off Game Mode to change the c

Page 183

NoteIf you do not want BitDefender to automatically enter Game Mode, clear theAutomatic Game Mode check box.25.1.2. Managing the Game ListBitDefender

Page 184

Adding or Editing GamesWhen you add or edit an entry from the game list, the following window will appear:Add GameClick Browse to select the applicati

Page 185

3. Click OK to save the changes.25.1.4. Changing Game Mode HotkeyYou can manually enter Game Mode using the default Ctrl+Alt+Shift+G hotkey.If you wan

Page 186 - 19. Antispam

To configure Laptop Mode, go to Game / Laptop Mode>Laptop Mode in ExpertMode.Laptop ModeYou can see whether Laptop Mode is enabled or not. If Lapto

Page 187 - Bayesian Filter

26. Home NetworkThe Network module allows you to manage the BitDefender products installed onyour home computers from a single computer.Network MapTo

Page 188 - 19.1.2. Antispam Operation

Configure Password2. Type the same password in each of the edit fields.3. Click OK.You can see the computer name appearing in the network map.26.2. Ad

Page 189 - 19.2. Status

Add ComputerYou can see the list of computers in the network. The icon meaning is as follows:⚫Indicates an online computer with no BitDefender product

Page 190 - Antispam

3.1.2. Step 2/2 - Create a BitDefender AccountAccount CreationIf you do not want to create a BitDefender account at the moment, select Registerlater a

Page 191

Authenticate5. Type the home management password configured on the respective computer.6. Click OK. If you have provided the correct password, the sel

Page 192

Network MapIf you move the mouse cursor over a computer from the network map, you can seebrief information about it (name, IP address, number of issue

Page 193

⚫ Fix all issues on this PCAllows you to fix the issues that are affecting the security of this computer byfollowing the Fix All Issues wizard.⚫ View

Page 194

27. UpdateNew malware is found and identified every day. This is why it is very important tokeep BitDefender up to date with the latest malware signat

Page 195 - 19.3. Settings

Automatic UpdateHere you can see when the last check for updates and the last update wereperformed, as well as information about the last update perfo

Page 196 - 19.3.1. Antispam Settings

The Update module will connect to the BitDefender update server and will verifyif any update is available. If an update was detected, depending on the

Page 197

Update SettingsThe update settings are grouped into 4 categories (Update Location Settings,Automatic Update Settings, Manual Update Settings and Advan

Page 198 - 20. Parental Control

NoteWe recommend you to set as primary update location the local mirror and to leavethe alternate update location unchanged, as a fail-safe plan in ca

Page 199 - Parental Control

NoteIf BitDefender is updated while a scan is in progress, the scan process will beaborted.⚫ Don't update if game mode is on - BitDefender will n

Page 200

on to that account. If the proxy server requires a username and a password, youmust specify them in the corresponding fields.⚫ Default Browser Proxy -

Page 201

⚫ Re-type password - type in again the previously specified password.NoteOnce the account is activated, you can use the provided e-mail address andpas

Page 202 - 20.1.2. Setting Age Category

28. RegistrationTo find complete information on your BitDefender product and the registrationstatus, go to Registration in Expert Mode.RegistrationThi

Page 203

RegistrationYou can see the BitDefender registration status, the current license key and howmany days are left until the license expires.To register B

Page 204

ImportantYou must create an account within 15 days after installing BitDefender (if you registerit with a license key, the deadline is extended to 30

Page 205

⚫ Password - type in a password for your BitDefender account. The passwordmust be between 6 and 16 characters long.⚫ Re-type password - type in again

Page 206 - 20.3. Web Control

4. Click Sign in.5. Click Finish to complete the wizard.Registration266BitDefender Internet Security 2010

Page 207

Integration into Windows and Third-Party Software267BitDefender Internet Security 2010

Page 208

29. Integration into Windows Contextual MenuThe Windows contextual menu appears whenever you right-click a file or folder onyour computer or objects o

Page 209 - 20.4. Web Time Limiter

3. Click the Virus Scan tab.4. Right-click the Contextual Scan task and select Open. A window will appear.5. Click Custom and configure the scanning o

Page 210 - 20.5. Applications Control

29.2.1. Create VaultKeep in mind that a vault is actually just a file with the .bvd extension. Only whenyou open the vault, a virtual disk drive appea

Page 211

7. Click Create if you only want to create the vault at the selected location. Tocreate and display the vault as a virtual disk drive in My Computer,

Page 212 - 20.6. Keywords Control

3.2. Configuration WizardOnce you have completed the registration wizard, a configuration wizard will appear.This wizard helps you configure the main

Page 213

29.2.3. Lock VaultWhen you are done with your work in a file vault, you must lock it in order to protectyour data. By locking the vault, the correspon

Page 214

29.2.5. Remove from File VaultIn order to remove files or folders from a vault, the vault must be open. To removefiles or folders from a vault, follow

Page 215

NoteThe password must have at least 8 characters. For a strong password, use acombination of uppercase and lowercase letters, numbers and special char

Page 216 - 21. Privacy Control

30. Integration into Web BrowsersBitDefender protects you against phishing attempts when you are surfing theInternet. It scans the accessed web sites

Page 217 - 21.2. Identity Control

⚫ Enable / Disable - enables / disables the BitDefender antiphishing protection inthe current web browser.⚫ Settings - opens a window where you can sp

Page 218 - Privacy Control

You can add the sites that you fully trust to the White List, so that they will notbe scanned by the antiphishing engines anymore. To add a site to th

Page 219

31. Integration into Instant Messenger ProgramsBitDefender offers encryption capabilities to protect your confidential documentsand your instant messa

Page 220 - Step 1/4 - Welcome Window

32. Integration into Mail ClientsBitDefender Internet Security 2010 includes an Antispam module. Antispam verifiesthe e-mail messages you receive and

Page 221

32.1.1. Step 1/6 - Welcome WindowWelcome WindowClick Next.Integration into Mail Clients280BitDefender Internet Security 2010

Page 222 - 21.2.2. Defining Exclusions

32.1.2. Step 2/6 - Fill in the Friends ListFill in the Friends ListHere you can see all the addresses from your Address Book. Please select thoseyou w

Page 223 - 21.2.3. Managing Rules

Each man has his price BobAnd yours was pretty lowBitDefender Internet Security 2010

Page 224 - 21.3. Registry Control

DescriptionOptionClick here if this PC is used mainly for browsing and multimediaactivities.TypicalClick here if this PC is used by children and you w

Page 225

32.1.3. Step 3/6 - Delete Bayesian DatabaseDelete Bayesian DatabaseYou may find that your antispam filter has begun to lose efficiency. This may bedue

Page 226 - 21.4. Cookie Control

32.1.4. Step 4/6 - Train Bayesian Filter with Legitimate MailTrain Bayesian Filter with Legitimate MailPlease select a folder that contains legitimate

Page 227

32.1.5. Step 5/6 - Train Bayesian Filter with SpamTrain Bayesian Filter with SpamPlease select a folder that contains spam e-mail messages. These mess

Page 228 - 21.4.1. Configuration Window

32.1.6. Step 6/6 - SummarySummaryHere you can view all the settings for the configuration wizard. You can make anychanges, by returning to the previou

Page 229

Antispam ToolbarEach button from the BitDefender toolbar will be explained below:⚫ Is Spam - sends a message to the Bayesian module indicating that th

Page 230 - 21.5. Script Control

Add SpammerSelect Don't show this message againif you don't want to be prompted forconfirmation when you add a spammer'saddress to the

Page 231 - 21.5.1. Configuration Window

NoteAny e-mail message received from an address contained in the Spammers listwill be automatically marked as SPAM, without further processing.Spammer

Page 232

WarningDo not add domains of legitimate web-based e-mail services (such as Yahoo, Gmail,Hotmail or other) to the Spammers list. Otherwise, the e-mail

Page 233 - 22. Firewall

Friends ListHere you can add or remove entries from the Friends list.If you want to add an e-mail address check the Email address option, type inthe a

Page 234 - Firewall

For Microsoft Outlook Express / Windows Mail a new window will appearfrom where you can select the folder that contains the e-mail addresses you wantt

Page 235

performed, as they require more system resources and, implicitly, increase powerconsumption.Click Next to continue.3.2.3. Step 3 - Select User Interfa

Page 236

The following options are available:▸ Move message to Deleted Items - moves the spam messages to the DeletedItems (only for Microsoft Outlook Express

Page 237 - 22.2. Network

How To293BitDefender Internet Security 2010

Page 238

33. How to Scan Files and FoldersScanning is easy and flexible with BitDefender. There are 4 ways to set BitDefenderto scan files and folders for viru

Page 239 - 22.2.4. Network Zones

Running Scan Tasks in Intermediate ModeIn Intermediate Mode, you can run a number of pre-configured scan tasks. You canalso configure and run custom s

Page 240 - 22.3. Rules

2. Click the Virus Scan tab. Here you can find a number of default scan tasks andyou can create your own scan tasks. These are the default scan tasks

Page 241

5. Click Continue to start the scan.6. Follow the Antivirus Scan wizard to complete the scan.What is Safe Mode?Safe Mode is a special way to start Win

Page 242

34. How to Schedule Computer ScanScanning your computer periodically is a best practice to keep your computer freefrom malware. BitDefender allows you

Page 243 - Configuring Main Parameters

4. Right-click the desired scan task and select Schedule. A new window will appear.5. Schedule the task to run as needed:⚫ To run the scan task one-ti

Page 244

Troubleshooting and Getting Help300BitDefender Internet Security 2010

Page 245

35. TroubleshootingThis chapter presents some problems you may encounter when using BitDefenderand provides you with possible solutions to these probl

Page 246

DescriptionModeAimed at users with average computer skills, this modeextends what you can do in Novice Mode.Intermediate ModeYou can fix issues separa

Page 247 - 22.4. Connection Control

Description&SolutionError2. Run the uninstall tool using administrator privileges.3. Restart your computer.4. Start the setup wizard again to inst

Page 248

1. Clean up the system after the failed installation. If the installation fails,some BitDefender registry keys and files may remain in your system. Su

Page 249 - 23. Vulnerability

⚫ temporary communication errors between the BitDefender services.⚫ some of the BitDefender services are stopped.⚫ other security solutions running on

Page 250 - 23.2. Settings

Unsecured Wi-Fi networks present a great security risk because your computeris connected to unknown computers. Without the proper protection provided

Page 251 - Vulnerability

▸ If the Windows Firewall is used, it can be configured to allow file and printersharing as follows: open the Windows Firewall settings window, Except

Page 252 - 24. Encryption

5. Depending on the level of security you want to obtain, choose one of the followingoptions:⚫ Unsafe - to access the files and printers shared in the

Page 253 - Encryption

If you suspect the problem is with the BitDefender firewall, you can contactBitDefender for support as described in section “Support” (p. 316).35.4. A

Page 254 - 24.2. File Encryption

NoteBitDefender integrates into the most commonly used mail clients through aneasy-to-use antispam toolbar. For a complete list of supported mail clie

Page 255 - 24.2.1. Creating a Vault

4.Click the Add Friend button on the BitDefender antispam toolbar to add thesender to the Friends list. You may need to click OK to acknowledge. You w

Page 256

8. Click Finish to start the training process.9. When training is completed, click Close.Ask for HelpIf this information was not helpful, you can cont

Page 257 - 24.2.3. Locking a Vault

1. Select Enable Parental Control.2. If you are sharing your Windows user account with your children, select thecorresponding check box and type a pas

Page 258

2. Go to the Inbox folder.3. Select the undetected spam messages.4. Click the Is Spam button on the BitDefender antispam toolbar (normally locatedin t

Page 259

Retrain Learning Engine (Bayesian)Before training the Learning Engine (Bayesian), prepare a folder containing onlySPAM messages and another one contai

Page 260

NotePOP3 is one of the most widely used protocols for downloading e-mail messagesfrom a mail server. If you do not know the protocol that your e-mail

Page 261 - 25. Game / Laptop Mode

2. Run the uninstall tool using administrator privileges. The uninstall tool will removeall the files and registry keys that were not removed during t

Page 262 - Game / Laptop Mode

36. SupportAs a valued provider, BitDefender strives to provide its customers with anunparalleled level of fast and accurate support. The BitDefender

Page 263

36.3. Contact InformationEfficient communication is the key to a successful business. During the past 10years BITDEFENDER has established an unquestio

Page 264 - Adding or Editing Games

DeutschlandOffice: +49 2301 91 84 222Sales: [email protected] support: http://kb.bitdefender.deWeb: http://www.bitdefender.deUK and Ire

Page 265 - 25.2. Laptop Mode

BitDefender Rescue CD319BitDefender Internet Security 2010

Page 266

37. OverviewBitDefender Internet Security 2010 comes with a bootable CD (BitDefenderRescue CD) capable to scan and disinfect all existing hard drives

Page 267 - 26. Home Network

37.2. Included SoftwareBitDefender Rescue CD includes the following software packages.XeditThis is a text file editor.VimThis is a powerful text file

Page 268 - Home Network

Click Next to continue.3.2.6. Step 6 - Select the Tasks to Be RunTask SelectionSet BitDefender to perform important tasks for the security of your sys

Page 269

For more information, please refer to the Nessus homepage.IptrafIptraf is an IP Network Monitoring Software.For more information, please refer to the

Page 270

38. BitDefender Rescue CD HowtoThis chapter contains information on how to start and stop the BitDefender RescueCD, scan your computer for malware as

Page 271

The Desktop38.2. Stop BitDefender Rescue CDChoose "EXIT"You can safely shut down your computer by selecting Exitfrom the BitDefender Rescue

Page 272

Wait for this message when shutting down38.3. How do I perform an antivirus scan?A wizard will appear when the boot process has finished and allow you

Page 273 - 27. Update

1. Double click the START SCANNER icon on the Desktop. This will launch theBitDefender Scanner for Unices.2. Click Scanner, a new window will appear.3

Page 274 - 27.1.1. Requesting an Update

DescriptionConnectionSelect this type of connection when you are using a localarea network (LAN) to access the Internet. It is also suitablefor wirele

Page 275 - 27.2. Update Settings

Update Signatures2. Do one of the following:▸ Select Cumulative to install signatures already saved on your hard disk bybrowsing your computer and loa

Page 276

6. Press F2 to save the current file, confirm saving, and then press F10 to closeit.7. Type the command: bdscan update.38.6. How do I save my data?Let

Page 277

Desktop Screen3. Double-click the partition where the data you want to save is located (e.g.[sda3]).NoteWhen working with BitDefender Rescue CD, you w

Page 278 - 27.2.5. Managing Proxies

Saving Data6. Type /media/sdb1/ into the corresponding textbox and click Copy.Please be aware that depending on your computer configuration it might b

Page 279

3. Click the Virus Scan tab.4. Right-click the System Scan task and select Schedule. A new window willappear.5. Change the frequency and the start tim

Page 280 - 28. Registration

GlossaryActiveXActiveX is a model for writing programs so that other programs and the operatingsystem can call them. ActiveX technology is used with M

Page 281 - Registration

Internet Explorer. Both of these are graphical browsers, which means that theycan display graphics as well as text. In addition, most modern browsers

Page 282

Filename extensionThe portion of a filename, following the final point, which indicates the kind ofdata stored in the file.Many operating systems use

Page 283

exists on tapes or disks. Every computer comes with a certain amount of physicalmemory, usually referred to as main memory or RAM.Non-heuristicThis me

Page 284

Report fileA file that lists actions that have occurred. BitDefender maintains a report filelisting the path scanned, the folders, the number of archi

Page 285

sends information back to the spyware's home base via the user's Internetconnection. Because spyware is using memory and system resources, t

Page 286 - 29.1. Scan with BitDefender

itself over and over again is relatively easy to produce. Even such a simplevirus is dangerous because it will quickly use all available memory and br

Page 287 - 29.2. BitDefender File Vault

NoteThe scan will take a few minutes. When it is over, open the scan window and checkthe scan results to see if your system is clean. If viruses were

Page 288 - 29.2.1. Create Vault

4. UpgradeYou can upgrade to BitDefender Internet Security 2010 if you are using BitDefenderInternet Security 2010 beta or the 2008 or 2009 version.Th

Page 289 - 29.2.2. Open Vault

5. Repairing or Removing BitDefenderIf you want to repair or remove BitDefender Internet Security 2010, follow the pathfrom the Windows start menu: St

Page 290 - 29.2.4. Add to File Vault

Getting Started21BitDefender Internet Security 2010

Page 291 - 29.2.6. Change Vault Password

Table of ContentsEnd User Software License Agreement ... . ... . ... . .. . . .. . ... . ... . ... . ... . xiPreface .. . ... . .. . ... . ... . ...

Page 292 - (such as #, $ or @)

6. OverviewOnce you have installed BitDefender your computer is protected. If you have notcompleted the configuration wizard, you must open BitDefende

Page 293 - Integration into Web Browsers

DescriptionModeYou can fix issues separately and choose which issuesto be monitored. Moreover, you can manage remotelythe BitDefender products install

Page 294

Novice ModeThe window is organized into three main sections:⚫ Security Status informs you of the issues that affect your computer's securityand h

Page 295

▸ When the Parent profile is selected, the Parental Control button allows youto configure the Parental Control settings. For more information on how t

Page 296

Intermediate ModeThe Intermediate Mode window consists of five tabs. The following table brieflydescribes each tab. For detailed information, please r

Page 297 - Integration into Mail Clients

In the upper-right corner of the window, you can see the Settings button. It opensa window where you can change the user interface mode and enable or

Page 298

Expert ModeOn the left side of the window there is a menu containing all security modules. Eachmodule has one or more tabs where you can configure the

Page 299

DescriptionModuleAllows you to prevent data theft from your computer andprotect your privacy while you are online.Privacy ControlAllows you to protect

Page 300

6.3. System Tray IconTo manage the entire product more quickly, you can use the BitDefender icon inthe system tray. If you double-click this icon, Bit

Page 301

Scan Activity BarThe gray bars (the File Zone) show the number of scannedfiles per second, on a scale from 0 to 50. The orange barsdisplayed in the Ne

Page 302

6.6.1. Game Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 336.6.2. Laptop Mode . .

Page 303 - 32.2. Antispam Toolbar

3. In the General Settings category, select the check box corresponding to ScanActivity Bar.4. Click OK to save and apply the changes.6.5. BitDefender

Page 304

When you are done selecting the locations, click Continue. The Antivirus Scanwizard will appear and guide you through the scanning process.Scanning op

Page 305

⚫ Scan only the most important filesWhile in Game Mode, you can see the letter G over the BitDefender icon.Using Game ModeBy default, BitDefender auto

Page 306

6.6.2. Laptop ModeLaptop Mode is especially designed for laptop and notebook users. Its purpose is tominimize BitDefender's impact on power consu

Page 307

Device Detection AlertTo scan the storage device, just click Yes. TheAntivirus Scan wizard will appear and guide youthrough the scanning process.If yo

Page 308

7. Fixing IssuesBitDefender uses an issue tracking system to detect and inform you about the issuesthat may affect the security of your computer and d

Page 309

Fix All Issues WizardThe wizard displays the list of existing security vulnerabilities on your computer.All current issues are selected to be fixed. I

Page 310

⚫ System vulnerabilities. BitDefender automatically checks your system forvulnerabilities and alerts you about them. System vulnerabilities include th

Page 311

8. Configuring Basic SettingsYou can configure the main product settings (including changing the user interfaceview mode) from the basic settings wind

Page 312 - 33.2. Using Scan Tasks

8.1. User Interface SettingsIn this area, you can switch the user interface view mode and reset the usage profile.Switching the user interface view mo

Page 313 - How to Scan Files and Folders

13.1.1. Configuring Status Tracking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9313.2. Quick Tasks . . . . . . . .

Page 314

8.2. Security SettingsIn this area, you can enable or disable product settings that cover various aspectsof computer and data security. The current st

Page 315 - 33.4. Using Scan Activity Bar

DescriptionSettingdefined. Restrictions may include blockinginappropriate web sites, as well as limiting gaming andInternet access according to a spec

Page 316 - How to Schedule Computer Scan

DescriptionSettingGame Mode temporarily modifies protection settingsso as to minimize their impact on system performanceduring games.Game ModeLaptop M

Page 317

9. History and EventsThe View Logs link at the bottom of the BitDefender main window opens anotherwindow with the BitDefender history & events. Th

Page 318

⚫ IM encryption⚫ File Encryption⚫ Game/Laptop Mode⚫ Home Network⚫ Update⚫ Registration⚫ Internet LogA list of events is available for each category. E

Page 319 - 35. Troubleshooting

10. Registration and My AccountBitDefender Internet Security 2010 comes with 30-day trial period. During the trialperiod, the product is fully functio

Page 320 - 35.1.2. Failed Installation

RegistrationYou can see the BitDefender registration status, the current license key and howmany days are left until the license expires.To register B

Page 321 - Troubleshooting

10.2. Activating BitDefenderTo activate BitDefender, you must create or sign in to a BitDefender account. If youdid not register a BitDefender account

Page 322 - Not Work

ImportantYou must create an account within 15 days after installing BitDefender (if you registerit with a license key, the deadline is extended to 30

Page 323

2. Type the e-mail address and the password of your account in the correspondingfields.NoteIf you have forgotten your password, click Forgot your pass

Page 324

18.3. Objects Excluded from Scanning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15518.3.1. Excluding Paths from Scann

Page 325

11. WizardsIn order to make BitDefender very easy to use, several wizards help you carry outspecific security tasks or configure more complex product

Page 326

You can see the scan status and statistics (scanning speed, elapsed time, numberof scanned / infected / suspicious / hidden objects and other).Wait fo

Page 327 - Indicate Detection Errors

ActionsYou can see the number of issues affecting your system.The infected objects are displayed in groups, based on the malware they are infectedwith

Page 328

DescriptionActionto search for and find such files on your computer, ifany.Please note that these hidden files are not the filesthat you deliberately

Page 329 - Ask for Help

Click Close to close the window.BitDefender Could Not Solve Some IssuesIn most cases BitDefender successfully disinfects the infected files it detects

Page 330 - Add Spammers to Spammers List

Welcome WindowIf you want to skip over this window when running this wizard in the future, selectthe Don't show this step the next time this wiza

Page 331

Select TargetClick Add Target, select the files or folders that you want to scan and click OK.The paths to the selected locations will appear in the S

Page 332

DescriptionOptionOnly the files with the extensions specified by the userwill be scanned. These extensions must be separatedby ";".Scan user

Page 333

DescriptionActionMoves infected files into the quarantine. Quarantinedfiles cannot be executed or opened; therefore, therisk of getting infected disap

Page 334 - 36. Support

Custom Scan LevelSpecify the type of malware you want BitDefender to scan for by selecting theappropriate options:DescriptionOptionScans for known vir

Page 335 - 36.3. Contact Information

21.4. Cookie Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20821.4.1. Configurat

Page 336 - UK and Ireland

Click OK to close the window.Click Next.11.2.4. Step 4/6 - Additional SettingsBefore scanning begins, additional options are available:Additional Sett

Page 337 - BitDefender Rescue CD

ScanningNoteThe scanning process may take a while, depending on the complexity of the scan.You can click the scan progress icon in the system tray to

Page 338 - 37. Overview

SummaryYou can see the results summary. If you want comprehensive information on thescanning process, click View Log to view the scan log.ImportantIf

Page 339 - 37.2. Included Software

11.3.1. Step 1/6 - Select Vulnerabilities to CheckVulnerabilitiesClick Next to check the system for the selected vulnerabilities.Wizards65BitDefender

Page 340 - Overview

11.3.2. Step 2/6 - Checking for VulnerabilitiesVulnerability CheckWait for BitDefender to finish checking for vulnerabilities.Wizards66BitDefender Int

Page 341 - BitDefender Rescue CD Howto

11.3.3. Step 3/6 - Update WindowsWindows UpdatesYou can see the list of critical and non-critical Windows updates that are not currentlyinstalled on y

Page 342

11.3.4. Step 4/6 - Update ApplicationsApplicationsYou can see the list of applications checked by BitDefender and if they are up todate. If an applica

Page 343

11.3.5. Step 5/6 - Change Weak PasswordsUser PasswordsYou can see the list of the Windows user accounts configured on your computer andthe level of pr

Page 344

⚫ Change user password. You must type the new password in the edit fields.Make sure to inform the user about the password change.NoteFor a strong pass

Page 345

These wizards do not appear when you fix issues, because file vaults are an optionalmethod of protecting your data. They can only be started from the

Page 346

27.1. Automatic Update . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25527.1.1. Requesting an

Page 347 - 38.6. How do I save my data?

Click Add Target, select the file or folder that you want to add and click OK. Thepath to the selected location will appear in the Path column. If you

Page 348

Step 3/6 - Create VaultThis is where you can specify information for the new Vault.Create VaultTo complete the file vault related information follow t

Page 349

5. Set the size of the file vault (in MB) by typing a number into the correspondingfield.Click Next.You will go to the step 5.Step 4/6 - PasswordThis

Page 350 - Glossary

SummaryClick Next.Step 6/6 - ResultsThis is where you can view the vault content.Wizards75BitDefender Internet Security 2010

Page 351

ResultsClick Finish.11.4.2. Remove Vault FilesThis wizard helps you remove files from a specific file vault.Step 1/5 - Select VaultHere you can specif

Page 352

Select VaultIf you select Browse for a File Vault, you must click Browse and select the filevault. You will go either to the step 3 if the selected va

Page 353

Enter passwordType the password into the corresponding field and click Next.Step 3/5 - Select filesThis is where you will be provided with the list of

Page 354

Select filesSelect the files to be removed and click Next.Step 4/5 - SummaryThis is where you can review chosen operations.Wizards79BitDefender Intern

Page 355

SummaryClick Next.Step 5/5 - ResultsThis is where you can view operation result.Wizards80BitDefender Internet Security 2010

Page 356

ResultsClick Finish.11.4.3. View File VaultThis wizard helps you open a specific file vault and view the files it contains.Step 1/4 - Select VaultHere

Comments to this Manuals

No comments