Home

BitDefender Internet Security 2009

image

Contents

1. General Update Location Settings Antivirus 5 5 Primary update location settings Antispam http upgrade bitdefender com Use proxy Alternate update location settings http upgrade bitdefender com Use proxy iren Automatic update settings Vulnerability Time interval 1 hours Encryption Confirm update GamejLaptop Mode 8 Silent update ES Prompt before downloading updates Prompt before installing updates Update Manual Update Settings Registration Silent update Prompt before downloading updates Advanced settings LJ wait for reboot instead of prompting vi Don t update if scan is in progress v Don t update if Game Mode is on Apply Befault 0 Q This is where you can configure in detail the update process 2 Sbitdefender Buy My Account Register Help Support Histor Update Settings The update settings are grouped into 4 categories Update Location Settings Automatic Update Settings Manual Update Settings and Advanced Settings Each category will be described separately 268 BitDefender Internet Security 2009 25 2 1 Setting Update Locations To set the update locations use the options from the Update Location Settings category Note 63 Configure these settings only if you are connected to a local network that stores BitDefender malware signatures locally or if you connect to the Internet through a proxy server For more reliab
2. BitDefender Internet Security 2009 In order to filter web access according to a predefined age based ruleset you must set a specific tolerance level Drag the slider along the scale to set the tolerance level you consider appropriate for the selected user There are 3 tolerance levels Tolerance level Description Child Offers restricted web access according to the recommended settings for users under the age of 14 Web pages with potentially harmful content for children porn sexuality drugs hacking etc are blocked Teenager Offers restricted web access according to the recommended settings for users from 14 to 18 years Web pages with sexual pornographic or adult content are blocked Adult Offers unrestricted access to all web pages regardless of their content Click Default Level to set the slider at default level 18 2 Web Control The Web Control helps you to block access to web sites with inappropriate content A list of candidates for blocking both sites and parts thereof is provided and updated by BitDefender as part of the regular update process To configure the Web Control for a specific user double click the respective user and click the Web tab Parental Control 187 BitDefender Internet Security 2009 BitDefender 2009 Parental Control di Status Web Applications Keywords IM Traffic Time limiter V Enable Web control O Allow access to these pages Block access to these pages x UR
3. File Vault 73 BitDefender Internet Security 2009 BitDefender Internet Security 2009 Trial zs STATUS There is 1 pending issue S a mie Lr DASHBOARD SECURITY PARENTAL FILE VAULT NETWORK CRITICAL WARNING PROTECTED PROTECTED Monitored Components Expand Collapse aj Tasks File vault OK gt Add File to Vault Remove Vault Files gt View Vault gt Lock Vault Q Sbitdefender Buy My Account Register Help Support Histor File Vault m Monitored Components Allows you to see the full list of monitored components for each module You can choose which of the modules to be monitored It is recommended to enable monitoring all components 9 1 Monitored Components The monitored component is the following File vault It is a secured storage space for personal information or sensitive files It is kept locally in your computer As it is encrypted the data inside it is invulnerable to theft or to a security breach Click the box labeled to open a category or click the one labeled to close it File Vault 74 BitDefender Internet Security 2009 9 1 1 File vault 9 2 The issues that might affect your data privacy are described in very explicit sentences In line with each sentence if there is something that might affect your data s privacy you will see a red status button called Fix Otherwise a green OK status button is displayed Issue Description The File Vault is File Vault kee
4. m After leaving full screen you add the application to the game list from the prompt window Game Laptop Mode 254 BitDefender Internet Security 2009 If you want to disable Automatic Game Mode for a specific application from the list clear its corresponding check box You should disable Automatic Game Mode for regular applications that go to full screen such as web browsers and movie players To manage the game list you can use the buttons placed at the top of the table m Add add a new application to the game list m Remove remove an application from the game list m Edit edit an existing entry in the game list Adding or Editing Games When you add or edit an entry from the game list the following window will appear BitDefender Game Mode Rules x Select application path elganelexe lt Enabled O Disabled Q Here is where you can add a new game to the game list already defined a Add Game Click Browse to select the application or type the full path to the application in the edit field If you do not want to automatically enter Game Mode when the selected application is started select Disable Click OK to add the entry to the game list 23 1 3 Configuring Game Mode Settings To configure the behaviour on scheduled tasks use these options m Scan Task to prevent scheduled scan tasks from running while in Game Mode You can choose one of the following options G
5. Move file quarantine the user will be scanned These extensions must be separated by Scans for riskware Detected files will be treated as infected The software that includes adware components might stop working if this option is enabled Select Skip dialers and applications from scan if you want to exclude these kind of files from scanning Scans the system s boot sector The accessed archives will be scanned With this option on the computer will slow down All packed files will be scanned Select from the drop down menu the first action to take on infected and suspicious files In case an infected file is detected the access to this will be denied Disinfects infected files Deletes infected files immediately without any warning to Moves infected files into the quarantine 125 BitDefender Internet Security 2009 Option Description Second action Deny access and continue Delete file Move file to quarantine Do not scan files greater than x Kb Do not scan archives greater than 20000 Kb Do not scan network shares The following options are available Select from the drop down menu the second action to take on infected files in case the first action fails In case an infected file is detected the access to this will be denied Deletes infected files immediately without any warning Moves infected files into the quarantine Type in the maximum size of the file
6. Retype password eesesesse a ce Configure Password 2 Type the same password in each of the edit fields 3 Click OK You can see the computer name appearing in the network map 10 1 2 Adding Computers to the BitDefender Network Before you can add a computer to the BitDefender home network you must configure the BitDefender home management password on the respective computer To add a computer to the BitDefender home network follow these steps Network 95 BitDefender Internet Security 2009 1 Click Manage Network You will be prompted to provide the local home management password BitDefender You must enter the home management password Password eeecccce E Don t show this message again this session ELEN os Enter Password 2 Type the home management password and click OK A new window will appear Manage Network x Select Computer Ll amatei xp m amilicescu m amiloiu ls amirea2 xp m amirea xp m amitrica xp a IP 10 10 15 193 Name amirea2 xp Add Add Computer You can see the list of computers in the network The icon meaning is as follows Wi Indicates an online computer with no BitDefender products installed Wi Indicates an online computer with BitDefender installed Network 96 BitDefender Internet Security 2009 S Indicates an offline computer with BitDefender installed 3 Do one of th
7. Security 67 BitDefender Internet Security 2009 Step 6 6 View Results Bit Defender Internet Security 2009 EA Vulnerability Scan 8 The vulnerability scan is finished The tasks you selected at Step 1 have been performed Qo The vulnerability scan is finished The tasks you selected at Step 1 have been performed a4 bitdefender Results Click Close Security 68 BitDefender Internet Security 2009 8 Parental BitDefender comes with a Parental module that helps you keep To enter the Parental module click the Parental tab BitDefender Internet Security 2009 Trial AX LY mG nf DASHBOARD SECURITY PARENTAL FILE VAULT NETWORK CRITICAL WARNING PROTECTED PROTECTED Monitored Components Parental Control OK gt Update Now gt Full System Scan gt Deep Scan Q This component displays the status of the Parental Control Feature designed to restrict access to the internet and to specific applications a C bitdefender Buy My Account Register Help Support Histor Parental The Parental module consists of two sections m Monitored Components Allows you to see the full list of monitored components for each security module You can choose which of the modules to be monitored It is recommended to enable monitoring all components m Tasks This is where you can find links to the most important security tasks full System scan deep scan update now 8 1 Monitored Components
8. Step Exclude paths Please enter here the path that should not be scanned Selected paths c documents and settings vdanciu desktop eicar testl Above you can browse for the path that you want to exclude from scanning Please make sure that you click add after you choose an a excluded path file or Folder You can add multiple items to this list Please choose the exceptions For the scanning process carefully and remember that it is recommended not to define any exception in order to be sure that your system is fully protected bitdefender as nee S conce Excluded Paths To specify the paths to be excluded from scanning use either of the following methods m Click Browse select the file or folder that you want to be excluded from scanning and then click Add m Type the path that you want to be excluded from scanning in the edit field and click Add Note If the provided path does not exist an error message will appear Click OK and check the path for validity The paths will appear in the table as you add them You can add as many paths as you want To remove an entry from the table select it and click the Delete button Click Next Antivirus 159 BitDefender Internet Security 2009 Step 3 4 Select Scanning Type Bit Defender Internet Security 2009 Exclusions Wizard Step 3 of 4 step 4 When to apply Please choose the type of scan that will apply to the selected exception
9. 2 2 Configuration Wizard sess senise enrio cece tenet eens 10 2 2 1 Step 1 9 Welcome Window c ccc cere emm nn 11 2 2 2 Step 2 9 Select View Mode lessen nmn 12 2 2 3 Step 3 9 Configure BitDefender Network 00000 000 13 2 2 4 Step 4 9 Configure Identity Control 0 00 eee 14 2 2 5 Step 5 9 Configure Parental Control 0 0 cece eee 17 2 2 6 Step 6 9 Configure Virus Reporting sseieeieeeeeeeeeeeeeee 19 2 2 7 Step 7 9 Select the Tasks to Be RUN 1 cece cece crean een eeeeenenee 20 2 2 8 Step 8 9 Wait for the Tasks to Complete ssuseeleulesssss 21 2 2 9 5t6p 9 9 sEIDIS let ecdesiae etat deducet e a e 22 93 Upgrade eo ee ete ee ener bote eee 23 4 Repairing or Removing BitDefender sssses 24 Basic Administration eeueeeeeeeseee ene 26 5 Getting Started siiri tirsir rh et rh Ra RR ERR ERE 27 5 1 Start BitDefender Internet Security 2009 0 0 cece eee eee 27 5 2 User Interface View MOGQG6 ectetur ERE nee rp ERO pp Rd nit 27 5 2 elit BASIC VIG Wiis cer op dT RIA dd DA ADU dd pA LE Ade 27 5 2 2 AdVAanCed VIEW cocos moore DUET ERR ERU DA TRU ERA UITR QN PITE 29 5 3 BitDefender Icon in the System Tray 000 cece eee eee eee 32 0 4 Scan Activity Bali eese orbe EEeiCeR De ONUS DIT IOS TA RE NIC REO DIES 33 BitDefender Internet Security 2
10. Firewall 226 BitDefender Internet Security 2009 20 3 1 Adding Rules Automatically With Firewall enabled BitDefender will ask for your permission whenever a connection to the Internet has been made BitDefender Firewall Alert You can see the following the application that is trying to access the Internet the path to the Adobe Acrobat 7 0 N 7 is connecting to a remote server application file the destination the protocol used 10 10 17 51 4320 gt 10 12 0 1 3128 H and the port on which the application is trying to File path c program files a robat acrobat exe conn ect Pi t H omen dibd 2009 outputibd 2009 sdecpoate pa Click Allow to allow all traffic inbound and Hobo SE outbound generated by this application from the rotocol A Port 3128 local host to any destination over the respective IP protocol and on all ports If you click Block the application will be denied access to the Internet We recommend to allow it to connect Q over the respective IP protocol completely EIB am Based on your answer a rule will be created applied and listed in the table The next time the Firewall Alert application tries to connect this rule will be applied by default Important O Allow inbound connection attempts only from IPs or domains you are sure to trust 20 3 2 Deleting Rules To delete a rule select it and click the Remove rule button You can select and delete several rules at
11. Full System Scan Scans the entire system except for archives In the default configuration it scans for all types of malware threatening your system s security such as viruses spyware adware rootkits and others Deep Scan Scans the entire system In the default configuration it scans for all types of malware threatening your system s security such as viruses spyware adware rootkits and others Note Since the Deep System Scan and Full System Scan tasks analyze the entire system the scanning may take a while Therefore we recommend you to run these tasks on low priority or better when your system is idle When you initiate an on demand scanning process whether a quick or a full scan the BitDefender Scanner will appear Follow the three step guided procedure to complete the scanning process 6 2 2 Updating BitDefender New malware is found and identified every day This is why itis very important to keep BitDefender up to date with the latest malware signatures By default BitDefender checks for updates when you turn on your computer and every hour after that However if you want to update BitDefender just click Update Now The update process will be initiated and the following window will appear immediately Dashboard 54 BitDefender Internet Security 2009 Bit Defender Internet Security 2009 RE Update BitDefender Update BitDefender will check for newer files and update them automatically Please make s
12. Password eeeeeeese The password must have at least 8 characters Q File Vault Wizard View Vault Content a bitdefender maom Enter password Type the password into the corresponding field and click Next Step 3 4 Summary This is where you can review chosen operations File Vault 88 BitDefender Internet Security 2009 Bit Defender Internet Security 2009 File Vault Step 3 of 4 Po Step Select vault Step 2 Enter password Step 3 Summary Step 4 Results Finish Operation View Vault Content Name dada Path E Documents and Settings test Desktop dada bvd Status Opened on I Please review chosen operations and click Next if you wish to continue You can click Back if you want to change anything Qe Cbitdefender d to the next step of the wizard Back Next Cancel Summary Click Next Step 4 4 Results This is where you can view the files of the vault File Vault 89 BitDefender Internet Security 2009 Bit Defender Internet Security 2009 aAA File Vault Step 4 of 4 O Step Select vault Step 2 Enter password Step 3 Summary Step 4 Results Display Vault Content I New Rich Text Document rtf Rich Text Document Qo File Vault Wizard View Vault Content 23 Cbitdefender Finish Results Click Finish 9 2 4 Locking Vault As you already know a file vault is an encrypted file on your computer with the bvd extension The file vault can be opened mounted or locke
13. To see the active connections and the open ports go to the Activity tab Atthe bottom of the section you can see the BitDefender statistics regarding incoming and outgoing traffic The graph shows the internet traffic volume over the last two minutes Note The graph appears even if the Firewall is disabled 20 1 1 Setting the Default Action By default BitDefender automatically allows all known programs from its white list to access network services and the Internet For all the other programs BitDefender prompts you through an alert window to specify the action to be taken The action you specify is applied every time the respective application requests network Internet access You can drag the slider along the scale to set the default action to be taken on the applications requiring network Internet access The following default actions are available Default action Description Allow All Applies the current rules and allows all traffic attempts that do not match any of the current rules without prompting This policy is strongly discouraged but it might be useful for network administrators and gamers Allow Known Programs Applies the current rules and allows all outgoing connection attempts from programs which are known to be legitimate whitelisted by BitDefender without Firewall 218 BitDefender Internet Security 2009 prompting For the rest of connection attempts BitDefender will ask for your permission
14. Whitelisted programs are the most commonly used applications worldwide They include the most known web browsers audio amp video players chat and filesharing programs as well as server clients and operating system applications Report Applies the current rules and consults you about all traffic attempts that do not match any of the current rules Deny All Applies the current rules and denies all traffic attempts that do not match any of the current rules 20 1 2 Configuring Advanced Firewall Settings You can click Advanced to configure the advanced firewall settings BitDefender Advanced Firewall Settings x oO Enable Internet Connection Sharing v Monitor changes in programs that match firewall rules LJ Ignore changes in signed processes L Enable Wireless Notifications Block Port Scans _ strict Automatic Rules Intrusion detection system IDS ENG Advanced Firewall Settings The following options are available m Enable Internet Connection Sharing ICS support enables support for Internet Connection Sharing ICS Note This option does not automatically enable ICS on your system but only allows this type of connection in case you enable it from your operating system Firewall 219 Firewall BitDefender Internet Security 2009 Internet Connection Sharing ICS enables members of local area networks to connect to the Internet through your computer This is useful when you benefit from a special p
15. bitdefender fent cance Select Vault If you select Browse for a File Vault you must click Browse and select the file vault You will go either to the step 3 if the selected vault is opened mounted or to the step 2 if it is locked unmounted If you click Select an existing File Vault then you must click the desired vault name You will go either to the step 3 if the selected vault is opened mounted or to the step 2 if it is locked unmounted Click Next Step 2 5 Password This is where you will be asked to enter the password for the selected vault File Vault 82 BitDefender Internet Security 2009 Bit Defender Internet Security 2009 zx File Vault Step 2 of 5 Step 1 Select vault Step 2 Enter password Step 3 Select Files Step 4 Summary Step 5 Results Ask Vault Password Please enter the password for selected vault Password The password must have at least 8 characters Q File Vault Wizard Removes files from Vault a bitdefender maom Enter password Type the password into the corresponding field and click Next Step 3 5 Select files This is where you will be provided with the list of the files from the previously selected vault File Vault 83 BitDefender Internet Security 2009 Bit Defender Internet Security 2009 Max File Vault Step 3 of 5 Select files Please select files to remove from the selected Vault T New Rich Text Document rtf oO I New Wo
16. m xxx com the action of the rule will apply on all web sites finished with XXX com m porn the action of the rule will apply on all web sites containing porn in the web site address m www com the action of the rule will apply on all web sites having the domain suffix com m www xxx the action ofthe rule will apply on all web sites starting with www xxx no matter the domain suffix 18 2 2 Specify Exceptions Sometimes you may need to specify exceptions to a particular rule For example you set a rule that blocks sites which contain the word killer in the address syntax killer You are also aware of the existence of a site called killer music Parental Control 189 BitDefender Internet Security 2009 where visitors can listen to music online To make an exception to the previously created rule access the Exceptions window and define an exception to the rule Click Exceptions The following window will appear BitDefender 2009 Exceptions x x URLs Q Specifying Exceptions Click Add to specify exceptions The configuration wizard will appear Complete the wizard in order to set the exception To delete a rule just select it and click Delete To modify a rule select it and click Edit or double click it To temporarily deactivate a rule without deleting it clear the corresponding checkbox Click Close to save the changes and close the window 18 2 3 BitDefender Web
17. BitDefender GmbH Airport Office Center Robert Bosch Str 2 59439 Holzwickede Germany Tel 49 0 231 99 33 98 0 Email info bitdefender com Sales sales bitdefender com Web http www bitdefender com Technical Support support bitdefender com UK and Ireland Business Centre 10 Queen Street Newcastle Staffordshire ST5 1ED Tel 44 0 8451 305096 Email info bitdefender com Sales sales bitdefender com Web http www bitdefender co uk Technical support support bitdefender com Spain Constelaci n Negocial S L C Balmes 195 2a planta 08006 Barcelona Soporte t cnico soporte bitdefender es com Ventas comercial bitdefender es com Support 282 BitDefender Internet Security 2009 Phone 34 932189615 Fax 34 932179128 Sitio web del producto http Awww bitdefender es com Romania BITDEFENDER West Gate Park Building H2 24 Preciziei Street Bucharest Technical support support bitdefender com Sales sales bitdefender com Phone 40 21 3001255 Phone 40 21 3001254 Product web site http www bitdefender com Support 283 BitDefender Internet Security 2009 BitDefender Rescue CD 284 BitDefender Internet Security 2009 28 Overview BitDefender Internet Security 2009 comes with a bootable CD BitDefender Rescue CD capable to scan and disinfect all existing hard drives before your operating system starts You should use BitDefender Rescue CD any time your op
18. Installing BitDefender 21 BitDefender Internet Security 2009 2 2 9 Step 9 9 Finish Bit Defender Internet Security 2009 BitDefender Configuration Wizard Step 9 of 9 Finish Thank you for using BitDefender 2009 Please refer to the Register button in the main window of the product For information on your BitDefender Account and the expiring date of the current license key The number of days left until expiration will be displayed in the dashboard in both basic view and advanced view BitDefender 2009 has been configured To launch the product double click the BitDefender red icon in the systray menu In basic view mode the dashboard from the main window displays the overall protection status and critical issues that require your attention For advanced options click Switch to Advanced View in the same window Open my BitDefender Account Internet connection required Q bitdefender eS S a Finish Select Open my BitDefender Account to enter your BitDefender account Internet connection is required Click Finish Installing BitDefender 22 BitDefender Internet Security 2009 3 Upgrade In order to upgrade an older version of BitDefender to BitDefender Internet Security 2009 follow these steps 1 Optional If that version of BitDefender includes Antispam you can save the Friends and Spammers lists in order to use them after the upgrade process is over For more information please refer to th
19. Move message to Deleted Items C Mark message as read Clear Antispam filter database Use this option only if your Antispam filter has become less efficient Wipe antispam database save Bayes 3 Load Bayes Q bitdefender P ELA Settings The following options are available Move message to Deleted Items moves the spam messages to the Deleted Items only for Microsoft Outlook Express Windows Mail Mark message as read marks all the spam messages as read so as not to be disturbing when new spam messages arrive If your antispam filter is very inaccurate you may need to wipe the filter database and retrain the Bayesian filter Click Wipe antispam database to reset the Bayesian database Use the amp Save Bayes amp Load Bayes buttons to save load the Bayesian database list to a desired location The file will have dat extension Click the Alerts tab if you want to access the section where you can disable the apparition of the confirmation windows for the amp Add spammer and Add friend buttons Note e In the Alerts window you can also enable disable the apparition of the Please select an email message alert This alert appears when you select a group instead of an email message m 4 Wizard opens the wizard that will step you through the process of training the Bayesian filter so that the efficiency of BitDefender Antispam will be further Getting Started 42 Bi
20. Update Applications Bit Defender Internet Security 2009 m IN Vulnerability Scan EZEZ Step 3 Passwords Step 4 Applications Step 5 Windows Step 6 Finish Applications Updates Application Name Installed Version Latest Version Download Yahoo Messenger 8 1 0 421 8 1 0 241 Up To Date Winamp 5 5 3 1938 5 5 3 1924 Up To Date Firefox 2 0 0 15 en US 3 0 en US Home Page Q This is a list of the applications supported by BitDefender and of the updates available if any 2 bitdefender c3 Applications You can see the list of applications checked by BitDefender and if they are up to date If an application is notup to date click the provided link to download the latest version Vulnerability 248 BitDefender Internet Security 2009 Click Next Step 5 6 Update Windows Bit Defender Internet Security 2009 m AJ Vulnerability Scan Step 1 Select tasks Step 2 Scanning Step 3 Passwords Step 4 Applications Step 5 Windows Step 6 Finish Windows Updates Critical Windows Updates Security Update for Microsoft XML Core Services 4 0 Service Pack 2 KB936181 Other Windows Updates No updates available in this category Install All System Updates Q This is a list of critical or non critical windows applications updates a bitdefender fent cance Windows Updates You can see the list of critical and non critical Windows updates that are not currently installed on your computer Click Install
21. defender INTERNET SECURITYoggg S User s guide defender BitDefender Internet Security 2009 BitDefender Internet Security 2009 User s guide Published 2008 10 29 Copyright 2008 BitDefender Legal Notice All rights reserved No part of this book may be reproduced or transmitted in any form or by any means electronic or mechanical including photocopying recording or by any information storage and retrieval system without written permission from an authorized representative of BitDefender The inclusion of brief quotations in reviews may be possible only with the mention of the quoted source The content can not be modified in any way Warning and Disclaimer This product and its documentation are protected by copyright The information in this document is provided on an as is basis without warranty Although every precaution has been taken in the preparation of this document the authors will not have any liability to any person or entity with respect to any loss or damage caused or alleged to be caused directly or indirectly by the information contained in this work This book contains links to third party Websites that are not under the control of BitDefender therefore BitDefender is not responsible for the content of any linked site If you access a third party website listed in this document you will do so at your own risk BitDefender provides these links only as a convenience and the inclusion of th
22. is able to work under Windows This book will describe for you BitDefender Internet Security 2009 the Company and the team who built it will guide you through the installation process will teach you how to configure it You will find out how to use BitDefender Internet Security 2009 how to update test and customize it You will learn how to get best from BitDefender We wish you a pleasant and useful lecture 1 Conventions Used in This Book 1 1 Typographical Conventions Several text styles are used in the book for an improved readability Their aspect and meaning are presented in the table below Appearance Description sample syntax Syntax samples are printed with monospaced characters http www bitdefender com The URL link is pointing to some external location on http or ftp servers support bitdefender com E mail addresses are inserted in the text for contact information Preface p xiv This is an internal link towards some location inside the document filename File and directories are printed using monospaced font option All the product options are printed using strong characters xiv BitDefender Internet Security 2009 The code listing is printed with monospaced characters sample code listing 1 2 Admonitions The admonitions are in text notes graphically marked bringing to your attention additional information related to the current paragraph Note 63 The note is just a sho
23. modification Based on your answer a rule is created and listed in the rules table The same action is applied whenever this program tries to modify a registry entry Registry Alert Note BitDefender will usually alert you when you install new programs that need to run after the next startup of your computer In most cases these programs are legitimate and can be trusted To configure Registry Control go to Privacy Control gt Registry in the Advanced View Privacy Control 208 BitDefender Internet Security 2009 BitDefender Internet Security 2009 Trial SWITCH TO BASIC VIEW Nene STATUS There is 1 pending issue Status Identity Registry Cookie Script General Antivirus v Enable Registry Control Total attempts blocked 0 Antispam Parental Control Name Action Application path Privacy Control Firewall Vulnerability Encryption Game Laptop Mode Network Update Registration Q Sbitdefender Buy My Account Register Help Support Histor Registry Control You can see the rules created so far listed in the table To delete a rule select it and click the Delete button 19 4 Cookie Control Cookies are a very common occurrence on the Internet They are small files stored on your computer Websites create these cookies in order to keep track of specific information about you Cookies are generally made to make your life easier For example they can help the website remember your
24. which will guide you through the setup process Before launching the setup wizard BitDefender will check for newer versions of the installation package If a newer version is available you will be prompted to download it Click Yes to download the newer version or No to continue installing the version then available in the setup file 18 BitDefender Internet Security 2009 Setup Wizard BitDefender Internet Parental Control 3 you aoa have narius program instale be kk Next to continue of Dee SH DO TRA ae era Clck Next to proceed with the installation Click Cancel 2009 Setup Click Browse to choose a new location for the instala Internet Securit requirements and determine if there is enough space o Location EiProgram Fles BtDefender Click Next to proceed with the installation Click Cancel o Installation Steps Installing BitDefender 18 BitDefender Internet Security 2009 License Agreement End User License Agreement License and Warranty IF YOU DO NOT AGREE TO THESE TERNS AND CONDITIONS DO NOT INSTALL THE SOFTWARE BY SELECTING I ACCEPT OK CONTINUE YES OR BY INSTALLING OR USING THE SOFTUARE IN ANY VAY YOU ARE INDICATING YOUR COMPLETE UNDERSTANDING AND ACCEPTANCE OF THE TERMS OF THIS AGREEMENT These Terms cover BitDefender Solutions and Services for for home users licensed to you including V 1 accept the terms in the License Agreement Completing the BitDefender Internet Se
25. 1024 65535 Any Yes Both All Allow 17 E svchost exe Any No Any Adapter TCP AnyIPiDNS Any IP 1024 65535 Any Yes Both Traffic Listen Allow 18 m svchost exe Any No Any Adapter TCP Any IP 1024 65535 Any IP RPC Any Yes Both Connect Traffic Allow 19 m svchost exe Any No Any Adapter TCP Any IP Any Port Any IP HTTP HTTPS Any No Both Connect Traffic Allow 20 E svchost exe Any No Any Adapter UDP Any IP NTP 1024 Any IP NTP Any No Both all Allow 2 m svchost exe Any No Safe TCP Any IP RPC Any IP Any Port Any Yes Both Traffic Listen Allow 22 E svchost exe Any No Any Adapter Any AnyIP AnyPot AnyIP Any Port Any No Both all Deny 23 PA system Any No Any Adapter UDP AnyIP NetBIOS NS Any IP NetBIOS NS Any Yes Both All Allow 24 PH System Any No Any Adapter TCP Any IP Any Port Any IP NetBIOS S Any Yes Both Connect Traffic Allow 25 PA system Any No Any Adapter UDP Any IP L2TP IKE Any IP 1024 65535 Any No Both All Allow 26 PA System Any No Any Adapter TCP Any IP PPTP RDP Any IP 1024 65535 Any No Both Traffic Listen Allow 27 Pfisystem Any No Any Adapter UDP Any IP 1024 65535 Any IP L2TP IKE Any No Both all Allow 28 PA system Any No Any Adapter TCP Any IP 1024 65535 Any IP PPTP Any No Both Connect Traffic Allow 29 PA System Any No Safe UDP Any IP NetBIOSDDS Any IP NetBIOSDDS Any Yes Both all Allow y Q bitdefender Advanced Rule Management You can see the firewall rules listed
26. 5 INI Items 2 amp Known DLLs 21 amp File Associations 8 exefile shell open command Firewall comfile shell open command batfile shelljopen command piffile shell open command Encryption Software CLASSES exefile shell open command Sc ishelloperlicommand Software CLASSES batfile shell open command Parental Privacy Vulnerability Game Laptop Mode Network Software CLASSES piffile shell open command z Scripts 2 oJ Update Registration Selected Item Description Path HKEY_LOCAL_MACHINE Software CLASSES comfile shell open command Current Association 1 Default Association 1 P Refresh Q Here are displayed basic components and settings of your system Select any item to see a detailed description a Sbitdefender Buy My Account Register Help Support Histor System Information The list contains all the items loaded when starting the system as well as the items loaded by different applications Three buttons are available m Restore changes a current file association to default Available for the File Associations settings only m Go to opens a window where the selected item is placed the Registry for example Note Depending on the selected item the Go to button may not appear m Refresh re opens the System Info section General 120 BitDefender Internet Security 2009 16 Antivirus BitDefender pr
27. Add exclude a new application from scanning m Remove remove an application from the list m gt Edit edit an application path 16 1 4 Disabling Real time Protection If you want to disable real time protection a warning window will appear BitDefender This option will disable the Antivirus protection For how long do you want to disable the Antivirus protection 5 minutes Pe cancel Disable Real time Protection You must confirm your choice by selecting from the menu how long you want the real time protection to be disabled You can disable real time protection for 5 15 or 30 minutes for an hour permanently or until the system restart Antivirus 129 BitDefender Internet Security 2009 Warning D This is a critical security issue We recommend you to disable real time protection for as little time as possible If real time protection is disabled you will not be protected against malware threats 16 1 5 Configuring Antiphishing Protection BitDefender provides real time antiphishing protection for m Internet Explorer m Mozilla Firefox m Yahoo Messenger m Windows Live MSN Messenger You can choose to disable the antiphishing protection completely or for specific applications only You can click White List to configure and manage a list of web sites that should not be scanned by BitDefender Antiphishing engines BitDefender Antiphishing x White List This is the
28. Blacklist In order to help you protect your children BitDefender provides a blacklist of websites with inappropriate or possibly dangerous content To block the sites that appear on this list select Use the list of blocked sites provided by BitDefender Parental Control 190 BitDefender Internet Security 2009 18 3 Applications Control The Applications Control helps you to block any application from running Games media and messaging software as well as other categories of software and malware can be blocked this way Applications blocked in this manner are also protected from modifications and cannot be copied or moved To configure the Applications Control for a specific user double click the respective user and click the Applications tab BitDefender 2009 Parental Control x Status Web Applications Keywords IM Traffic Time limiter V Enable Applications control Block the execution of these applications x Applications v C Documents and SettingslvdanciulDesktoplgame exe Q Applications Control To enable this protection select the checkbox corresponding to Enable Applications Control The rules must be input manually Click the Add button to start the configuration wizard To delete a rule just select it and click the amp Delete button To modify a rule select it and click the Edit button or double click it To temporarily deactivate a rule without deleting it clear
29. Delete old files Delete files older than 30 day s Check for old files every 1 day s K Delete duplicates Check for duplicates every 1 day s 8 Automatically submit files Submit files every 60 minute s K Scan quarantined files after update M Restore clean files Q Here you can configure the quarantine settings T as NEC Quarantine Settings Using the quarantine settings you can set BitDefender to automatically perform the following actions Delete old files To automatically delete old quarantined files check the corresponding option You must specify the number of days after which the quarantined files should be deleted and frequency with which BitDefender should check for old files Note By default BitDefender will check for old files every day and delete files older than 30 days Delete duplicates To automatically delete duplicate quarantined files check the corresponding option You must specify the number of days between two consecutive checks for duplicates Antivirus 167 BitDefender Internet Security 2009 Note By default BitDefender will check for duplicate quarantined files every day Automatically submit files To automatically submit quarantined files check the corresponding option You must specify the frequency with which to submit files Note By default BitDefender will automatically submit quarantined files every 60 minutes Sc
30. Don t show this message again this session By selecting this option you will not be prompted again for this password during the current session 10 1 4 Scanning All Computers To scan all managed computers follow these steps 1 Click Scan All You will be prompted to provide the local home management password BitDefender You must enter the home management password Password CITT Lb Don t show this message again this session ELEM NIIS Enter Password Network 99 BitDefender Internet Security 2009 2 Select a scan type m Full System Scan starts a full scan of your computer archives excluded m Deep Scan starts a full scan of your computer archives included m Scan My Documents starts a quick scan of your documents and settings BitDefender x Scan all computers in a network BDENTLAP5 XP Please choose the type of scan to be performed on all the computers From your Network map and click OK Full System Scan O Deep System Scan 8 My Documents Scan EIL Select Scan Type 3 Click OK 10 1 5 Updating All Computers To update all managed computers follow these steps 1 Click Update All You will be prompted to provide the local home management password BitDefender You must enter the home management password weh NUM E Don t show this message again this session a NIN Enter Password 2 Click OK Network 100 BitDefender
31. Exclusions Quarantine General Antivirus V Exceptions are enabled Antispam t cu Parental Excluded objects from scanning On Access On Demand Files and folders Privacy Control Firewall Vulnerability Encryption GamejLaptop Mode Network Update Extensions Registration This is where you can define exceptions from the scanning process specific Folders Files or types of files that should not be checked during a t scan Sbitdefender Buy My Account Register Help Support Histor Exceptions Antivirus 156 BitDefender Internet Security 2009 You can see the objects files folders extensions that are excluded from scanning For each object you can see if it is excluded from on access on demand scanning or both Note The exceptions specified here will NOT apply for contextual scanning To remove an entry from the table select it and click the Delete button To edit an entry from the table select it and click the Edit button A new window will appear where you can change the extension or the path to be excluded and the type of scanning you want them to be excluded from as needed Make the necessary changes and click OK Note You can also right click an object and use the options on the shortcut menu to edit or delete it You can click Discard to revert the changes made to the rule table provided that you have not saved them by clicking Apply 16 3 1 Excluding Paths from Sca
32. Friends 0 Manage Spammers MODERATE TO AGGRESSIVE This is the recommended setting Use this setting if you receive high volumes of spam regularly May produce some false positives legitimate mail incorrectly tagged as spam Configuring the Friends Spammers lists and training the Bayesian filter will help reduce the number of false positives Q Click here to configure your antispam module and to set your protection level 2 Cbitdefender Antispam Status Buy My Account Register Help Support History You can see whether Antispam is enabled or disabled If you want to change the Antispam status clear or select the corresponding check box Important e To prevent spam from entering your Inbox keep the Antispam filter enabled In the Statistics section you can view the results of the antispam activity presented per session since you started your computer or a summary since the installation of the BitDefender Antispam 173 BitDefender Internet Security 2009 17 2 1 Setting the Protection Level You can choose the protection level that better fits your security needs Drag the slider along the scale to set the appropriate protection level There are 5 protection levels Permissive Permissive to Moderate Moderate Moderate to Aggressive Aggressive Offers protection for accounts that receive a lot of legitimate commercial mail The filter will let most e mail pass through but it may
33. Game Mode when a game is detected You can configure the following options m Use the default list of games provided by BitDefender to automatically enter Game Mode when you start a game from the BitDefender s list of known games To view this list click Manage Games and then View Allowed Games m Enter game mode when in full screen to automatically enter Game Mode when an application goes to full screen Game Laptop Mode 253 BitDefender Internet Security 2009 m Add the application to the game list to be prompted to add a new application to the game list when you leave full screen By adding a new application to the game list the next time you start it BitDefender will automatically enter Game Mode Note e If you do not want BitDefender to automatically enter Game Mode clear the Automatic Game Mode check box 23 1 2 Managing the Game List BitDefender automatically enters Game Mode when you start an application from the game list To view and manage the game list click Manage Games A new window will appear BitDefender Manage Games List x My games list gt x Name v game exe View Allowed Games This is where you can find a list of applications for which you have set the default Game Mode behaviour Game List New applications are automatically added to the list when m You start a game from the BitDefender s list of known games To view this list click View Allowed Games
34. I Please review chosen operations and click Next if you wish to continue You can click Back if you want to change anything Q File Vault Wizard Close Vault 2 bitdefender maoa Summary Click Next Step 3 3 Results This is where you can view operation result File Vault 92 BitDefender Internet Security 2009 Bit Defender Internet Security 2009 File Vault Step 3 of 3 Display Operation Result Operation Close Vault Name dada Path E Documents and SettingsltestiDesktopldada bvd Result The operation succeeded Error Code Information Vault file lock succeeded Qe Cbitdefender d to the next step c Results Click Finish File Vault 93 BitDefender Internet Security 2009 10 Network The Network module allows you to manage the BitDefender products installed on your home computers from a single computer To enter the Network module click the File Manager tab BitDefender Internet Security 2009 Trial mE XY 5 a ci DASHBOARD SECURITY PARENTAL FILE VAULT NETWORK CRITICAL WARHING PROTECTED PROTECTED INTERNET WEEE a aras gerere Y No gateway found No PC click to add CQ No PC click to add 2 No PC click to add C No PC click to add No PC click to add C3 No PC click to add The Network module displays the BitDefender home network structure grayed if home network is not configured Click on Join Create Network to start creating your hom
35. If you do not agree to the terms of this agreement do not install or use BitDefender BitDefender License BitDefender is protected by copyright laws and international copyright treaties as well as other intellectual property laws and treaties BitDefender is licensed not sold GRANT OF LICENSE BITDEFENDER hereby grants you and only you the following non exclusive limited non transferable and royalty bearing license to use BitDefender APPLICATION SOFTWARE You may install and use BitDefender on as many computers as necessary with the limitation imposed by the total number of licensed users You may make one additional copy for back up purpose DESKTOP USER LICENSE This license applies to BitDefender software that can be installed on a single computer and which does not provide network services Each primary user may install this software on a single computer and may make one End User Software License Agreement x BitDefender Internet Security 2009 additional copy for backup on a different device The number of primary users allowed is the number of the users of the license TERM OF LICENSE The license granted hereunder shall commence on the purchasing date of BitDefender and shall expire at the end of the period for which the license is purchased EXPIRATION The product will cease to perform its functions immediately upon expiration of the license UPGRADES If BitDefender is labeled as an upgrade you must be properly
36. Internet Security 2009 Step 3 6 Change Weak Passwords Bit Defender Internet Security 2009 AL Vulnerability Scan EZE Step 3 Passwords Step 4 Applications Step 5 Windows Step 6 Finish User Passwords User Name Strength Status Administrator Strong Ok cosmin Weak Fix This is a list of the Windows accounts passwords set on your computer and the level of protection that they provide Click the Fix button to modify a the weak passwords bitdefender izes User Passwords You can see the list of the Windows user accounts configured on your computer and the level of protection their password provides Click Fix to modify the weak passwords A new window will appear BitDefender Choose method to fix Force user to change password at next login Q Change user password Type password Confirm password For cose Change Password Security 65 BitDefender Internet Security 2009 Select the method to fix this issue m Force user to change password at next login BitDefender will prompt the user to change the password the next time the user logs on to Windows m Change user password You must type the new password in the edit fields Note For a strong password use a combination of uppercase and lowercase letters numbers and special characters such as or Click OK to change the password Click Next Step 4 6 Update Applications Bit Defender Internet Security 2009 m IN
37. Internet Security 2009 10 1 6 Registering All Computers To register all managed computers follow these steps 1 Click Register All You will be prompted to provide the local home management password BitDefender You must enter the home management password Password eossscce L Don t show this message again this session NIIS Enter Password 2 Enter the key you want to register with BitDefender x Register the computer BDENTLAPS XP Enter the license key Enter the key you want to register with B ac Register All 3 Click OK Network 101 BitDefender Internet Security 2009 11 Basic Settings The Basic Settings module is the place where you can easily enable or disable important security modules To enter the Basic Settings module click the Settings button from the upper part of the Basic View BitDefender Basic Settings x Local security Status Real Time Antivirus amp Antispyware File Z Enabled E Update v Enabled Automatic Vulnerability Check v Enabled Online security view all components Parental control settings view all components Network settings view all components File Vault settings view all components General settings view all components Q Parental control settings tooltip A Basic Settings The available security modules have been grouped into several categories Category Description Local s
38. Note Any e mail message received from an address contained in the Spammers list will be automatically marked as SPAM without further processing BitDefender 2009 Configure the Spammers List O Email address 8 Domain name J When load empty current list domain domain i e domain domain something harriett ter com Import email addresses From Outlook Address Book m D Remove Clear list Save Load Q bitdefender ELM Spammers List Here you can add or remove entries from the Spammers list If you want to add an e mail address check the Email address option type in the address and click the 2 button The address will appear in the Spammers list Important e Syntax name domain com Getting Started 38 BitDefender Internet Security 2009 If you want to add a domain check the Domain name option type in the domain and click the 3 button The domain will appear in the Spammers list Important D Syntax domain com domain com and domain com all the received e mail messages from domain com will be tagged as SPAM e domain all the received e mail messages from domain no matter the domain suffixes will be tagged as SPAM com all the received e mail messages having the domain suffix com will be tagged as SPAM To import e mail addresses from Windows Address Book Outlook Express Folders into Microsoft Out
39. Scan Instant Messaging ve Match whole words Match case e Http web traffic and smtp e mail traffic containing your personal information will be blocked Q Select Traffic Select the type of traffic you want BitDefender to scan The following options are available m Scan HTTP scans the HTTP web traffic and blocks the outgoing data that matches the rule data m Scan SMTP scans the SMTP mail traffic and blocks the outgoing e mail messages that contain the rule data m Scan Instant Messaging scans the Instant Messaging traffic and blocks the outgoing chat messages that contain the rule data You can choose to apply the rule only if the rule data matches whole words or if the rule data and the detected string case match Click Next Privacy Control 204 BitDefender Internet Security 2009 Step 4 4 Describe Rule BitDefender Wizard Rule Description jhkhjbkb e Enter a description for this rule The description should help you or other administrators identify what information you blocked with more ease Q ERCCNE NCCNN Describe Rule Enter a short description of the rule in the edit field Since the blocked data character string is not displayed in plain text when accessing the rule the description should help you easily identify it Click Finish The rule will appear in the table 19 2 2 Defining Exceptions There are cases when you need to define exceptions to specific id
40. Security 2009 Getting Help Where to look and where to ask for help if something unexpected appears BitDefender Rescue CD Description of the BitDefender Rescue CD It helps understand and use the features offered by this bootable CD Glossary The Glossary tries to explain some technical and uncommon terms you will find in the pages of this document 3 Request for Comments Preface We invite you to help us improve the book We have tested and verified all of the information to the best of our ability Please write to tell us about any flaws you find in this book or how you think it could be improved to help us provide you with the best documentation possible Let us know by sending an e mail to documentation bitdefender com Important Please write all of your documentation related e mails in English so that we can process them efficiently xvi BitDefender Internet Security 2009 Installation BitDefender Internet Security 2009 1 System Requirements You may install BitDefender Internet Security 2009 only on computers running the following operating systems m Windows XP with Service Pack 2 32 64 bit or higher m Windows Vista 32 64 bit or Windows Vista with Service Pack 1 m Windows Home Server Before installation make sure that your computer meets the minimum hardware and software requirements Note To find out the Windows operating system your computer is running and hardware information right
41. Security 2009 Registration Wizard Step 1 Welcome to the BitDefender Registration Wizard EC where you can find Your This wizard will help you register BitDefender and create or update your BitDefender license key Account 1 CD Rom label Your current BitDefender license status is Trial Your current BitDefender license key is BE1B409B7E067AD03090 This license key will expire in 30 days 2 Product registration card Licensing Options If you want to keep the current key please select the first option IF you want to add a re new key please select the second option and fill the key in the box below Continue using the current key want to register the product with a new key 3 Online purchase e mail a Enter a new license key DorwET Buy a license key If you want to buy a license key please visit our online store at Renew Your BitDefender license Key Q bitdefender rnin cance Registration You can see the BitDefender registration status the current license key and how many days are left until the license expires To register BitDefender Internet Security 2009 1 Select I want to register the product with a new key Registration 110 BitDefender Internet Security 2009 2 Type the license key in the edit field Note 69 You can find your license key mon the CD label m on the product registration card m in the online purchase e mail If you do not have a BitDefender licen
42. Select the vault from the table and click Lock vault m Right click the vault in the table and select Lock m Right click the vault file on your computer point to BitDefender File Vault and select Lock Encryption 240 BitDefender Internet Security 2009 m Right click the corresponding virtual disk drive from My Computer point to BitDefender File Vault and select Lock 21 2 4 Changing Vault Password To change the password of a vault use any of these methods m Select the vault from the table and click 5 Change password m Right click the vault in the table and select Change password m Right click the vault file on your computer point to BitDefender File Vault and select Change vault password A new window will appear BitDefender 2009 Change Password Q Change the existing password for file vault C Documents and Settings vdanciu Desktop gigi gigi bvd Old Password New Password Confirm New Password The password must have at least 8 characters Qo Change the password to the following vault 23 NES NNI Change Vault Password Proceed as follows 1 Type the current password of the vault in the Old password field 2 Type the new password of the vault in the New password and Confirm new password fields 2 Note The password must have at least 8 characters For a strong password use a combination of uppercase and lowercase letters numbers and special characters such a
43. Step 1 Add files Step 2 Select vault Step 3 Create Vault Step 4 Enter password Step 5 Summary Add Files To Vault Please select files to add to a vault Add Target Path Step 6 Results Q File Vault Wizard Add files to Vault 2 bitdefender Pent cance Target Click Add Target select the file or folder that you want to add and click OK The path to the selected location will appear in the Path column If you change your mind about the location just click the Remove button next to it Note You can select one or several locations Click Next Step 2 6 Select Vault This is where you can create a new vault or choose an existing vault 76 File Vault BitDefender Internet Security 2009 Bit Defender Internet Security 2009 Max File Vault Step 2 of 6 Step 1 Add files Step 3 Create Vault Step 4 Enter password Step 5 Summary Step 6 Results Select Vault Please create a new vault or choose an existing vault Create New File Vault Browse for a Vault File Select an existing Vault File Vault Name File Path pened Drive gigi E Documents and Settings test Desktop gigi bvd No O dada E Documents and Settingsltest Desktopldada bvd No Q File Vault Wizard Add files to Vault a Cbitdefender Back Next Cancel Select Vault If you select Browse for a File Vault you must click Browse and select the file vault You will go either to the step 5 if the selected vault is open
44. The monitored component is the following Parental 69 BitDefender Internet Security 2009 Parental control This is where you can check the status of Parental Control that enable you to restrict your children s access to internet and to specific applications Click the box labeled to open a category or click the one labeled to close it 8 1 1 Parental control 8 2 Parental Control monitors the status of the modules that enable you to restrict your children s access to the internet and to specific applications The issues concerning parental control module are described in very explicit sentences In line with each sentence if there is something that might affect your children you will see a red status button called Fix Otherwise a green OK status button is displayed Issue Description Parental control is The Parental Control can block access to inappropriate web not configured pages to the internet for certain periods of time and filter mail IM and web traffic for specific words etc When the status buttons are green your children can search the web safely To turn the buttons green follow these steps 1 Click the Fix buttons to fix security vulnerabilities one by one 2 If one issue is not fixed on the spot follow the wizard to fix it If you want to exclude an issue from monitoring just clear the Yes monitor this component checkbox Tasks This is where you can find links to the most important se
45. Vault ene ocuntane negeoremeans PEU ee NC MOERORE bp 237 21 2 1 Creating a Vault oo ieiocto pente DX RETO USQUE D DPI Et 238 21 2 2 Opening a Vault oreille herr RROE Ie EP XS dp Remedies 239 21 2 3 Locking a Vault iussi ER nie Gok ak Fee Ged IG PERDRE NND Ron 240 21 2 4 Changing Vault Password ssssssesssssslse eese 241 21 2 5 Adding Files to a Vault 0 0 2 0 cee cece eee 242 21 2 6 Removing Files from a Vault 000000 c cee eee eee 242 22 Vulnerability ner rr rri ceie dlgs cto RET EUER TES 243 22 1 Statis Sagi ioco anat RS e Y Wed kis Merk SOLETA paeta Mews Redde 243 22 1 1 Fixing V lnerabilitigs 1 rcp ERE ete cuu 244 22 2 SellindS c cose de eed Ee dad eb dx e 250 23 Game Laptop Mode Leeseeeeeeeeese 252 23 1 Game ModE iere Pee Om UE RI Re ets ok C RR RUE RR d 252 23 1 1 Configuring Automatic Game Mode Luuuesslllsssssssee 253 29 12 Man ging the Game List csu osa ee er natn cae era bp ne neue 254 23 1 3 Configuring Game Mode Settings 00 eee eee 255 23 1 4 Changing Game Mode Hotkey uusselluusssssllsesses 256 23 2 Laptop ModE s mr PIER ina p aen he dene daw tatiana un tua PUER Rs 257 23 2 1 Configuring Laptop Mode Settings siuseesiliesessssue 258 24 NetWOrk acess th RRRBRRRERERRERERRRAKNRRRRERRRRRE 259 24 1 Joining the BitDefender Network 0 00 cece eee 260 vi
46. Vulnerability Scan EZEZ Step 3 Passwords Step 4 Applications Step 5 Windows Step 6 Finish Applications Updates Application Name Installed Version Latest Version Download Yahoo Messenger 8 1 0 421 8 1 0 241 Up To Date Winamp 5 5 3 1938 5 5 3 1924 Up To Date Firefox 2 0 0 15 en US 3 0 en US Home Page Q This is a list of the applications supported by BitDefender and of the updates available if any 2 bitdefender c3 Applications You can see the list of applications checked by BitDefender and if they are up to date If an application is notup to date click the provided link to download the latest version Security 66 BitDefender Internet Security 2009 Click Next Step 5 6 Update Windows Bit Defender Internet Security 2009 m AJ Vulnerability Scan Step 1 Select tasks Step 2 Scanning Step 3 Passwords Step 4 Applications Step 5 Windows Step 6 Finish Windows Updates Critical Windows Updates Security Update for Microsoft XML Core Services 4 0 Service Pack 2 KB936181 Other Windows Updates No updates available in this category Install All System Updates Q This is a list of critical or non critical windows applications updates a bitdefender fent cance Windows Updates You can see the list of critical and non critical Windows updates that are not currently installed on your computer Click Install All System Updates to install all the available updates Click Next
47. Whole Words sex Yes Yes Yes Yes je Keyword Filtering Select the Enable Keyword filtering check box if you want to use this control feature You must add rules to specify the keywords to be blocked To add a rule click the Add button and configure the rule parameters in the configuration window To delete a rule select it and click the Delete button To edit an existing rule double click the rule or click the Edit button and make the desired changes in the configuration window Click Apply to save the changes 18 4 1 Configuration Window When you add or edit rules the configuration window will appear Parental Control 193 BitDefender Internet Security 2009 BitDefender 2009 Add new keyword sex Select an option atte pops instant Messaging Z Match whole words o Please add the word you want to block from being displayed entire e mail a messages and web pages will be blocked Q Enter Keyword You must set the following parameters m Keyword type in the edit field the word or phrase you want to block m Protocol choose the protocol BitDefender should scan for the specified word Option Description POP3 E mail messages that contain the keyword are blocked HTTP Web pages that contain the keyword are blocked Instant Messaging Instant messages that contain the keyword are blocked Click Finish to add the rule 18 5 Instant Messaging IM Control The In
48. Windows Click the box with to open an option or the box with to close an option The scan options are grouped into 3 categories m Scan Level Specify the type of malware you want BitDefender to scan for by selecting the appropriate options from the Scan Level category Option Description Scan for viruses Scans for known viruses BitDefender detects incomplete virus bodies too thus removing any possible threat that could affect your system s security Scan for adware Scans for adware threats Detected files will be treated as infected The software that includes adware components might stop working if this option is enabled Antivirus 138 BitDefender Internet Security 2009 Option Description Scan for spyware Scans for known spyware threats Detected files will be treated as infected Scan for application Scan for legitimate applications that can be used as a spying tool to hide malicious applications or for other malicious intent Scan for dialers Scans for applications dialing high cost numbers Detected files will be treated as infected The software that includes dialer components might stop working if this option is enabled Scan for rootkits Scans for hidden objects files and processes generally known as rootkits m Virus scanning options Specify the type of objects to be scanned file types archives and so on by selecting the appropriate options from the Virus scanning opti
49. You can safely shut down your computer by selecting Exit from the BitDefender Rescue CD contextual menu right click to open UTEM inal it or by issuing the halt command in a terminal MICI TE REIS BATTRE Security Net Admin Choose EXIT When BitDefender Rescue CD has successfully closed all programs it will show a screen like the following image You may remove the CD in order to boot from your hard drive Now it s ok to turn off your computer or to reboot it BitDefender Rescue CD Howto 290 BitDefender Internet Security 2009 INIT Sending processes the KILL signal init Caufsd Caufsd aufsd Caufsd init Caufsd Caufsd Caufsd Caufsd kblockd kacpid knoppix halt Cevents per kthread ata q khpsbpkt pdflush pdflush kswapd ai rootfs umounted Wait for this message when shutting down 29 3 How do perform an antivirus scan A wizard will appear when the boot process has finished and allow you to full scan your computer All you have to do is click the Start button Note e If your screen resolution isn t high enough you will be asked to start scanning in text mode Follow the three step guided procedure to complete the scanning process 1 You can see the scan status and statistics scanning speed elapsed time number of scanned infected suspicious hidden objects and other Note The scanning process may take a while depending on the complexity of th
50. against phishing attempts when you antiphishing are surfing the Internet protection is enabled Internet Explorer BitDefender protects you against phishing attempts when you antiphishing are surfing the Internet protection is enabled Security 58 BitDefender Internet Security 2009 When the status buttons are green the security risk of your system is at a minimum To turn the buttons green follow these steps 1 Click the Fix buttons to fix security vulnerabilities one by one 2 If one issue is not fixed on the spot follow the wizard to fix it If you want to exclude an issue from monitoring just clear the Yes monitor this component checkbox 7 1 3 Vulnerability scan The issues concerning vulnerabilities are described in very explicit sentences In line with each sentence if there is something that might affect your computer s security you will see a red status button called Fix Otherwise a green OK status button is displayed Issue Description Vulnerability check Monitors Microsoft Windows Updates Microsoft Windows Office is enabled Updates and Microsoft Windows accounts passwords to ensure that your OS is up to date and is not vulnerable to password bypass Critical Microsoft Install available critical Microsoft updates updates Other Microsoft Install available non critical Microsoft updates updates Windows Install new Windows security updates as soon as they become Automatic Updates available is
51. click My Computer on the desktop and then select Properties from the menu 1 1 Hardware Requirements For Windows XP m 800 MHz or higher processor m 256 MB of RAM Memory 1GB recommended m 170 MB available hard disk space 200 MB recommended For Windows Vista m 800 MHz or higher processor m 512 MB of RAM Memory 1 GB recommended m 170 MB available hard disk space 200 MB recommended For Windows Home Server m 800 MHz or higher processor m 512 MB of RAM Memory 1 GB recommended m 170 MB available hard disk space 200 MB recommended System Requirements 2 BitDefender Internet Security 2009 1 2 Software Requirements m Internet Explorer 6 0 or higher m NET Framework 1 1 also available in the installer kit Antispam protection is provided for all POP3 SMTP e mail clients The BitDefender Antispam toolbar however is integrated only into m Microsoft Outlook 2000 2002 2003 2007 m Microsoft Outlook Express m Microsoft Windows Mail m Thunderbird 1 5 and 2 0 Antiphishing protection is provided only for m Internet Explorer 6 0 or higher m Mozilla Firefox 2 0 m Yahoo Messenger 8 1 m Windows Live MSN Messenger 8 5 Instant Messaging IM encryption is provided only for m Yahoo Messenger 8 1 m Windows Live MSN Messenger 8 5 System Requirements 3 BitDefender Internet Security 2009 2 Installing BitDefender Locate the setup file and double click it This will launch a wizard
52. computer with a license key Set the settings password Vulnerability No PC clic Run a Scan task click to add Encryption Fix issues on this computer E TA Show history of this computer Game Laptop Mode No PC clic Run an Update on this computer now click to add Network Apply Profile Update Run a Tuneup task on this computer Set this computer as Update Server of this Network Registration Add Computer Leave Network Q This item represents a computer in your home network To add a PC you have to join or create a network by clicking on Join Create Network a Sbitdefender Buy My Account Register Help Support Histor Network Map If you move the mouse cursor over a computer from the network map you can see brief information about it name IP address number of issues affecting the system security BitDefender registration status If you right click a computer name in the network map you can see all the administrative tasks you can run on the remote computer m Register this computer m Set the settings password m Run a scan task m Fix issues on this computer m Show history of this computer m Run an update on this computer now m Apply profile Network 263 BitDefender Internet Security 2009 Runa Tuneup task on this computer m Set this computer as Update Server of this Network Before running a task on a specific computer you will be prompted to provide the local home management
53. do not hesitate to contact us 27 3 1 Web Addresses Sales department sales bitdefender com Technical support support bitdefender com Documentation documentation bitdefender com Partner Program partners bitdefender com Marketing marketing bitdefender com Media Relations pr bitdefender com Job Opportunities jobs bitdefender com Virus Submissions virus_submission bitdefender com Spam Submissions spam_submission bitdefender com Report Abuse abuse bitdefender com Product web site http www bitdefender com Product ftp archives ftp ftp bitdefender com pub Local distributors http www bitdefender com partner list BitDefender Knowledge Base http kb bitdefender com 27 3 2 Branch Offices The BitDefender offices are ready to respond to any inquiries regarding their areas of operation both in commercial and in general matters Their respective addresses and contacts are listed below U S A BitDefender LLC 6301 NW 5th Way Suite 3500 Fort Lauderdale Florida 33309 Phone 1 954 776 6262 Web http www bitdefender com Technical Support Registered Users Only m E mail support bitdefender com m Phone Toll Free Support 281 BitDefender Internet Security 2009 United States 1 888 868 1873 Canada 1 866 947 1873 Customer Service Registered Users Only m E mail customerservice bitdefender com m Phone Toll Free United States 1 888 868 1873 Canada 1 866 947 1873 Germany
54. extension that you want to be excluded from scanning in the edit field and click Add The extensions will appear in the table as you add them You can add as many extensions as you want To remove an entry from the table select it and click the Delete button Antivirus 163 BitDefender Internet Security 2009 Click Next Step 3 4 Select Scanning Type Bit Defender Internet Security 2009 Exclusions Wizard Step 3 of 4 Step 4 When to apply Please choose the type of scan that will apply to the selected exceptions on demand on access or both Click the text in each cell in the right column of the table below and select the option that best suits your needs Selected objects When to apply avi Audio Video Interleaved animation file Both Please choose the exceptions for the scanning process carefully and remember that it is recommended not to define any exception in order to be sure that your system is fully protected bitdefender nak O nee S conce Scanning Type You can see a table containing the extensions to be excluded from scanning and the type of scanning they are excluded from By default the selected extensions are excluded from both on access and on demand scanning To change when to apply the exception click on the right column and select the desired option from the list Click Next Antivirus 164 BitDefender Internet Security 2009 Step 4 4 Select Scanning
55. file a new logical partition a new drive will appear 3 Type a password for the file vault into the corresponding field Note The password must have at least 8 characters File Vault 78 BitDefender Internet Security 2009 4 Re type the password 5 Set the size of the file vault in MB by typing a number into the corresponding field Note The size must contain digits only Click Next You will go to the step 5 Step 4 6 Password This is where you will be asked to enter the password for the selected vault Bit Defender Internet Security 2009 zx File Vault Step 4 of 6 Ask Vault Password Please enter the password for selected vault Password The password must have at least 8 characters Q File Vault Wizard Add files to Vault 2 bitdefender Back nent cancel Enter password Type the password into the corresponding field and click Next File Vault 79 BitDefender Internet Security 2009 Step 5 6 Summary This is where you can review chosen operations Bit Defender Internet Security 2009 File Vault Step 5 of 6 Step 1 Add files Step 2 Select vault Step 3 Create Vault Step 4 Enter password Step 5 Summary Step 6 Results Finish Operation Add 1 Files Folder to existing Vault locked Name dada Path E Documents and Settings test Desktop dada bvd Status Locked Please review chosen operations and click Next if you wish to continue You can click Back
56. it s a very good idea to scan your computer for resident viruses after you ve installed BitDefender And it s definitely a good idea to frequently scan your computer for viruses To configure and initiate on demand scanning go to Antivirus gt Scan in the Advanced View Antivirus 131 BitDefender Internet Security 2009 BitDefender Internet Security 2009 Trial SWITCH TO BASIC VIEW STATUS There is 1 pending issue FIX ALL ISSUES Shield Virus Scan Exclusions Quarantine General System tasks Antivirus gj Deep System Scan Antispam C Last Run Never Parental Control gi Full System Scan GO Last Run Never Privacy Control AS 2 Quick System Scan Firewall Last Run Never Vulnerability Autologon Scan zo Last Run 5 9 2008 7 16 42 PM Encryption User tasks GamejLaptop Mode TIT cia Quy My Documents Network Last Run Never Update Misc tasks Registration Contextual Scan Device detection So Q This is where you can perform predefined antivirus antispyware and antirootkit scanning tasks or to define new customized scan tasks a Sbitdefender Buy My Account Register Help Support Histor Scan Tasks On demand scanning is based on scan tasks Scan tasks specify the scanning options and the objects to be scanned You can scan the computer whenever you want by running the default tasks or your own scan tasks user defined tasks You can also schedule them to run on a regular bas
57. located in the upper area of the Identity Control tab Q Welcome Window Click Next Privacy Control 202 BitDefender Internet Security 2009 Step 2 4 Set Rule Type and Data BitDefender Wizard Rule Name dfdfd Rule Type address iv Rule Data maki Personal information is encrypted and it cannot be used by anyone else but you For extra safety please enter just part of the information that you would like to protect e g if you want to filter traffic For this e mail address john doe example com you should only include john in the target string Q Set Rule Type and Data You must set the following parameters m Rule Name type the name of the rule in this edit field m Rule Type choose the rule type address name credit card PIN SSN etc m Rule Data type the data you want to protect in this edit field For example if you want to protect your credit card number type all or part of it here Note C3 If you enter less than three characters you will be prompted to validate the data We recommend you to enter at least three characters in order to avoid the mistaken blocking of messages and web pages All of the data you enter is encrypted For extra safety do not enter all of the data you wish to protect Click Next Privacy Control 203 BitDefender Internet Security 2009 Step 3 4 Select Traffic BitDefender Wizard v Scan Http v Scan Smtp v
58. malware threats or to skip archives This may greatly reduce scanning times and improve your computer s responsiveness during a scan You can customize the Real time protection by clicking Custom level The following window will appear Antivirus 123 BitDefender Internet Security 2009 BitDefender Real Time Protection Settings x B amp v Scan accessed files Scan boot Scan inside archives iv Scan packed files Action to take when an infected file is found El First action lt Disinfect file gt El Second action Move file to quarantine gt D D Actions to take when an suspect file is found El First action Deny access and continue El Second action Deny access and continue Do not scan files greater than 0 Kb J Do not scan archives greater than 20000 Kb Do not scan network shares Ei Scan e mail traffic iv Scan incoming mail v Scan outgoing mail Scan http traffic iv Show warning when virus found B Scan files sent received over IM v Scan Yahoo Messenger traffic v Scan Windows Live Messenger traffic This is where you can define your own level of protection for the Real time module You will be able to manually choose the types of items on your ed and the e taken in case a virus is as EET Shield Settings The scan options are organized as an expandable menu very similar to t
59. more accurate Note The recommended size is 200 000 words Antispam 180 BitDefender Internet Security 2009 Train the Learning Engine bayesian on outgoing e mails trains the Learning Engine bayesian on outgoing e mails m URL filter activates deactivates the URL filter m NeuNet Heuristic filter activates deactivates the NeuNet Heuristic filter Block explicit content activates deactivates the detection of messages with SEXUALLY EXPLICIT in the subject line m Image filter activates deactivates the Image filter Antispam 181 BitDefender Internet Security 2009 18 Parental Control BitDefender Parental Control enables you to control the access to the Internet and to specific applications for each user holding a user account on the system You can configure Parental Control to block m inappropriate web pages m Internet access for specific periods of time such as when it s time for lessons m web pages e mail messages and instant messages if they contain specific keywords m applications like games chat filesharing programs or others m instant messages sent by IM contacts other than those allowed e Important Only users with administrative rights on the system system administrators can access and configure Parental Control To make sure that only you can change the Parental Control settings for any user you can protect them with a password You will be prompted to configu
60. must set the following parameters m Rule Name type the name of the rule in this edit field m Rule Type choose the rule type address name credit card PIN SSN etc m Rule Data type the data you want to protect in this edit field For example if you want to protect your credit card number type all or part of it here Note e If you enter less than three characters you will be prompted to validate the data We recommend you to enter at least three characters in order to avoid the mistaken blocking of messages and web pages You can choose to apply the rule only if the rule data matches whole words or if the rule data and the detected string case match In order to easily identify the information the rule blocks provide a detailed rule description in the edit box To specify the type of traffic to scan configure these options Installing BitDefender 15 BitDefender Internet Security 2009 m Scan HTTP scans the HTTP web traffic and blocks the outgoing data that matches the rule data m Scan SMTP scans the SMTP mail traffic and blocks the outgoing e mail messages that contain the rule data m Scan Instant Messaging scans the Instant Messaging traffic and blocks the outgoing chat messages that contain the rule data Click OK to add the rule Defining Identity Control Exceptions Installing BitDefender There are cases when you need to define exceptions to specific identity rules Let s consider
61. name and preferences so that you don t have to enter them on every visit But cookies can also be used to compromise your privacy by tracking your surfing patterns Privacy Control 209 BitDefender Internet Security 2009 This is where Cookie Control helps When enabled Cookie Control will ask for your permission whenever a new website tries to set a cookie BitDefender Cookie Alert x You can see the name of the application that is trying to PauU send the cookie file interne plorer Path elprogan fiesiintermet explorert Check Remember this answer option and click Yes or Midi No and a rule will be created applied and listed in the Bela piri iilii to a rules table You will no longer be notified the next time want to allow this program to send the cookie when you connect to the same site _ Remember this answer o LEN NLONUNS Cookie Alert This will help you to choose which websites you trust and which you don t Note Because of the great number of cookies used on the Internet today Cookie Control can be quite bothersome to begin with At first it will ask a lot of questions about sites trying to place cookies on your computer As soon as you add your regular sites to the rule list surfing will become as easy as before To configure Cookie Control go to Privacy Control gt Cookie in the Advanced View Privacy Control 210 BitDefender Internet Security 2009 BitDefender Internet Security 20
62. open the window where you can configure the Parental Control for the respective user account The following sections in this chapter present in detail the Parental Control features and how to configure them 18 1 Settings Status per User To configure the Parental Control for a specific user double click the respective user and click the Status tab Parental Control 183 BitDefender Internet Security 2009 BitDefender 2009 Parental Control di Status Web Applications Keywords IM Traffic Time limiter Settings for user vdanciu ivi Parental control is enabled v Web control is enabled C M Control is disabled v Application control is enabled v Web time limiter is enabled _ Web access is unblocked C Keywords filtering disabled L Heuristic web filter is disabled Heuristic Web Filter Tolerance Q Parental Control Status To configure the Parental Control for this user account follow these steps T Enable the Parental Control for this user account by selecting the check box next to Parental Control Important O Keep the Parental Control enabled in order to protect your children against i inappropriate content by using your customized computer access rules 2 Set a password to protect your Parental Control settings For more information please refer to Protecting Parental Control Settings p 185 3 Select the check boxes corresponding to the protection controls you want to use Par
63. privacy and many people feel offended by the notion that they are viewed as a SKU number you know the bar code on the back of packages that gets scanned at the grocery check out line While this viewpoint may be extreme in some cases it is accurate Disk drive It s a machine that reads data from and writes data onto a disk A hard disk drive reads and writes hard disks A floppy drive accesses floppy disks Disk drives can be either internal housed within a computer or external housed in a separate box that connects to the computer Download Glossary To copy data usually an entire file from a main source to a peripheral device The term is often used to describe the process of copying a file from an online service to one s own computer Downloading can also refer to copying a file from a network file server to a computer on the network 298 BitDefender Internet Security 2009 E mail Electronic mail A service that sends messages on computers via local or global networks Events An action or occurrence detected by a program Events can be user actions such as clicking a mouse button or pressing a key or system occurrences such as running out of memory False positive Occurs when a scanner identifies a file as infected when in fact it is not Filename extension The portion of a filename following the final point which indicates the kind of data stored in the file Many operating systems use filename e
64. process carefully and remember that it is recommended not to define any exception in order to be sure that your system is fully protected bitdefender C sak NCTCUN Scan Excluded Files It is highly recommended to scan the files in the specified paths to make sure that they are not infected Select the check box to scan these files before excluding them from scanning Click Finish Click Apply to save the changes 16 3 2 Excluding Extensions from Scanning To exclude extensions from scanning click the Add button You will be guided through the process of excluding extensions from scanning by the configuration wizard that will appear Antivirus 161 BitDefender Internet Security 2009 Step 1 4 Select Object Type Bit Defender Internet Security 2009 AE Exclusions Wizard Step 1 of 4 i Step2 Step 3 Step Please choose what type of rule you want to create You can choose to exclude paths or extensions The BitDefender Exclusions Wizard will quide you through the necessary steps to create rules that will enable the antivirus module to except specific files or folders from scanning It is not recommended to exclude files or folders from scanning unless you are an administrator and you have previously scanned the excluded items BitDefender will ask you if you want to perform an on demand scan of the excluded items to ensure that your computer is virus free Do not scan file or Folder paths 8 Do not scan extensi
65. produce false negatives spam classified as legitimate mail Offers protection for accounts that receive some legitimate commercial mail The filter will let most e mail pass through but it may produce false negatives spam classified as legitimate mail Offers protection for regular accounts The filter will block most spam while avoiding false positives Offers protection for accounts that receive high volumes of spam regularly The filter will let very little spam through but it may produce false positives legitimate mail incorrectly tagged as spam Configure the Friends Spammers Lists and train the Learning Engine Bayesian in order to reduce the number of false positives Offers protection for accounts that receive very high volumes of spam regularly The filter will let very little spam through but it may produce false positives legitimate mail incorrectly tagged as spam Add your contacts to the Friends List in order to reduce the number of false positives To set the default protection level Moderate to Aggressive click Default Level Antispam 174 BitDefender Internet Security 2009 17 2 2 Configuring the Friends List The Friends list is a list of all the e mail addresses from which you always want to receive messages regardless of their content Messages from your friends are not labeled as spam even if the content resembles spam Note Any mail coming from an address contained in the Friend
66. rrr eror to EEEa E EERS 61 2 3 Searching Tor Vulnerabilities 0 o chem petere bete 62 8 Parental cre clase nayeincn ae a nx g etie E M O D ag 69 5 1 Monitored Components 2 0000 cena sch Sun RE cea GRE goes 69 8 1 1 Parental control ex x eer m tev RS nea te ERR m oe x ee 70 8 2 TASKS os beds eap a bd d de tube RA hee UR d d RA b RE o 70 8 2 1 Scanning with BitDefender sa sssaaa eimai iiaia a i A A 71 8 2 2 Updating BitDefender sais c rex eee eed ORLA 71 9 File Vault tek ter ER HEERT M ERERSU aaron INR wena oar e CR 73 9 1 Monitored Components 2 per tata DeL tpa tuere pee Pr DADO saad 74 9 11 File Vallic ERE PR C REST TR AERRE ERN beatae REN TER RP EE 108 9 2 TASKS obesse pr en Rte d oe Rae PATRE Rae e EA TR o PRU sow aoe 75 9 21 Adding Files to Vault ii cerrara me bl DRprlexagesdg pe eeldspus e 75 9 2 2 Removing Files from Vault 2e mercede Peto p anai 81 9 2 3 Viewing Files from Vault 2 cmcnrerTLIaGeefe d d fjackcemeiveeuoe vd 86 9 24 Locking Vault ou ita potior cet aon decer sese dne or eee a a o 90 10 NetWork eccr reete hex tnr RE RrxRx PEE RE RR cue ERE EK 94 10 1 TASKS sage teed sextae kerpeekRIA eiae x D ACA eder e parla data do P E 94 10 1 1 Joining the BitDefender Network 00 0 0c cece eee eee 95 10 1 2 Adding Computers to the BitDefender Network 45 95 10 1 3 Managing the BitDefender Network sssssleseesssseeessne 97 BitDefender
67. select it and click the Edit button or double click it A new window will appear Identity Edit Rule Rule Name Rule Type Rule data v Scan Http v Scan Smtp ivi Scan IM Rule description dfdfd address v Match whole words Match case jhkhibkb Q Edit Rule 19 3 Registry Control es ao Here you can change the name description and parameters of the rule type data and traffic Click OK to save the changes A very important part of the Windows operating system is called the Registry This is where Windows keeps its settings installed programs user information and so on The Registry is also used to define which programs should be launched automatically when Windows is started Viruses often use this in order to be automatically launched when the user restarts his computer Registry Control keeps an eye on the Windows Registry this is again useful for detecting Trojan horses It will alert you whenever a program will try to modify a registry entry in order to be executed at Windows start up Privacy Control 207 BitDefender Internet Security 2009 You can see the program that is trying to modify Windows BitDefender Registry Alert x Registry T If you do not recognize the program and if it seems suspicious click Block to prevent it from modifying Registry key C Program Files Windows Registry Otherwise click Allow to permit the
68. send the stolen data by e mail web or instant messages if you have created appropriate identity protection rules m Identity Control can protect you from phishing attempts attempts to steal personal information The most common phishing attempts make use of a deceiving e mail to trick you into submitting personal information on a fake web page For example you may receive an e mail claiming to be from your bank and requesting you to urgently update your bank account information The e mail provides you with a link to the web page where you must provide your personal information Although they seem to be legitimate the e mail and the web page the misleading link directs you to are fake If you click the link in the e mail and submit your personal Privacy Control 200 BitDefender Internet Security 2009 information on the fake web page you will disclose this information to the malicious persons who organized the phishing attempt If appropriate identity protection rules are in place you cannot submit personal information such as your credit card number on a web page unless you have explicitly defined an exception for the respective web page To configure Identity Control go to Privacy Control ldentity in the Advanced View BitDefender Internet Security 2009 Trial SWITCH TO BASIC VIEW X STATUS There is 1 pending issue General Antivirus Antispam Parental Control Privacy Control Firewall Vuln
69. strongly recommended that you exit Game Mode when you finished playing you can use the same default Ctrl Alt Shift G hotkey Note While in Game Mode you can see the letter G over the BitDefender icon Game Laptop Mode 252 BitDefender Internet Security 2009 To configure Game Mode go to Game Laptop Mode gt Game Mode in the Advanced View BitDefender Internet Security 2009 Trial ce STATUS There is 1 pending issue Game Mode apto General Antivirus Current status Game Mode is disabled Enter Game Mode Antispam v Automatic Game Mode is enabled v Use the default list of games provided by BitDefender Firewall ivl W Enter game mode when in full screen vulnerability v Ask if the application should be added to the whitelist Encryption GamefLaptop Mode Network Settings Update Advanced Settings late EE v Scan Task Registration 8 Skip Task O Postpone Task Product Tweaks Game Mode and Laptop Mode temporarily modify the protection settings so as to minimize their impact on your system during games or when your laptop is on battery power bitdefender Buy My Account Register Help Support Histor Game Mode At the top of the section you can see the status of the Game Mode You can click Enter Game Mode or Exit Game Mode to change the current status 23 1 1 Configuring Automatic Game Mode Automatic Game Mode allows BitDefender to automatically enter
70. te DY System 4 5 6 KB 0 0 B s 2 3 MB 0 0 B s 1h5m48s lsass exe 892 0 0 B 0 0 Bjs 2 9 KB 0 0 B s th 5m 45s Privacy Control dE svchost exe kdcomla 1048 0 0 B 0 0 Bjs 0 0 B 0 0 B s 1h 5m 44s Firewall S svchost exe k rpcss 1108 0 08 0 0 Bis 0 0 B 0 0 B s 1h 5m 44s 6 E vsserv exe service 1160 1 1 KB 0 0 Bjs 1 2 KB 0 0 B s 1h 5m32s Vulnerability i svchost exe k netsves 1248 138 3 KB 0 0 B s 14 5 KB 0 0 B s 1hSm4ls Encryption 6 svchost exe klocalse 1488 0 0 B 0 0 B s 15 0 KB 0 0 B s thSm40s Game Laptop Mode Network Update Registration Exim increased Log verbosity Q amp bitdefender Buy My Account Register Help Support History Connection Control You can see the total traffic sorted by application For each application you can see the connections and the open ports as well as statistics regarding the outgoing amp incoming traffic speed and the total amount of data sent received If you want to see the inactive processes too clear the Hide inactive processes check box The meaning of the icons is as follows m amp Indicates an open connection on your computer m amp Indicates an open port on your computer 233 Firewall BitDefender Internet Security 2009 The window presents the current network Internet activity in real time As connections or ports are closed you can see that the corresponding statistics are dimmed and that eventually t
71. testo eros e reum eis 280 21 2 2 Open a support ticket iens ss per hEE itai tataii e IM RES 280 21 3 Contact Information a aoeccea orga eR ABO DLE RIDERA RE DOR EER DAE PIS 281 27 3 Web AddIeSS6S oboe cad hated atin OO ENDO DEG OI Nan E 281 27 3 2 Branch OMCES sonnera r tereti hestrbp mee Phe np Rb pad iens 281 BitDefender Rescue CD uesseesre 284 28 OvetvieW esiste tme nah REIR Era ERERIURERRRRERERSRERRKRR 285 28 1 System Requirements suussssellesssseell esse 285 28 2 Incl ded SOMWANE i ord ye epe eon ROKR SE a Roo Meet HI oed do 286 29 BitDefender Rescue CD Howto 289 29 1 Start BitDefender Rescue CD sse che Sone E x Pee ER PRAE RP PLE 289 29 2 Stop BitDefender Rescue CD 0 000 cece cette eee 290 29 3 How do perform an antivirus scan llluslslelleseeeeeslesss 291 29 4 How do configure the Internet connection iliiuiseselluuuse 292 29 5 How do l update BitDefender 1 2s pr hee Ree Eee Ihe 293 29 5 1 How do update BitDefender over a proxy siuusseuluuue 294 29 6 How do l save my data 2 2 05 paneda tiari RE Leere P EMESX Daes oy 294 Glos Sal orriei r UMP EFFI ULAMEME ERE E CERE UEM 297 BitDefender Internet Security 2009 End User Software License Agreement IF YOU DO NOT AGREE TO THESE TERMS AND CONDITIONS DO NOT INSTALL THE SOFTWARE BY SELECTING I ACCEPT OK CONTI
72. the first actions towards making your computer virus free If this is the first time you install BitDefender it is recommended to proceed with this wizard You can also choose to skip any of its steps by clicking Next You can skip the wizard altogether and start using BitDefender without any customized configuration However once you start using the product you will be notified to configure its components e X You can choose to skip this wizard s steps and start using BitDefender not configured However the product will a notify you that you need to configure its components Q bitdefender a ee oo Welcome Window Click Next to continue 11 BitDefender Internet Security 2009 2 2 2 Step 2 9 Select View Mode Bit Defender Internet Security 2009 mE BitDefender Configuration Wizard Step 2 of 9 Step3 Step4 Step 5 Step 6 Step 7 Step 8 step 9 User Interface View Mode You can chose to view BitDefender under Basic or Advanced made depending on your user experience with our product Basic View O Advanced View Simple Interface that will give you access to all modules at Advanced interface that gives you access to each specific basic level You can easily fix all issues that affect the security component of BitDefender product You ll be able to configure of your system advanced settings as well as keep track of advanced Features i You ll be able to switch between these views at any moment when using BitDefe
73. to Parental Control only On the other hand if a password was set only for Parental Control and you uncheck this option the respective password will be requested when configuring any BitDefender option Important If you forgot the password you will have to repair the product in order to modify the BitDefender configuration m Ask me if want to configure a password when I enable Parental Control prompts you to configure a password when you want to enable Parental Control and no password is set By setting a password you will prevent other users with administrative rights from changing the Parental Control settings that you configured for a specific user General 118 BitDefender Internet Security 2009 m Show BitDefender News security related notifications shows from time to time security notifications regarding virus outbreaks sent by the BitDefender server m Show pop ups on screen notes shows pop up windows regarding the product status You can configure BitDefender to display pop ups only when using the Basic View or the Advanced View m Load BitDefender at Windows startup automatically launches BitDefender at System startup We recommend you to keep this option selected m Enable the Scan Activity bar on screen graph of product activity displays the Scan Activity bar whenever you log on to Windows Clear this check box if you do not want the Scan Activity bar to be displayed anymore Note This option
74. to scan all drives no matter if they are local in the network or removable Note 69 If you want to scan your entire computer select the checkbox corresponding to All Entries Click OK to save the changes and close the window To run the task just click Scan Viewing the Scan Target of System Tasks You can not modify the scan target of the scan tasks from the System Tasks category You can only see their scan target To view the scan target of a specific system scan task right click the task and select Show Task Paths For Full System Scan for example the following window will appear BitDefender Full System Scan x Overview Paths Scheduler Logs Paths to be scanned by this task Local Disk C S Local Disk D s Local Disk E Q ELEM as os Scan Target of Full System Scan Antivirus 145 BitDefender Internet Security 2009 Full System Scan and Deep System Scan will scan all local drives while Quick System Scan will only scan the Windows and Program Files folders Click OK to close the window To run the task just click Scan Scheduling Scan Tasks With complex tasks the scanning process will take some time and it will work best if you close all other programs That is why it is best for you to schedule such tasks when you are not using your computer and it has gone into the idle mode To see the schedule of a specific task or to modify it right click the task and select Schedule T
75. used for phishing BitDefender maintains a database of such links The URL filter checks every URL link in a message against its database If a match is made the message is tagged as SPAM NeuNet Heuristic Filter The NeuNet Heuristic filter performs a set of tests on all the message components i e not only the header but also the message body in either HTML or text format looking for words phrases links or other characteristics of SPAM Based on the results of the analysis it adds a SPAM score to the message The filter also detects messages marked as SEXUALLY EXPLICIT in the subject line and tags them as SPAM Note Starting May 19 2004 spam that contains sexually oriented material must include the warning SEXUALLY EXPLICIT in the subject line or face fines for violations of federal law Bayesian Filter The Bayesian filter module classifies messages according to statistical information regarding the rate at which specific words appear in messages classified SPAM as compared to those declared NON SPAM by you or by the heuristic filter Antispam 170 BitDefender Internet Security 2009 This means for example if a certain four letter word is seen to appear more often in SPAM it is natural to assume there is an increased probability that the next incoming message that includes it actually IS SPAM All relevant words within a message are taken into account By synthesizing the statistical info
76. your company uses a proxy server to connect to the Internet you must specify the proxy settings in order for BitDefender to update itself Otherwise it will use the proxy settings of the administrator that installed the product or of the current user s default browser if any Note The proxy settings can be configured only by users with administrative rights on the computer or by power users users who know the password to the product settings 270 BitDefender Internet Security 2009 To manage the proxy settings click Manage proxies The Proxy Manager window will appear Proxy Settings Administrator proxy settings detected at install time Current user proxy settings from default browser Specify your own proxy settings Address Port Username Password Q a oc Proxy Manager There are three sets of proxy settings m Administrator proxy settings detected at install time proxy settings detected on the administrator s account during installation and which can be configured only if you are logged on to that account If the proxy server requires a username and a password you must specify them in the corresponding fields m Current user proxy settings from default browser proxy settings of the current user extracted from the default browser If the proxy server requires a username and a password you mu
77. your e mail or your credit card number when they fall into the wrong hands such information may cause you damage you may find yourself drowning in spam messages or you might be surprised to access an emptied account Identity Control protects you against the theft of sensitive data when you are online Based on the rules you create Identity Control scans the web e mail and instant messaging traffic leaving your computer for specific character strings for example your credit card number If there is a match the respective web page e mail or instant message is blocked You can create rules to protect any piece of information you might consider personal or confidential from your phone number or e mail address to your bank account information Multiuser support is provided so that users logging on to different Windows user accounts can configure and use their own identity protection rules The rules you create are applied and can be accessed only when you are logged on to your Windows user account Why you use Identity Control m Identity Control is very effective in blocking keylogger spyware This type of malicious applications records your keystrokes and sends them over the Internet to a malicious person hacker The hacker can find out sensitive information from the stolen data such as bank account numbers and passwords and use it to gain personal benefits Supposing such an application manages to avoid antivirus detection it cannot
78. 009 5 5 BitDefender Manual Scan cech cadran nee Cen nk Seabed Rae o Pes 33 5 6 Game Mode siri reden RR eb ERE REA UR be a e d e 34 5 6 1 Using Game Molen 532 occa fee ee tacos YRI etie dee Eas 34 5 6 2 Changing Game Mode Hotkey 000 cee cece ee ee eens 35 5 7 Integratiori into Mail Clients 5r eR Ree Red E AED 35 5 7 1 Antispam Toolbar zu ahs che cease tenta aret eun Doe Eod det d 35 5 7 2 Antispam Configuration Wizard i esscr seenen tanwande eee eee ese 43 5 8 Integration into Web Browsers 00cce eee cnet en 48 5 9 Integration into Messenger decet y ehh eehREE RR e EROR ORA 50 6 Dashboard er tezn ree n RR ER RI RGHRDU E UNTER DR NUR UP Oa 52 6 1 OVerVIBW dise ku eh re or we be Kent RR E RU UR M RE KORR RU ENS 116 6 2 TASKS 2 Cmm 53 6 2 1 Scanning with BitDefender ssri renren sania aaie cece eee eee 54 6 2 2 Updating BitDefender sssini Leo teat pas ir meer mener Ea S 54 T Security eeiiiu uni uuu a na ag GRRRRR RRRZ4 ERRARE RERRRRREREA 56 Tale Monitored Components o poc ree IM PLFRERE S ERE a adele 56 A 12 Local security uso obere Rp S eERPPOnEEREDPNERDS ORE ERR 106 41 2 Online security zr Leiesrermb erm DUE aes eee eae Sube du 107 7 1 9 Vulnerability Scan mete mp RE REESE ERR Rep 109 1525 TASKS pe ea taese din dotate duo ta tp GRAM edad E dag DR NE O ed cR 60 7 2 1 Scanning with BitDefender 0 0c cece eee 60 1 2 2 Updating BitDefender
79. 09 Trial mn LIII KE 1717273 Status Identity Registry Cooke Script General Antivirus Z Enable Cookie Control Em Total cookies blocked a BETES Control Domain Direction Action Privacy Control Firewall Vulnerability Encryption Game Laptop Mode Network Update Registration Q Check this box to enable Cookie Control Cookies can be used to track your web surfing You should only accept cookies from websites you trust a Sbitdefender Buy My Account Register Help Support Histor Cookie Control You can see the rules created so far listed in the table Important The rules are listed in order of their priority starting from the top meaning the first rule has the highest priority Drag amp drop rules in order to change their priority To delete a rule select it and click the Delete button To modify the rule parameters double click the rule and make the desired changes in the configuration window To manually add a rule click the Add button and configure the rule parameters in the configuration window 19 4 1 Configuration Window When you edit or manually add a rule the configuration window will appear Privacy Control 211 BitDefender Internet Security 2009 Select Address Action and Direction Enter domain Any Enter domain Select action Permit Deny Select direction Outgoing Incoming Both Select the websites and domai
80. 6 3 1 Excluding Paths from Scanning rlisus Read cease 157 16 3 2 Excluding Extensions from Scanning o s csset esasa eree aa eee ee 161 16 4 Quarantine Area sisi wanara atean ne ay ha REESE ERR EE EE 165 16 4 1 Managing Quarantined Files 0 0 00 166 16 4 2 Configuring Quarantine Settings 00 esses 167 1f Antispam eet rnnt tkm bom RE RR n E C AE 169 17 Antispam Insights rund Secon EI elu ud ru bes EIS AE RE edu 169 17 31 1 AntispatmEilleis x eost ELE eREDe nV EDERUnQue er prede tnis 169 17 4 2 Antispam Operation 2 2 5 42005055408 beer RE Peri ru Pha Rai 171 11 2 Statu indie teehee ehetatiak an er IP ALCO EC IO rer hua ERE Ed dane 173 17 2 1 Setting the Protection Level 52 22 scie labe rame Macaw rrr 174 17 2 2 Configuring the Friends List 2 olore le exe Rr 175 17 2 3 Configuring the Spammers List sr eririrsoccsrisenirrncririnenipand 176 17 9 Settings ote pee e etel UE Pavae UR EU REED SUR RUR AU nau 178 17 34 Antispam Selttirigs 2i cikbor pee eld eh REIP re bea eae kod 180 17 3 2 Basic Antispam Filters sepi sanaaa ere eia pruna eg bean ae 180 17 3 3 Advanced Antispam Filters 0 000 ccc cece eee eee 180 18 Parental Control 22 00 ccc0cccccsescectesecceeeceeteseceneeeeenss 182 18 1 Settings Status per User 0 00 ccc eee eee 183 18 1 1 Protecting Parental Control Settings 0002 eee eee 185 18 1 2 Configuring Heuristic Web Filter
81. 9 Macro virus A type of computer virus that is encoded as a macro embedded in a document Many applications such as Microsoft Word and Excel support powerful macro languages These applications allow you to embed a macro in a document and have the macro execute each time the document is opened Mail client An e mail client is an application that enables you to send and receive e mail Memory Internal storage areas in the computer The term memory identifies data storage that comes in the form of chips and the word storage is used for memory that exists on tapes or disks Every computer comes with a certain amount of physical memory usually referred to as main memory or RAM Non heuristic This method of scanning relies on specific virus signatures The advantage of the non heuristic scan is that it is not fooled by what might seem to be a virus and does not generate false alarms Packed programs A file in a compression format Many operating systems and applications contain commands that enable you to pack a file so that it takes up less memory For example suppose you have a text file containing ten consecutive space characters Normally this would require ten bytes of storage However a program that packs files would replace the space characters by a special space series character followed by the number of spaces being replaced In this case the ten spaces would require only two bytes This is just one packing technique t
82. All System Updates to install all the available updates Click Next Vulnerability 249 BitDefender Internet Security 2009 Step 6 6 View Results Bit Defender Internet Security 2009 EA Vulnerability Scan 8 The vulnerability scan is finished The tasks you selected at Step 1 have been performed Qo The vulnerability scan is finished The tasks you selected at Step 1 have been performed a4 bitdefender Results Click Close 22 2 Settings To configure the settings of the automatic vulnerability checking go to Vulnerability gt Settings in the Advanced View Vulnerability 250 BitDefender Internet Security 2009 BitDefender Internet Security 2009 Trial a STATUS There is 1 pending issue EIU Status Settings General E Vulnerabilities to be checked v Critical Windows Updates v Regular Windows Updates Privacy Control v Weak Passwords Firewall Vulnerability v Application Updates Encryption Game Laptop Mode Network Update Registration Qo This is where you can configure in detail the Vulnerability Checking component a Sbitdefender Buy My Account Register Help Support Histor Automatic Vulnerability Checking Settings Select the check boxes corresponding to the system vulnerabilities you want to be regularly checked m Critical Windows Updates m Regular Windows Updates m Weak Passwords m Applications Updates Note e If you clear the check box correspond
83. BitDefender 2009 Full System Scan Antivirus Scan Step 3 of 3 Results Summary Resolved Items Unresolved Items 243 Password Protected Items 0 Ignored Items Failed Items 243 8 243 files could not be cleaned so your system is not virus free More details on www bitdefender com Q Antivirus scanning completed These are the statistics of this scan task a Cbitdefender Summary You can see the results summary Click Show log file to view the scan log Important e If required please restart your system in order to complete the cleaning process Click Close to close the window BitDefender Could Not Solve Some Issues In most cases BitDefender successfully disinfects the infected files it detects or it isolates the infection However there are issues that cannot be solved Antivirus 153 BitDefender Internet Security 2009 In these cases we recommend you to contact the BitDefender Support Team at www bitdefender com Our support representatives will help you solve the issues you are experiencing BitDefender Detected Suspect Files Suspect files are files detected by the heuristic analysis as potentially infected with malware the signature of which has not been released yet If suspect files were detected during the scan you will be requested to submit them to the BitDefender Lab Click OK to send these files to the BitDefender Lab for further analysis 16 2 6 Viewing Scan Logs To see the scan resul
84. Defender 2009 Configure the Friends List x O Email address Domain name C When load empty current list bitdefender com e Gdomain domain something julio sabatini tv Import email addresses From Outlook Address Book E george mayer amp gmail com jeanpierre yahoo fr A gt Remove Clear list Save Load CY bitdefender ENG ELM Friends List Here you can add or remove entries from the Friends list If you want to add an e mail address check the Email address option type in the address and click the 2 button The address will appear in the Friends list Important O Syntax name domain com If you want to add a domain check the Domain name option type in the domain and click the 2 button The domain will appear in the Friends list Important D Syntax domain com domain com and domain com all the received e mail messages from domain com will reach your Inbox regardless of their content domain all the received e mail messages from domain no matter the domain suffixes will reach your Inbox regardless of their content com all the received e mail messages having the domain suffix com will reach your Inbox regardless of their content Getting Started 40 BitDefender Internet Security 2009 To import e mail addresses from Windows Address Book Outlook Express Folders into Microsoft Outlook Outlook Express Windows Mail select the appropriate option from t
85. Defender Internet Security 2009 BitDefender Internet Security 2009 Trial a sous Settings General Antivirus B Antispam settings Antispam Na Fene TERRE D SEE Bg Basic Antisparn filters v Friends Spammers lists Parental Y Automatically add recipients to Friends list Firewall v Automatically add to Friends list Automatically add to Spammers list Bopetebity v Block mails written in Asian characters Encryption Block mails written in Cyrilic characters 3 B Advanced Antispam filters Game Laptop Mode amp v Enable the Learning Engine Bayesian Network Limit the dictionary size to 200000 words v Train the Learning Engine Bayesian on outgoing e mails Epic V URL filter Registration amp v NeuNet Heuristic filter v Block explicit content v Image filter UNE NONE Q Sbitdefender Buy My Account Register Help Support Histor Antispam Settings Three categories of options are available Antispam settings Basic Antispam filters and Advanced Antispam filters organized like an expandable menu similar to those from Windows Note Click the box labeled to open a category or click the one labeled to close it To enable disable an option select clear the checkbox corresponding to it To apply the default settings click Default Click Apply to save the changes Antisp
86. Defender account gives you access to BitDefender updates free technical support and special offers and promotions If you loose your BitDefender license key you can log in to your account at http myaccount bitdefender com to retrieve it e Important You must create an account within 15 days after installing BitDefender if you register it the deadline is extended to 30 days Otherwise BitDefender will no longer update If you have not yet created a BitDefender account click Create an account to open the account registration window Bit Defender Internet Security 2009 anx Create Account Step 1 My Account registration Information about an existing BitDefender account was found on this computer The BitDefender Account gives you access to technical support and special offers and promotions If you lose your BitDefender license key you can retrieve it by logging in to http myaccount bitdefender com You can choose to sign in to an existing BitDefender Account or to create a new one Sign in to an existing BitDefender Account amp Create a new BitDefender Account E mail Address vdanciu amp bitdefender com _ cS Password seem 0 Foraot your passwor ODORE RR Re Type password First Name Cosmin Last Name Danciu Country ad Skip registration Send me all messages from BitDefender Send me only the most important messages O Don t send me any messages This is where you can create a new Bit
87. Defender account or login to your already existing one If you choose to skip this step you will be reminded T to create an account later on bitdefender es oncer Account Creation If you do not want to create a BitDefender account at the moment select Skip registration and click Finish Otherwise proceed according to your current situation m do not have a BitDefender account p 276 Registration 275 BitDefender Internet Security 2009 m already have a BitDefender account p 276 do not have a BitDefender account To create a BitDefender account select Create a new BitDefender account and provide the required information The data you provide here will remain confidential m E mail address type in your e mail address m Password type in a password for your BitDefender account The password must be at least six characters long m Re type password type in again the previously specified password m First name type in your first name m Last name type in your last name m Country select the country you reside in Note Use the provided e mail address and password to log in to your account at http myaccount bitdefender com To successfully create an account you must first activate your e mail address Check your e mail address and follow the instructions in the e mail sent to you by the BitDefender registration service Optionally BitDefender can inform you about special offers and promot
88. ENTAL FILE VAULT NETWORK CRITICAL WARNING PROTECTED PROTECTED Tasks Status My computer s overall status Update Now gt Full System Scan H CRITICAL WARNING gt Deep Scan There is 1 issue that affects your system s security FIX ALL ISSUES Overview Registration Trial Last update Expires in Last scan 30 days Next scan Never Q Sbitdefender Buy My Account Register Help Support Histor Dashboard 6 1 Overview This is where you can see a summary of statistics regarding the update status your account status registration and license information Last update Indicates the date when your BitDefender product was last updated Please perform regular updates in order to have a fully protected system My account Indicates the e mail address that you can use to access your on line account to recover your lost BitDefender license key Dashboard 52 6 2 BitDefender Internet Security 2009 and to benefit from BitDefender support and other customized services Registration Indicates your license key type and status To keep your system safe you must renew or upgrade BitDefender if your key has expired Expires in Indicates the number of days left until the license key expires To update BitDefender just click the Update Now button from the tasks section To create or to login to your BitDefender account follow these steps 1 Click the My Account link from the bottom of the window A we
89. INTERFERENCE ACCURACY OF DATA ACCURACY OF INFORMATIONAL CONTENT SYSTEM INTEGRATION AND NON INFRINGEMENT OF THIRD PARTY RIGHTS BY FILTERING DISABLING OR REMOVING SUCH THIRD PARTY S SOFTWARE SPYWARE ADWARE COOKIES EMAILS DOCUMENTS ADVERTISEMENTS OR THE LIKE WHETHER ARISING BY STATUTE LAW COURSE OF DEALING CUSTOM AND PRACTICE OR TRADE USAGE DISCLAIMER OF DAMAGES Anyone using testing or evaluating BitDefender bears all risk to the quality and performance of BitDefender In no event shall BITDEFENDER be liable for any damages of any kind including without limitation direct or indirect damages arising out of the use performance or delivery of BitDefender even if BITDEFENDER has been advised of the existence or possibility of such damages SOME STATES DO NOT ALLOW THE LIMITATION OR EXCLUSION OF LIABILITY FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES SO THE ABOVE LIMITATION OR EXCLUSION MAY NOT APPLY TO YOU IN NO CASE SHALL BITDEFENDER S LIABILITY EXCEED THE PURCHASE PRICE PAID BY YOU FOR BITDEFENDER The disclaimers and limitations set forth above will apply regardless of whether you accept to use evaluate or test BitDefender IMPORTANT NOTICE TO USERS THIS SOFTWARE IS NOT FAULT TOLERANT AND IS NOT DESIGNED OR INTENDED FOR USE IN ANY HAZARDOUS ENVIRONMENT REQUIRING FAIL SAFE PERFORMANCE OR OPERATION THIS SOFTWARE IS NOT FOR USE IN THE OPERATION OF AIRCRAFT NAVIGATION NUCLEAR FACILITIES OR COMMUNICATION SYSTEMS WEAPONS SYS
90. Internet Security 2009 10 1 4 Scanning All Computers eczema ahaha deca eaanee 99 10 1 5 Updating All Computers ee ned enema Ree Rem tmo 100 10 1 6 Registering All Computers eer yen RI ee Eee een nne 101 11 Basic Settings 1o torre epu Rau apa eR ERE EEUE 102 11 4 Eocal Secutity 222 526 1i etna granada ead a rbd quinta id 103 11 2 Online Secu riby 52222 rezar the yrataaged tha ndr a DR Ud eor 7 103 11 3 Parental control settings oce eee et Du pP epe Ia e paredes 104 11 4 Network settings 2i nee ima I meae ee dre UR EUROPEO Pere tubus 104 11 5 File Vault settings roues beniccpRObIePoe dene Dem dev eleg os 104 11 6 General Setting S br ria nh iel rar Rene uenia RU ei eA RUP RU DR GUR Rn 104 12 Status Bar eee er RR Rex aana nani 106 12 1 Local security oic torsn re ELO rer UL PEERTIUENPILRIMPROPPIHEEPE NERO RS 106 12 2 Online security cof eriden epo pere DIR MEE ETICrTSE RR eqesperEQhER EU EE 107 12 3 File Vault repone tagien EPSEOPCR xe hUPLELPI RM wee ears 108 12 4 Vulnerability SCan inis emet RR ERR Or 24 PR XE PS 109 13 Registration eret RR ede ERR RUE 110 13 1 Step 1 1 Register BitDefender Internet Security 2009 iius 110 1A HISO decr 112 Advanced Administration eoe 114 15 General Tem 115 15 1 Dashboard 25 5 orb Ree r ar a abe du Er se c me Paire 115 15 1 1 Statistics si iecur eR RR dc RR URRE PEEL EET OPEENS 116 15 1 2 OVBrVIeW 1 2 scd vea
91. Its purpose is to minimize BitDefender s impact on power consumption while these devices are running on battery While in Laptop Mode scheduled tasks are by default not performed BitDefender detects when your laptop has switched to battery power and it automatically enters Laptop Mode Likewise BitDefender automatically exits Laptop Mode when it detects the laptop is no longer running on battery To configure Laptop Mode go to Game Laptop Mode gt Laptop Mode in the Advanced View Game Laptop Mode 257 BitDefender Internet Security 2009 BitDefender Internet Security 2009 Trial E STATUS There is 1 pending issue Game Mode Laptop Mode General Antivirus Vv Laptop Mode is enabled v Scan Task O Skip Task Postpone Firewall Vulnerability Encryption Game Laptop Mode Network Update Registration Q This is where you can configure in detail the Laptop Mode a Gbitdefender oy My Account Register Help Support Histor Laptop Mode You can see whether Laptop Mode is enabled or not If Laptop Mode is enabled BitDefender will apply the configured settings while the laptop is running on battery 23 2 1 Configuring Laptop Mode Settings To configure the behaviour on scheduled tasks use these options m Scan Task to prevent scheduled scan tasks from running while in Laptop Mode You can choose one of the following options Option Description Skip Task Do not run the scheduled tas
92. Ls iv xxx E ivi Use the list of blocked sites provided by BitDefender Q Web Control To enable this protection select the checkbox corresponding to Enable Web Control Select Allow access to these pages Block access to these pages to see the list of allowed blocked sites Click Exceptions to access a window where you can see the complementary list The rules must be input manually First of all select Allow access to these pages Block access to these pages to permit block access to the web sites that you will specify in the wizard Then click the Add button to start the configuration wizard To delete a rule just select it and click the amp Delete button To modify a rule select it and click the Edit button or double click it To temporarily deactivate a rule without deleting it clear the corresponding checkbox Click Apply to save the changes 18 2 1 Configuration Wizard The configuration wizard is a 1 step procedure Parental Control 188 BitDefender Internet Security 2009 Step 1 1 Specify Websites BitDefender 2009 Enter URL Hoot You can enter single Web page addresses or addresses which contain wildcards For example you can block all addresses which contain the word cigars by entering cigars in the provided field Q Finish Specify Websites Type in the web site for which the rule will be applied and click Finish Important D Syntax
93. NUE YES OR BY INSTALLING OR USING THE SOFTWARE IN ANY WAY YOU ARE INDICATING YOUR COMPLETE UNDERSTANDING AND ACCEPTANCE OF THE TERMS OF THIS AGREEMENT PRODUCT REGISTRATION By accepting this Agreement You agree to register Your Software using My account as a condition of Your use of the Software receiving updates and Your right to Maintenance This control helps ensure that the Software operates only on validly licensed Computers and that validly licensed end users receive Maintenance services Registration requires a valid product serial number and a valid email address for renewal and other legal notices These Terms cover BitDefender Solutions and Services for home users licensed to you including related documentation and any update and upgrade of the applications delivered to you under the purchased license or any related service agreement as defined in the documentation and any copy of these items This License Agreement is a legal agreement between you either an individual or a legal person and BITDEFENDER for use of BITDEFENDER s software product identified above which includes computer software and services and may include associated media printed materials and online or electronic documentation hereafter designated as BitDefender all of which are protected by international copyright laws and international treaties By installing copying or using BitDefender you agree to be bound by the terms of this agreement
94. Privacy Control and to view information regarding its activity go to Privacy Control gt Status in the Advanced View BitDefender Internet Security 2009 Trial SWITCH TO BASIC VIEW X STATUS There is 1 pending issue General Antivirus Antispam Parental Control Privacy Control Firewall Vulnerability Encryption GamejLaptop Mode Network Update Registration Q bitdefender Status Identity Y Privacy control is enabled Identity Control is configured Protection Level Aqaressive Default Permissive Privacy Control Statistics Identity information blocked Registry blocked Cookies blocked Scripts blocked Privacy Control Status Registry Cookie Script DEFAULT Identity control is enabled Registry control is disabled Cookie control is disabled Script control is disabled I A 2000 Buy My Account Register Help Support Histor You can see whether Privacy Control is enabled or disabled If you want to change the Privacy Control status clear or select the corresponding check box Privacy Control 198 BitDefender Internet Security 2009 Important To prevent data theft and protect your privacy keep the Privacy Control enabled The Privacy Control protects your computer using these important protection controls m Identity Control protects your confidential data by filtering all outgoing web HTTP e mail SMTP and instant messaging tra
95. Settings Network Rules Activity General Antivirus Rules Antispam v Hide System Rules cmi Parental C Process Adapter Types Cmd Line Protocol Network Events Local Ports Remote P Local Action Privacy Control i Firewall Vulnerability Encryption Game Laptop Mode Network Update Registration Preset Rules Q Sbitdefender Buy My Account Register Help Support Histor Firewall Rules You can see the applications processes for which firewall rules have been created Clear the Hide system rules check box if you want to also see the rules regarding the system or the BitDefender processes To see the rules created for a specific application click the box next to the respective application You can learn detailed information about each rule as indicated by the table columns m Process Adapter Types the process and the network adapter types the rule applies to Rules are automatically created to filter network or Internet access through any adapter You can manually create rules or edit existing rules to filter an application s network or Internet access through a specific adapter for example a wireless network adapter m Command Line the command used to start the process in the Windows command line interface cmd m Protocol the IP protocol the rule applies to You may see one of the following 225 BitDefender Internet Security 2009 Protocol Description Any Includ
96. TEMS DIRECT OR INDIRECT LIFE SUPPORT SYSTEMS AIR TRAFFIC CONTROL OR ANY APPLICATION OR INSTALLATION WHERE FAILURE COULD RESULT IN DEATH SEVERE PHYSICAL INJURY OR PROPERTY DAMAGE CONSENT TO ELECRONIC COMMUNICATIONS BitDefender may be required to send you legal notices and other communications about the Software and Maintenance subscription services or our use of the information you provide us Communications End User Software License Agreement xii BitDefender Internet Security 2009 BitDefender will send Communications via in product notices or via email to the primary user s registered email address or will post Communications on its Sites By accepting this Agreement you consent to receive all Communications through these electronic means only and acknowledge and demonstrate that you can access Communications on Sites GENERAL This Agreement will be governed by the laws of Romania and by international copyright regulations and treaties The exclusive jurisdiction and venue to adjudicate any dispute arising out of these License Terms shall be of the courts of Romania Prices costs and fees for use of BitDefender are subject to change without prior notice to you In the event of invalidity of any provision of this Agreement the invalidity shall not affect the validity of the remaining portions of this Agreement BitDefender and BitDefender logos are trademarks of BITDEFENDER All other trademarks used in the product or
97. Type Bit Defender Internet Security 2009 AX Exclusions Wizard Step 4 of 4 Finish We recommend you to perform an on demand task of the excluded target to make sure that your computer is virus free y Please note that if you choose to go on with the scanning task an on demand scan wizard will be displayed At the end of the wizard you will be requested to choose the actions to be taken in case viruses are found Please choose the exceptions For the scanning process carefully and remember that it is recommended not to define any exception in order to be sure that your system is fully protected Cbitdefender EL EBEN ee Scanning Type It is highly recommended to scan the files having the specified extensions to make sure that they are not infected Click Finish Click Apply to save the changes 16 4 Quarantine Area BitDefender allows isolating the infected or suspicious files in a secure area named quarantine By isolating these files in the quarantine the risk of getting infected disappears and at the same time you have the possibility to send these files for further analysis to the BitDefender lab To see and manage quarantined files and to configure the quarantine settings go to Antivirus gt Quarantine in the Advanced View Antivirus 165 BitDefender Internet Security 2009 BitDefender Internet Security 2009 Trial SWITCH TO BASIC VIEW STATUS There is 1 pending issue Prix au issues c Shie
98. Using Shortcut Menu A shortcut menu is available system tasks for each task Right click the E rene Last Run Never selected task to open it gy Full System Scan I Last Run 7 16 2008 12 17 22 PM The following commands are obi aia Last Run Never available on the shortcut Autologon Scan Last Run 5 9 2008 7 16 42 PM menu User tasks oF umm mm m Scan Now runs the T Scan Now selected task initiating an Contextual Scan ee sea T immediate scan evice detection bite Gig Duplicate m Paths opens the Delete Properties Properties window Paths tab where you can change the scan target of the shortcut Menu selected task Note C3 In the case of system tasks this option is replaced by Show Task Paths as you can only see their scan target m Schedule opens the Properties window Scheduler tab where you can schedule the selected task Antivirus 134 BitDefender Internet Security 2009 m Logs opens the Properties window Logs tab where you can see the reports generated after the selected task was run m Clone duplicates the selected task This is useful when creating new tasks as you can modify the settings of the task duplicate m Delete deletes the selected task Note Not available for system tasks You cannot remove a system task m Open opens the Properties window Overview tab where you can change the settings of the selected task Note Due to the pa
99. Vault a wizard will guide you through the process of viewing files from a specific vault Step 1 4 Select Vault Here you can specify the vault to view files from File Vault 86 BitDefender Internet Security 2009 Bit Defender Internet Security 2009 Ie File Vault Step 1 of 4 Step 1 Select vault Step 2 Enter password Step 3 Summary Step 4 Results Select Vault Please choose an existing vault Browse for a Vault File Select an existing Vault File Vault Name File Path Opened Drive gigi E Documents and Settings test Desktop gigi bvd No dada E Documents and Settings test Desktop dada bvd Yes E Q File Vault Wizard View Vault Content a bitdefender Next Cancel Select Vault If you select Browse for a File Vault you must click Browse and select the file vault You will go either to the step 3 if the selected vault is opened mounted or to the step 2 if it is locked unmounted If you click Select an existing File Vault then you must click the desired vault name You will go either to the step 3 if the selected vault is opened mounted or to the step 2 if it is locked unmounted Click Next Step 2 4 Password This is where you will be asked to enter the password for the selected vault File Vault 87 BitDefender Internet Security 2009 Bit Defender Internet Security 2009 Max File Vault Step 2 of 4 Ask Vault Password Please enter the password for selected vault
100. a new action click the current action and select the desired option from the menu Selectthe action to be taken on the infected files detected The following options are available None log objects Disinfect files Delete files Move files to Quarantine No action will be taken on infected files These files will appear in the report file Remove the malware code from the infected files detected Deletes infected files immediately without any warning Moves infected files into the quarantine Quarantined files cannot be executed or opened therefore the risk of getting infected disappears 140 Antivirus BitDefender Internet Security 2009 Select the action to be taken on the suspicious files detected The following options are available None log objects No action will be taken on suspicious files These files will appear in the report file Delete files Deletes suspicious files immediately without any warning Move files to Quarantine Moves suspicious files into the quarantine Quarantined files cannot be executed or opened therefore the risk of getting infected disappears Note Files are detected as suspicious by the heuristic analysis We recommend you to send these files to the BitDefender Lab Select the action to be taken on the hidden objects rootkits detected The following options are available Action Description None log objects No action will be taken on hidden file
101. ail to the Spammers list BitDefender Add spammer x BitDefender added this address to the spammers list Harriett ter com From now on any mail coming from this address will be automatically moved to your Spam folder E Don t show this message again Add Spammer Select Don t show this message again if you don t want to be prompted for confirmation when you add a spammer s address to the list Click OK to close the window The future e mail messages from that address will be tagged as SPAM Note You can select one sender or as many senders as you want m Add friend adds the sender of the selected e mail to the Friends list BitDefender Add friend x BitDefender added this address to the friends list Julio sabatini ty From now on all mail coming from this address will reach your Inbox regardless of its content Don t show this message again Add Friend Getting Started Select Don t show this message again if you don t want to be prompted for confirmation when you add a friend s address to the list Click OK to close the window 37 BitDefender Internet Security 2009 You will always receive e mail messages from this address no matter what they contain Note You can select one sender or as many senders as you want m Spammers opens the Spammers list that contains all the e mail addresses from which you don t want to receive messages regardless of their content
102. al with Linux type partition names So sda1 will probably correspond to the C Windows type partition sda3 to F and sdb1 to the memory stick Important e If the computer was not properly shut down it is possible that certain partitions were not mounted automatically To mount a partition follow these steps a Double click the Terminal Emulator shortcut on the Desktop b Type the following command mount media partition name 4 Browse your folders and open the desired directory For instance MyData which contains Movies Music and E books sub directories 5 Right click the desired directory and select Copy The following window will appear 9 96 Qu etg E books Movies Music media sdb1 Saving Data 6 Type media sdb1 into the corresponding textbox and click Copy Please be aware that depending on your computer configuration it might be sda1 instead of sdb1 BitDefender Rescue CD Howto 296 BitDefender Internet Security 2009 Glossary ActiveX ActiveX is a model for writing programs so that other programs and the operating system can call them ActiveX technology is used with Microsoft Internet Explorer to make interactive Web pages that look and behave like computer programs rather than static pages With ActiveX users can ask or answer questions use push buttons and interact in other ways with the Web page ActiveX controls are often written using Visual Basic Acti
103. als I want to use Identity Control Paid Rule Name Rule Type HTTP SMTP IM Whole words Match Case Description credit card Credit card YES YES NO YES NO iod Cbitdefender Bad Next cane Identity Control Configuration Identity Control protects you against the theft of sensitive data when you are online Based on the rules you create Identity Control scans the web e mail and instant messaging traffic leaving your computer for specific character strings for example your credit card number If there is a match the respective web page e mail or instant message is blocked If you want to use Identity Control follow these steps 1 Select want to configure it now 2 Create rules to protect your sensitive data For more information please refer to Creating Identity Control Rules p 15 3 If needed define specific exceptions to the rules you have created For more information please refer to Defining Identity Control Exceptions p 16 Click Next to continue Installing BitDefender 14 BitDefender Internet Security 2009 Creating Identity Control Rules To create an Identity Control rule click Add The configuration window will appear x Add Identity Rule Rule Name credit card v Scan HTTP v Scan SMTP Rule Type credit card w Match Whole Words match Case Rule Data 123412341234 L Scan Instant Messaging Q mam Identity Control Rule You
104. am 179 BitDefender Internet Security 2009 17 3 1 Antispam Settings m Mark spam messages in subject all e mail messages considered to be spam will be tagged with SPAM in the subject line m Mark phishing messages in subject all e mail messages considered to be phishing messages will be tagged with SPAM in the subject line 17 3 2 Basic Antispam Filters m Friends Spammers lists filter e mail messages using the Friends Spammers lists Automatically add recipients to Friends list automatically add recipients of sent mail to Friends list Automatically add to Friends list when you click the amp Not Spam button from the Antispam toolbar the sender of the selected e mail is automatically added to the Friends list Automatically add to Spammers list when you click the 1 Is Spam button from the Antispam toolbar the sender of the selected e mail is automatically added to the Spammers list Note The amp Not Spam and the amp Is Spam buttons are used to train the Bayesian filter m Block mails written in Asian characters blocks messages written in Asian charsets m Block mails written in Cyrillic characters blocks messages written in Cyrillic charsets 17 3 3 Advanced Antispam Filters m Enable the Learning Engine bayesian activates deactivates the Learning Engine bayesian Limit the dictionary size to 200000 words sets the size of the Bayesian dictionary smaller is faster bigger is
105. ame Laptop Mode 255 BitDefender Internet Security 2009 Option Description Skip Task Do not run the scheduled task at all Postpone Task Run the scheduled task immediately after you exit Game Mode To automatically disable the BitDefender firewall while in Game Mode follow these steps 1 Click Advanced Settings A new window will appear 2 Select the Do not use firewall check box 3 Click OK to save the changes 23 1 4 Changing Game Mode Hotkey You can manually enter Game Mode using the default Ctr1 Alt Shift G hotkey If you want to change the hotkey follow these steps 1 Click Advanced Settings A new window will appear BitDefender Advanced Settings x v Use Hotkeys v Ctrl v alt v shift G Do not use firewall Q a Advanced Settings 2 Under the Use HotKey option set the desired hotkey m Choose the modifier keys you want to use by checking one the following Control key Ct x1 Shift key Shift or Alternate key Alt m In the edit field type the letter corresponding to the regular key you want to use Game Laptop Mode 256 BitDefender Internet Security 2009 For example if you want to use the Ctr1 Al1t D hotkey you must check only Ctrl and Alt and type D 3 Click OK to save the changes Note Removing the check mark next to Use HotKey will disable the hotkey 23 2 Laptop Mode Laptop Mode is especially designed for laptop and notebook users
106. an click Check Now and follow the wizard to fix vulnerabilities step by step Vulnerability 244 BitDefender Internet Security 2009 Step 1 6 Select Vulnerabilities to Check Bit Defender Internet Security 2009 EA Vulnerability Scan Step 1 Select tasks Step 2 Scanning Step 3 Passwords Step 4 Applications Step 5 Windows Step 6 Finish Select tasks The wizard searches for available Windows updates weak passwords to Windows accounts and outdated applications BitDefender contains a list of applications that are checked for these vulnerabilities In order for all of these applications to be fully updated and protected it is recommended to select all the boxes below v User Passwords v Applications Updates v Critical Windows Updates v Other Windows Updates Qo Select the actions the vulnerability module should take when checking your system 2 bitdefender Pest cance Vulnerabilities Click Next to check the system for the selected vulnerabilities Vulnerability 245 BitDefender Internet Security 2009 Step 2 6 Checking for Vulnerabilities Bit Defender Internet Security 2009 AL Vulnerability Scan Step 1 Select tasks Step 2 Scanning Step 3 Passwords Step 4 Applications Step 5 Windows Step 6 Finish Status Scanning 1 Critical Windows Updates Q The scanning process is in progress a4 bitdefender stop cance Vulnerability Check Wait for BitDefender to finish checking
107. an quarantined files after update To automatically scan quarantined files after each update performed check the corresponding option You can choose to automatically move back the cleaned files to their original location by selecting Restore clean files Click OK to save the changes and close the window Antivirus 168 BitDefender Internet Security 2009 17 Antispam BitDefender Antispam employs remarkable technological innovations and industry standard antispam filters to weed out spam before it reaches the user s Inbox 17 1 Antispam Insights Spam is a growing problem both for individuals and for organizations It s not pretty you wouldn t want your kids to see it it can get you fired for wasting too much time or from receiving porn in your office mail and you can t stop people from sending it The next best thing to that is obviously to stop receiving it Unfortunately Spam comes in a wide range of shapes and sizes and there s a lot of it 17 1 1 Antispam Filters The BitDefender Antispam Engine incorporates several different filters that ensure your Inbox to be SPAM free Friends list Spammers list Charset filter Image filter URL filter NeuNet Heuristic filter and Bayesian filter Note You can enable disable each one of these filters in the Settings section from the Antispam module Friends List Spammers List Most people communicate regularly to a group of people or even receive messages from co
108. any unsolicited e mail Spyware Any software that covertly gathers user information through the user s Internet connection without his or her knowledge usually for advertising purposes Spyware applications are typically bundled as a hidden component of freeware or shareware programs that can be downloaded from the Internet however it should be noted that the majority of shareware and freeware applications do not come with spyware Once installed the spyware monitors user activity on the Internet and transmits that information in the background to someone else Spyware can also gather information about e mail addresses and even passwords and credit card numbers Spyware s similarity to a Trojan horse is the fact that users unwittingly install the product when they install something else A common way to become a victim of spyware is to download certain peer to peer file swapping products that are available today Aside from the questions of ethics and privacy spyware steals from the user by using the computer s memory resources and also by eating bandwidth as it sends information back to the spyware s home base via the user s Internet connection Because spyware is using memory and system resources the applications running in the background can lead to system crashes or general system instability Startup items Any files placed in this folder will open when the computer starts For example a startup screen a sound file to be played w
109. arental Control to block m inappropriate web pages m Internet access for specific periods of time such as when it s time for lessons m web pages e mail messages and instant messages if they contain specific keywords m applications like games chat filesharing programs or others m instant messages sent by IM contacts other than those allowed Click Next to continue Installing BitDefender 18 BitDefender Internet Security 2009 2 2 6 Step 6 9 Configure Virus Reporting Bit Defender Internet Security 2009 mE BitDefender Configuration Wizard Step 6 of 9 Step 7 Step 8 Welcome to Anonymous Virus Report configuration Step9 When scanning your computer BitDefender automatically creates activity reports containing detailed statistics concerning among others the number of scanned files and the type of threats found It is recommended to send these reports to BitDefender Labs for Further analysis To do this please check the corresponding option below These reports will contain no confidential data such as your name or IP address and they will not be used for commercial purposes either ivi Send Virus Report v Enable BitDefender Outbreak Detection Q bitdefender es Ee ee Virus Reporting Options BitDefender can send to the BitDefender Labs anonymous reports regarding viruses found on your computer in order to keep track of virus outbreaks You can configure the following options m Send virus repo
110. articular Internet connection e g wireless connection and you want to share it with other members of your network Sharing your Internet connection with members of local area networks leads to a higher resource consumption level and may involve a certain risk It also takes off some of your ports those opened by the members who are using your Internet connection Monitor changes in program files that match firewall rules checks each application attempting to connect to the Internet to see if it has been changed since the rule controlling its access was added If the application has been changed an alert will prompt you to allow or to block the access of the application to the Internet Usually applications are changed by updates But there is a risk that they might be changed by malware applications with the purpose of infecting your computer and other computers in the network Note We recommend you to keep this option selected and to allow access only to those applications that you expect to have changed after the rule controlling their access was created Signed applications are supposed to be trusted and have a higher degree of security You can check Ignore changes for signed processes in order to allow changed signed applications to connect to the Internet without your receiving an alert about this event Enable wireless notifications if you are connected to a wireless network displays informative windows regarding specifi
111. ask The following window will appear BitDefender New Task x Overview Paths Scheduler Logs Properties Scheduled daily next scan 7 17 2008 11 21 07 PM Schedule O No O once Periodically On system startup Atevery 1 S days Kk Start date 7 17 2008 x Ik Start time 11 21 07 PM Q scan Px Scheduler You can see the task schedule if any When scheduling a task you must choose one of the following options m Not Scheduled launches the task only when the user requests it m Once launches the scan only once at a certain moment Specify the start date and time in the Start Date Time fields Antivirus 146 BitDefender Internet Security 2009 m Periodically launches the scan periodically at certain time intervals hours days weeks months years starting with a specified date and time If you want the scan to be repeated at certain intervals select Periodically and type in the At every edit box the number of minutes hours days weeks months years indicating the frequency of this process You must also specify the start date and time in the Start Date Time fields m On system startup launches the scan at the specified number of minutes after a user has logged on to Windows Click OK to save the changes and close the window To run the task just click Scan 16 2 5 Scanning Objects Before you initiate a scanning process you shoul
112. aths The following window will appear Antivirus 143 BitDefender Internet Security 2009 BitDefender New Task x Overview Paths Scheduler Logs 3 Floppy A Local Drives NT C j szk ee _JRemovable Drives eve E SWF Al Entries O Local Disk G CD Drive H v GQE Documents and Settings test Desktop Q ELEM as NNI Scan Target You can see the list of local network and removable drives as well as the files or folders added previously if any All checked items will be scanned when running the task The section contains the following buttons m Add Items s opens a browsing window where you can select the file s folder s that you want to be scanned Note You can also use drag and drop to add files folders to the list m Remove Item s removes the file s folder s previously selected from the list of objects to be scanned Note Only the file s folder s that were added afterwards can be deleted but not those that were automatically seen by BitDefender Antivirus 144 BitDefender Internet Security 2009 Besides the buttons explained above there are also some options that allow the fast selection of the scan locations m Local Drives to scan the local drives m Network Drives to scan all network drives m Removable Drives to scan removable drives CD ROM floppy disk unit m All Entries
113. ay This is why it is very important to keep BitDefender up to date with the latest malware signatures By default BitDefender checks for updates when you turn on your computer and every hour after that However if you want to update BitDefender just click Update Now The update process will be initiated and the following window will appear immediately Parental 71 BitDefender Internet Security 2009 Bit Defender Internet Security 2009 RE Update BitDefender Update BitDefender will check for newer files and update them automatically Please make sure that you have an internet connection before performing this task It is highly recommended to keep BitDefender updated to ensure the security of your system Status Checking for updates File 0 Okb Total Update i 25 okb Q Cbitdefender Ln cance Updating BitDefender In this window you can see the status of the update process The update process is performed on the fly meaning that the files to be updated are replaced progressively In this way the update process will not affect product operation and at the same time all vulnerabilities will be excluded If you want to close this window just click Cancel However this will not stop the update process Note C3 If you are connected to the Internet through a dial up connection then it is recommended to regularly update BitDefender by user request Restart the computer if required In case of a major update you wi
114. b page will open 2 Type your username and password and click the Login button 3 To create a BitDefender account select You don t have an account and provide the required information Note The data you provide here will remain confidential To register BitDefender Internet Security 2009 follow these steps 1 Click the My Account link from the bottom of the window A one step registration wizard will open 2 Click the want to register the product with a new key radio button 3 Type the new license key in the corresponding textbox 4 Click Finish To buy a new license key follow these steps 1 Click the My Account link from the bottom of the window A one step registration wizard will open 2 Click the Renew Your BitDefender License Key link A web page will open 3 Click the Buy Now button Tasks This is where you can find links to the most important security tasks full system scan deep scan update now Dashboard 53 BitDefender Internet Security 2009 The following buttons are available m Full System Scan starts a full scan of your computer archives excluded m Deep Scan starts a full scan of your computer archives included m Update Now starts an immediate update 6 2 1 Scanning with BitDefender To scan your computer for malware run a particular scan task by clicking the corresponding button The following table presents the available scan tasks along with their description
115. by the order they are checked in The table columns provide comprehensive information about each rule Note When a connection attempt is made whether incoming or outgoing BitDefender applies the action of the first rule matching the respective connection Therefore the order by which rules are checked is very important To delete a rule select it and click the Delete rule button To edit an existing rule select it and click the Edit rule button or double click it You can increase or decrease the priority of a rule Click the Move Up In List button to increase the priority of the selected rule by one level or click the Move Down In List button to decrease the priority of the selected rule by one level To assign a rule the highest priority click the Move First button To assign a rule the lowest priority click the Move Last button Click Close to close the window Firewall 232 BitDefender Internet Security 2009 20 4 Connection Control To monitor the current network Internet activity over TCP and UDP sorted by application and to open the BitDefender Firewall log go to Firewall gt Activity in the Advanced View BitDefender Internet Security 2009 Trial SWITCH TO BASIC VIEW STATUS There is 1 pending issue FIX ALL ISSUES 4 Settings Network Rules Activity General ENFIUS X Hide Inactive Procesess Antispam Process Name PID P Out Out js In Inis Age Parental Control
116. c network events for example when a new computer has joined the network Block port scans detects and blocks attempts to find out which ports are open Port scans are frequently used by hackers to find out which ports are open on your computer They might then break into your computer if they find a less secure or vulnerable port Strict automatic rules creates strict rules using the firewall alert window With this option selected BitDefender will prompt you for action and create rules for each different process that opens the application requesting network or Internet access Intrusion detection system IDS activates the heuristic monitoring of the applications trying to access network services or the Internet 220 BitDefender Internet Security 2009 20 2 Network To configure the firewall settings go to Firewall gt Network in the Advanced View BitDefender Internet Security 2009 Trial STATUS There is 1 pending issue FIX ALL ISSUES General Antivirus Vulnerability Encryption Game Laptop Mode Network Update Registration Q bitdefender Network Settings Network SWITCH TO BASIC VIEW Activity Network Configuration Adapter Type Stealth Generic Addresses Gateways Local Area Connection Safe Y Remote Y No Y 10 10 15 29 16 10 10 0 1 Zones S Uu Adapter Zones Trust ll Local Area Connection Buy My Account Register Help Suppor
117. cal Address Remote Address IP Verson Local Direction Network Events Actin 1 P svchost exe Any No Any Adapter UDP Any IP DHCP Client Any IP DHCP Server Any No Both All Allow 2 m svchost exe Any No Any Adapter UDP Any IP DHCP Server Any IP DHCP Client Any No Both All Allow 3 E svchost exe Any No Any Adapter UDP Any IP 1024 65535 Any IP DNS Any No Both Al Allow 4 m svchost exe Any Any Adapter TCP i Any IP DNS Any No Both Connect Traffic Allow is Any ERR n 6 Any Any No Trusted Local Any Any IP Any Port Any IP Any Port Any Yes Both All Allow 7 Any Any No Blocked Local Any Any IP Any Port Any IP Any Port Any Yes Both All Deny 8 Any Any No Blocked Any Any IP Any Port Any IP Any Port Any No Both A Deny 9 Any Any No Any Adapter IGMP Any IP Any Port Any IP Any Port Any No Both Traffic Allow 10 Any Any No Any Adapter GRE AnyIP AnyPort Any IP Any Port Any No Both Traffic Allow 1 Any Any No Any Adapter AH Any IP Any Port Any IP Any Port Any No Both Traffic Allow 12 Any Any No Any Adapter ESP Any IP Any Port Any IP Any Port Any No Both Traffic Allow 13 Any Any No Any Adapter ICMP Any IP Any Port Any IP Any Port Any No Both Traffic Allow 14 Any Any No Any Adapter ICMP6 Any IP AnyPort Any IP Any Port Any No Both Traffic Allow 15 Any Any No Any Adapter VRRP Any IP Any Port Any IP Any Port Any No Both Traffic Allow 16 m svchost exe Any No Any Adapter UDP Any IP DNS Any IP
118. can be configured only for the current Windows user account 15 2 2 Virus Report Settings m Send virus reports sends to the BitDefender Labs reports regarding viruses identified in your computer It helps us keep track of virus outbreaks The reports will contain no confidential data such as your name IP address or others and will not be used for commercial purposes The information supplied will contain only the virus name and will be used solely to create statistic reports m Enable BitDefender Outbreak Detection sends to the BitDefender Labs reports regarding potential virus outbreaks The reports will contain no confidential data such as your name IP address or others and will not be used for commercial purposes The information supplied will contain only the potential virus and will be used solely to detect new viruses 15 3 System Information BitDefender allows you to view from a single location all system settings and the applications registered to run at startup In this way you can monitor the activity of the system and of the applications installed on it as well as identify possible system infections To obtain system information go to General gt System Info in the Advanced View General 119 BitDefender Internet Security 2009 BitDefender Internet Security 2009 Trial a STATUS There is 1 pending issue Dashboard Settings SysInfo General Antivirus Current System Settings Fipan Load Items
119. canning A level can be defined as ENT Overview Here you can see information about the task name last run and schedule status and set the scan settings Choosing Scan Level You can easily configure the scan settings by choosing the scan level Drag the slider along the scale to set the appropriate scan level There are 3 scan levels Protection level Description Low Offers reasonable detection efficiency The resource consumption level is low Programs only are scanned for viruses Besides the classical signature based scan the heuristic analysis is also used Medium Offers good detection efficiency The resource consumption level is moderate All files are scanned for viruses and spyware Besides the classical signature based scan the heuristic analysis is also used Antivirus 136 BitDefender Internet Security 2009 High Offers high detection efficiency The resource consumption level is high All files and archives are scanned for viruses and spyware Besides the classical signature based scan the heuristic analysis is also used A series of general options for the scanning process are also available m Run the task with Low priority Decreases the priority of the scan process You will allow other programs to run faster and increase the time needed for the scan process to finish m Minimize scan window on start to systray Minimizes the scan window to the system tray Double click the Bi
120. cates an online computer with no BitDefender products installed 2 Wi Indicates an online computer with BitDefender installed S Indicates an offline computer with BitDefender installed 3 Do one of the following Network 261 BitDefender Internet Security 2009 m Select from the list the name of the computer to add m Type the IP address or the name of the computer to add in the corresponding field 4 Click Add You will be prompted to enter the home management password of the respective computer BitDefender x Enter Remote HM Password amirea2 xp The password should be at least 8 characters long Enter Remote Password LLLI a cc Authenticate 5 Type the home management password configured on the respective computer 6 Click OK If you have provided the correct password the selected computer name will appear in the network map Note You can add up to five computers to the network map 24 3 Managing the BitDefender Network Once you have successfully created a BitDefender home network you can manage all BitDefender products from a single computer Network 262 BitDefender Internet Security 2009 BitDefender Internet Security 2009 Trial a STATUS There is 1 pending issue Network General INTERNET BDENTLAPS XP Antivirus eh EY 10 10 1529 Antispam T No gateway found Trial Parental Privacy BDENTLAPS P MMM Na PC click to add Panel This Comp Register this
121. ced options under the directory list m Include subfolders to include the subfolders to your selection m Automatically add to friends list to add the senders to the Friends list Select Skip this step if you want to pass over this step Click Back to go to the previous step or click Next to continue the wizard Getting Started ELEM es coo BitDefender Internet Security 2009 Step 5 6 Train Bayesian Filter with Spam BitDefender 2009 Train the Bayesian Filter on Existing E mail X Step 5 of 6 Train the Bayesian Filter on Existing E mail Step 6 You can choose a specific folder to be used by the Bayesian Filter as reference for spam Outlook E Deleted Items amp 3 Inbox 3 Outbox 3 Sent Items Calendar Contacts Journal e Notes iv vi Include subfolders v Automatically add to spammers list Skip this step Q bitdefender a NECEM Train Bayesian Filter with Spam Please select a folder that contains spam e mail messages These messages will be used to train the antispam filter Important Please make sure that the folder you choose contains no legitimate e mail at all otherwise the antispam performance will be considerably reduced There are two advanced options under the directory list m Include subfolders to include the subfolders to your selection m Automatically add to spammers list to add the senders to the Spammers list Select Skip this s
122. cks When the status buttons are green the security risk of your system is at a minimum To turn the buttons green follow these steps 1 Click the Fix buttons to fix security vulnerabilities one by one 2 If one issue is not fixed on the spot follow the wizard to fix it If you want to exclude an issue from monitoring just clear the Yes monitor this component checkbox 12 2 Online security The issues concerning online security are described in very explicit sentences In line with each sentence if there is something that might affect your computer s security you will see a red status button called Fix Otherwise a green OK status button is displayed Issue Description Antispam is Ensures that your e mails are scanned for malware and filtered enabled for spam Status Bar 107 BitDefender Internet Security 2009 Issue Description Identity controlis Helps you keep confidential data safe by scanning for specific enabled strings all web and mail traffic It is recommended to enable Identity Control to keep your confidential data e mail address user IDs passwords credit cards numbers etc safe from being stolen Firefox BitDefender protects you against phishing attempts when you antiphishing are surfing the Internet protection is enabled Internet Explorer BitDefender protects you against phishing attempts when you antiphishing are surfing the Internet protection is enabled When the status buttons are g
123. curity 2009 Setup Wizard Cck the Finish button to exit the Setup Wizard BitDefender Internet Security 2009 Follow these steps to install BitDefender Internet Security 2009 1 Click Next to continue or click Cancel if you want to quit installation Click Next BitDefender Internet Security 2009 alerts you if you have other antivirus products installed on your computer Click Remove to uninstall the corresponding product If you want to continue without removing the detected products click Next Warning 3 It is highly recommended that you uninstall any other antivirus products detected before installing BitDefender Running two or more antivirus products at the same time on a computer usually renders the system unusable Please read the License Agreement and click agree Important If you do not agree to these terms click Cancel The installation process will be abandoned and you will exit setup By default BitDefender Internet Security 2009 will be installed in C Program Files BitDefender BitDefender 2009 If you want to change the installation path click Browse and select the folder in which you would like BitDefender to be installed Click Next Select options regarding the installation process Some of them will be selected by default m Open readme file to open the readme file at the end of the installation m Place a shortcut on the desktop to place a shortcut to BitDefender Internet Secu
124. curity tasks full system scan deep scan update now The following buttons are available m Full System Scan starts a full scan of your computer archives excluded m Deep Scan starts a full scan of your computer archives included m Update Now starts an immediate update Parental 70 BitDefender Internet Security 2009 8 2 1 Scanning with BitDefender To scan your computer for malware run a particular scan task by clicking the corresponding button The following table presents the available scan tasks along with their description Full System Scan Scans the entire system except for archives In the default configuration it scans for all types of malware threatening your system s security such as viruses spyware adware rootkits and others Deep Scan Scans the entire system In the default configuration it scans for all types of malware threatening your system s security such as viruses spyware adware rootkits and others Note Since the Deep System Scan and Full System Scan tasks analyze the entire system the scanning may take a while Therefore we recommend you to run these tasks on low priority or better when your system is idle When you initiate an on demand scanning process whether a quick or a full scan the BitDefender Scanner will appear Follow the three step guided procedure to complete the scanning process 8 2 2 Updating BitDefender New malware is found and identified every d
125. d unmounted To better understand this process think of a real bank vault its strong door can be opened or locked Nevertheless the content of the vault is protected only when it is locked At the same time its content can be accessed only when it is opened By clicking Lock Vault a wizard will guide you through the process of locking unmounting a specific vault Step 1 3 Select Vault Here you can specify the vault to lock File Vault 90 BitDefender Internet Security 2009 Bit Defender Internet Security 2009 File Vault Step 1 of 3 a ey Select Vault Step 2 Summary Step 3 Results Please choose the opened Vault to close Browse for a Vault File Browse Select an existing Vault File Vault Name File Path Opened Drive dada E Documents and Settings test Desktop dada bvd Yes n Q File Vault Wizard Close Vault a bitdefender oa Select Vault If you select Browse for a File Vault you must click Browse and select the file vault If you click Select an existing File Vault then you must click the desired vault name Click Next Step 2 3 Summary This is where you can review chosen operations File Vault 91 BitDefender Internet Security 2009 Bit Defender Internet Security 2009 File Vault Step 2 of 3 Step t Select vault Step 2 Summary Step 3 Results Finish Operation Close Vault Name dada Path E Documents and Settings test Desktop dada bvd Status Opened on
126. d make sure that BitDefender is up to date with its malware signatures Scanning your computer using an outdated signature database may prevent BitDefender from detecting new malware found since the last update To verify when the last update was performed click Update Update in the settings console Note e In order for BitDefender to make a complete scanning you need to shut down all open programs Especially your email client i e Outlook Outlook Express or Eudora is important to shut down Scanning Methods BitDefender provides four types of on demand scanning m immediate scanning run a scan task from the system user tasks m Contextual scanning right click a file or a folder and select BitDefender Antivirus 2009 m Drag amp Drop scanning drag and drop a file or a folder over the Scan Activity Bar m Manual scanning use BitDefender Manual Scan to directly select the files or folders to be scanned Immediate Scanning To scan your computer or part of it you can run the default scan tasks or your own scan tasks This is called immediate scanning To run a scan task use one of the following methods Antivirus 147 BitDefender Internet Security 2009 m double click the desired scan task in the list m click the Scan now button corresponding to the task m select the task and then click Run Task The BitDefender Scanner will appear and the scanning will be initiated For more information please ref
127. d or opened therefore the risk of getting infected disappears o Select the action to be taken on the suspicious files detected The following options are available Action Description Take no action Only keep record of suspicious archived files in the scan log After the scan is completed you can open the scan log to view information on these files Delete files Deletes suspicious files immediately without any warning Move files to Quarantine Moves suspicious files into the quarantine Quarantined files cannot be executed or opened therefore the risk of getting infected disappears o Select the action to be taken on the password protected files detected The following options are available 142 BitDefender Internet Security 2009 Action Description Log as not scanned Only keep record of the password protected files in the scan log After the scan is completed you can open the scan log to view information on these files Prompt for password When a password protected file is detected prompt the user to provide the password in order to scan the file Note e If you choose to ignore the detected files or if the chosen action fails you will have to choose an action in the scanning wizard If you click Default you will load the default settings Click OK to save the changes and close the window Setting Scan Target To set the scan target of a specific user scan task right click the task and select P
128. date type is also known as Virus Definitions Update m Updates for the antispam engines new rules will be added to the heuristic and URL filters and new images will be added to the Image filter This will help increase the effectiveness of your Antispam engine This update type is also known as Antispam Update m Updates for the antispyware engines new spyware signatures will be added to the database This update type is also known as Antispyware Update m Product upgrades when a new product version is released new features and scan techniques are introduced to the effect of improving the product s performance This update type is also known as Product Update 25 1 Automatic Update Update To see update related information and perform automatic updates go to Update gt Update in the Advanced View 265 BitDefender Internet Security 2009 BitDefender Internet Security 2009 Trial SWITCH TO BASIC VIEW eae STATUS There is 1 pending issue Update Settings General Antivirus v Automatic update is enabled Antispam Last checked 7 17 2008 10 40 10 PM TRE Last updated 7 17 2008 10 40 11 PM Par Privacy Antivirus Signature Properties Firewall Virus Signatures 1381767 how Vinis List Vulnerability Engine Version 7 20047 Encryption Game Laptop Mode Eales cp Mod Download Status Network Update Registration File 0 Okb i S Total update 0 Okb I j Q Sbitdefender Buy My Accoun
129. dential m E mail address type in your e mail address m Password type in a password for your BitDefender account The password must be at least six characters long m Re type password type in again the previously specified password m First name type in your first name m Last name type in your last name m Country select the country you reside in Note Use the provided e mail address and password to log in to your account at http myaccount bitdefender com To successfully create an account you must first activate your e mail address Check your e mail address and follow the instructions in the e mail sent to you by the BitDefender registration service Optionally BitDefender can inform you about special offers and promotions using the e mail address of your account Select one of the available options m Send me all messages from BitDefender m Send me only the most important messages m Don t send me any messages Click Finish l already have a BitDefender account BitDefender will automatically detect if you have previously registered a BitDefender account on your computer In this case provide the password of your account If you already have an active account but BitDefender does not detect it select Sign in to an existing BitDefender Account and provide the e mail address and the password of your account If you have forgotten your password click Forgot your password and follow the instructions Instal
130. der Internet Security 2009 Click Apply to save the changes 18 5 1 Configuration Window When you add or edit rules the configuration window will appear Type here the name of the contact you want to add to the restriction list user id Choose IM program type Other Instant Messenger Iv Action Deny chat with this contact O Allow chat with this contact i Add a IM contact which you allow or deny chatting with Q Add contacts to the list in order to block the instant messages sent tojreceived from them 23 u Add IM contact Proceed as follows 1 Type the user name ID of the IM contact 2 Choose the IM program the contact associates with 3 Select the action of the rule m Deny chat with this contact m Allow chat with this contact 4 Click Finish to add the rule 18 6 Web Time Limiter The Web Time Limiter helps you to allow or block web access for users or applications during specified time intervals Parental Control 196 BitDefender Internet Security 2009 Note BitDefender will perform updates every hour no matter the settings of the Web Time Limiter To configure the Web Time Limiter for a specific user double click the respective user and click the Time Limiter tab BitDefender 2009 Parental Control i Status Web Applications Keywords IM Traffic Time limiter lvi Enable Web time limiter Click to change the status of an interval White areas represent interval
131. der home network follow these steps 1 Click Join Create network You will be prompted to configure the home management password BitDefender x Enter the home management password The password should be at least 8 characters long Enter password eeecccee Retype password eecccces a oc Configure Password 2 Type the same password in each of the edit fields 3 Click OK You can see the computer name appearing in the network map 24 2 Adding Computers to the BitDefender Network Before you can add a computer to the BitDefender home network you must configure the BitDefender home management password on the respective computer To add a computer to the BitDefender home network follow these steps 1 Click Manage Network You will be prompted to provide the local home management password 260 Network BitDefender Internet Security 2009 BitDefender You must enter the home management password Password eeecccce C Don t show this message again this session ELEM NI Enter Password 2 Type the home management password and click OK A new window will appear Manage Network x Select Computer m amatei xp m amilicescu m jamiloiu Ei amirea xp m jamitrica xp 3 IP 10 10 15 193 p i amirea2 xp Name amirea2 xp id Add Computer You can see the list of computers in the network The icon meaning is as follows Wi Indi
132. ding issue S amp E nme DASHBOARD SECURITY PARENTAL FILE VAULT NETWORK CRITICAL WARNING PROTECTED PROTECTED Monitored Components Expand Collapse all Tasks Local security Monitor Status gt Update Now Real time file protection is enabled v ves ok gt My Documents Scan You have never scanned your computer for malware v ves Fix gt Full System Scan Update performed today v Yes OF gt Deep Scan Firewall is enabled v Yes OK Y Custom scan Online security oK Vulnerability Scan Vulnerability scan Ok The security module displays the status of components such as antivirus antiphishing firewall antispam privacy vulnerability check and update modules together with links to antivirus update and vulnerability check tasks C bitdefender Buy My Account Register Help Support History Security The Security module consists of two sections m Monitored Components Allows you to see the full list of monitored components for each security module You can choose which of the modules to be monitored It is recommended to enable monitoring all components m Tasks This is where you can find links to the most important security tasks full System scan deep scan update now 7 1 Monitored Components The monitored components are grouped into several categories Security 56 BitDefender Internet Security 2009 Local security This is where you can check the status of each security modules that protec
133. dress will appear in the Spammers list Important D Syntax name domain com If you want to add a domain check the Domain name option type in the domain and click The domain will appear in the Spammers list Important O Syntax domain com domain com and domain com all the received e mail messages from domain com will be tagged as SPAM m domain all the received e mail messages from domain no matter the domain suffixes will be tagged as SPAM m com all the received e mail messages having the domain suffix com will be tagged as SPAM Antispam 177 BitDefender Internet Security 2009 To delete an item from the list select it and click t Remove button If you click E Clear list button you will delete all entries from the list but notice it is impossible to recover them Use the amp Save Load buttons to save load the Spammers list to a desired location The file will have bw1 extension To reset the content of the current list when you load a previously saved list select When load empty current list Click Apply and OK to save and close the Spammers list Important If you want to reinstall BitDefender it s a good idea to save the Friends Spammers lists before and after the reinstallation process is over you may load them 17 3 Settings To configure the antispam settings and filters go to Antispam gt Settings in the Advanced View Antispam 178 Bit
134. during games Basic Settings 104 BitDefender Internet Security 2009 LEE NENNEN Laptop Mode Settings Password Parental Control Password BitDefender News Products Notification Alerts Scan Activity Bar Load BitDefender at Startup Send Virus Reports Outbreak Detection Basic Settings Laptop Mode temporarily modifies protection settings so as to minimize their impact on the life of your laptop battery This ensures that the BitDefender settings can only be changed by the person who knows this password By enabling this option you will narrow settings protection down to the parental control module This ensures that the BitDefender parental control settings can only be changed by the person who knows this password By enabling this option you will receive important company news product updates or new security threats from BitDefender By enabling this option you will receive information alerts The Scan Activity Bar is a small transparent bar indicating the progress of the BitDefender scanning activity The green flowing line shows the scanning activity on your local system The red flowing line shows the scanning activity on your internet connection By enabling this option BitDefender user interface is loaded at startup This option does not affect the protection level By enabling this option virus scanning reports are sent to BitDefender labs for analysis Please note that these reports w
135. e m Furthermore the BitDefender Basic View window contains several useful shortcuts Link Description My Account Allows you to create or to login to your BitDefender account BitDefender account provides you free access to technical support Register Allows you to enter a new license key or to view the current license key and the registration status Help Gives you access to a help file that learn you how to use BitDefender Support Allows you to contact the BitDefender support team History Allows you to see a detailed history of all tasks performed by BitDefender on your system 5 2 2 Advanced View Advanced View gives you access to each specific component of BitDefender product You ll be able to configure advanced settings as well as keep track of advanced features Getting Started 29 BitDefender Internet Security 2009 BitDefender Internet Security 2009 Trial ES Dashboard Settings SysInfo General mE Statistics Overview Scanned files o Last update Disinfected files 0 MyAccount Privacy Control Detected viruses 0 Registration Trial Firewall Last scan Never Expires in Vulnerability Next scan Never 30 days Encryption File Activity Network Activity Game Laptop Mode Network Update m BEL Q Click here to access the general settings or to view the dashboard and detailed system info a Gbitdefender Advanced View Buy My Account Register Help Support Histor m As you can ea
136. e 50 MB of the vault type the desired value in the Vault size field 6 Click Create if you only want to create the vault at the selected location To create and display the vault as a virtual disk drive in My Computer click Create amp Open 21 2 2 Opening a Vault In order to access and work with the files stored in a vault you must open the vault When you open the vault a virtual disk drive appears in My Computer The drive is labeled with the drive letter assigned to the vault To open a vault use any of these methods Encryption 239 BitDefender Internet Security 2009 m Select the vault from the table and click amp Open vault m Right click the vault in the table and select Open m Right click the vault file on your computer point to BitDefender File Vault and select Open A new window will appear BitDefender 2009 Open Vault File The full path of the vault file on disk C Documents and Settings ydanciu Desktop gigi gigi bvd Drive letter H Password The password must be at least 8 characters length Q Opens the currently selected Vault Open File Vault Proceed as follows 1 Choose a drive letter from the menu 2 Type the vault password in the Password field 3 Click Open 21 2 3 Locking a Vault When you are done with your work in a file vault you must lock it in order to protect your data To lock a vault use any of these methods m
137. e enabled to ensure that the is enabled malware signatures of your BitDefender product are updated on a regular basis Updating now Product and malware signatures update is being performed Security 57 BitDefender Internet Security 2009 Issue Description Firewall is enabled Protects your computer from hacker and malicious outside attacks When the status buttons are green the security risk of your system is at a minimum To turn the buttons green follow these steps 1 Click the Fix buttons to fix security vulnerabilities one by one 2 If one issue is not fixed on the spot follow the wizard to fix it If you want to exclude an issue from monitoring just clear the Yes monitor this component checkbox 7 1 2 Online security The issues concerning online security are described in very explicit sentences In line with each sentence if there is something that might affect your computer s security you will see a red status button called Fix Otherwise a green OK status button is displayed Issue Description Antispam is Ensures that your e mails are scanned for malware and filtered enabled for spam Identity controlis Helps you keep confidential data safe by scanning for specific enabled strings all web and mail traffic It is recommended to enable Identity Control to keep your confidential data e mail address user IDs passwords credit cards numbers etc safe from being stolen Firefox BitDefender protects you
138. e following m Select from the list the name of the computer to add m Type the IP address or the name of the computer to add in the corresponding field 4 Click Add You will be prompted to enter the home management password of the respective computer BitDefender x Enter Remote HM Password amirea2 xp The password should be at least 8 characters long Enter Remote Password LLLI a NNI Authenticate 5 Type the home management password configured on the respective computer 6 Click OK If you have provided the correct password the selected computer name will appear in the network map Note You can add up to five computers to the network map 10 1 3 Managing the BitDefender Network Once you have successfully created a BitDefender home network you can manage all BitDefender products from a single computer Network 97 BitDefender Internet Security 2009 BitDefender Internet Security 2009 Trial SETTINGS SWITCH TO ADVANCED VIEW PEIES STATUS There is 1 pending issue oY amp m DASHBOARD SECURITY PARENTAL FILE VAULT NETWORK CRITICAL WARNING PROTECTED PROTECTED INTERNET BDENTLAPS XP WEEE fa GD 10 10 15 29 3 TES gt Leave Network Y No gateway found Trial L gt Add Computer I Scan All Peel Register this computer with a license key ES Update All Set the settings password Run a Scan task Register All OH No PC click t AEE i issues on this computer tadh Show histo
139. e help file or user manual of the product 2 Remove the older version of BitDefender from your computer For more information please refer to the help file or user manual of the product 3 Restart the computer 4 Install BitDefender Internet Security 2009 as described in the Installing BitDefender p 4 section of this user guide Upgrade 23 BitDefender Internet Security 2009 4 Repairing or Removing BitDefender If you want to repair or remove BitDefender Internet Security 2009 follow the path from the Windows start menu Start Programs BitDefender 2009 Repair or Remove You will be requested to confirm your choice by clicking Next A new window will appear where you can select m Repair to re install all program components installed by the previous setup If you choose to repair BitDefender a new window will appear Click Repair to start the repairing process Restart the computer when prompted and afterwards click Install to reinstall BitDefender Internet Security 2009 Once the installation process is completed a new window will appear Click Finish m Remove to remove all installed components Note We recommend that you choose Remove for a clean re installation If you choose to remove BitDefender a new window will appear e Important By removing BitDefender you will no longer be protected against viruses spyware and hackers If you want Windows Firewall and Windows Defender on
140. e link does not imply that BitDefender endorses or accepts any responsibility for the content of the third party site Trademarks Trademark names may appear in this book All registered and unregistered trademarks in this document are the sole property of their respective owners and are respectfully acknowledged BitDefender Internet Security 2009 bitdefender BitDefender Internet Security 2009 Table of Contents End User Software License Agreement eese x Preface ieeesiesse siet x ERRRERRRRERERRRARAKRRERRRRARERERRSERRRARRAS xiv 1 Gonventions Used in This BOOK d rte ndn re Re HU xiv 1 1 Typographical Conventions 0 60 c cece teens xiv 1 2 AGMONIIONS x zo o T9 dupciie T Dodo nb 9 ioe seen eee bati R PE XV 2 INE BOCK Stmiclule voor aida cannons ai eee PEIUS RUIT M ete ERT XV 3 Request for ComMents 5 npn RrE amen cent a nan PRENNE bags xvi Installation MT 1 1 System Requirements seueeeeeeeeess 2 1 1 Hardware Requirements mer m repr tape Er ARE Rn pA ease Rus 2 1 2 Software Requirements 0 0000 c cece eee ete 3 2 Installing BitDefender uuseuuuueueeeeeees 4 2 1 Registration Wizard ceini nnna e e a aa N SEU a ANTEE BANE AE EINNA 6 2 1 1 Step 1 2 Register BitDefender Internet Security 2009 7 2 1 2 Step 2 2 Create a BitDefender Account 8
141. e network bitdefender Buy My Account Register Help Support History Network To be able to manage the BitDefender products installed on your home computers you must follow these steps 1 Join the BitDefender home network on your computer Joining the network consists in configuring an administrative password for the home network management 2 Goto each computer you want to manage and join the network set the password 3 Go back to your computer and add the computers you want to manage 10 1 Tasks Initially one button is available only Network 94 BitDefender Internet Security 2009 m Join Create Network allows you to set the network password thus entering the network After joining the network several more buttons will appear m Leave Network allows you to leave the network m Manage Network allows you to add computer to your network Scan All allows you to scan all managed computers at the same time m Update All allows you to update all managed computers at the same time m Register All allows you to register all managed computers at the same time 10 1 1 Joining the BitDefender Network To join the BitDefender home network follow these steps 1 Click Join Create network You will be prompted to configure the home management password BitDefender x Enter the home management password The password should be at least 8 characters long Enter password eeeeccce
142. e reboot during the next step an update of the BitDefender engines will be performed in order to protect your computer against the latest threats m Run a quick system scan may require reboot during the next step a quick system scan will be run so as to allow BitDefender to make sure that your files from the windows and Program Files folders are not infected Run a full system scan every day at 2 AM runs a full system scan every day at 2 AM Important We recommend that you have these options enabled before moving on to the next step in order to ensure the security of your system Installing BitDefender 20 BitDefender Internet Security 2009 If you select only the last option or no option at all you will skip the next step Click Next to continue 2 2 8 Step 8 9 Wait for the Tasks to Complete Bit Defender Internet Security 2009 BitDefender Configuration Wizard Step 8 of 9 Step BitDefender Update BitDefender will perform the task selected during the previous step Below you can check the status For the Update process As soon as the update pracess will finish an On demand scan will start You can clilck next and finish this wizard the scanning task will run in background Status No update available File 0 Okb Total Update 0 Okb bitdefender a NN Task Status Wait for the task s to complete You can see the status of the task s selected in the previous step Click Next to continue
143. e scan 2 You can see the number of issues affecting your system The issues are displayed in groups Click the box to open a group or the box to close a group You can choose an overall action to be taken for each group of issues or you can select separate actions for each issue BitDefender Rescue CD Howto 291 BitDefender Internet Security 2009 3 You can see the results summary If you want to scan certain directory only do as follow Browse your folders right click a file or directory and select Send to Then choose BitDefender Scanner Or you can issue the next command as root from a terminal The BitDefender Antivirus Scanner will start with the selected file or folder as default location to scan bdscan path to scan 29 4 How do configure the Internet connection If you re in a DHCP network and you have an ethernet network card the Internet connection should already be detected and configured For a manual configuration follow the next steps 1 Double click the Network Connections shortcut on the Desktop The following window will appear Current state Online eth0 Please select modemlink ce configure dev modem device netcardconfig LAN or wireless access gprsconnect Dial via cellphone GPRS pppoeconf Dial via DSL adapter VK X wit Network Connections 2 Select the type of connection you are using and click OK Connection Description modeml
144. e task to run at system startup You can specify how long after the startup the task should start running in minutes Note 65 Since the Deep System Scan and Full System Scan tasks analyze the entire system the scanning may take a while Therefore we recommend you to run these tasks on low priority or better when your system is idle m User tasks contains the user defined tasks A task called My Documents is provided Use this task to scan important current user folders My Documents Desktop and StartUp This will ensure the safety of your documents a safe workspace and clean applications running at startup m Misc tasks contains a list of miscellaneous scan tasks These scan tasks refer to alternative scanning types that cannot be run from this window You can only modify their settings or view the scan reports Three buttons are available to the right of each task Antivirus 133 BitDefender Internet Security 2009 m L Schedule indicates that the selected task is scheduled for later Click this button to open the Properties window Scheduler tab where you can see the task schedule and modify it m L2 Delete removes the selected task Note Not available for system tasks You cannot remove a system task G Scan Now runs the selected task initiating an immediate scan To the left of each task you can see the Properties button that allows you to configure the task and view the scan logs 16 2 2
145. ections 1 Vulnerability bity Default Action Encryption gt Allow All Game Mode GamejLaptop Mode Allow Known Programs Network Advanced Settings Update Report Registration Deny All Incoming 32 ARA ERE RAEN AEA HI iN Pi Hb mu P b a 120 605 Os Q Sbitdefender Buy My Account Register Help Support Histor Firewall Settings You can see whether the BitDefender firewall is enabled or disabled If you want to change the firewall status clear or select the corresponding check box Important e To be protected against Internet attacks keep the Firewall enabled There are two categories of information m Network Configuration Brief You can see your computer s name its IP address and the default gateway If you have more than one network adapter meaning that you are connected to more than one network you will see the IP address and the gateway configured for each network adapter m Statistics You can see various statistics regarding the firewall activity number of bytes sent Firewall 217 BitDefender Internet Security 2009 number of bytes received number of port scans detected and blocked by BitDefender Port scans are frequently used by hackers to find open ports on your computer with the intent of exploiting them number of packets dropped number of open ports number of active incoming connections number of active outgoing connections
146. ecurity This is where you can enable disable real time file protection or the automatic update Online security This is where you can enable disable real time mail and web protection Parental control This is where you can enable disable parental control settings Network security This is where you can enable disable firewall Basic Settings 102 BitDefender Internet Security 2009 General settings This is where you can enable disable game mode laptop mode passwords scan activity bar and more Click the box labeled to open a category or click the one labeled to close it 11 1 Local security You can enable disable security modules with one click Real Time Antivirus Real time file protection ensures that all files are scanned as amp Antispyware File they are accessed by you or by an application running on this Protection system Automatic Update Automatic update ensures that the newest BitDefender product and signature files are downloaded and installed automatically on a regular base Automatic Automatic vulnerability check ensures that crucial software on Vulnerability Check your PC are up to date 11 2 Online security You can enable disable security modules with one click Real Time Real time mail protection ensures that your e mails are filtered Antivirus for spam and scanned for phishing attempts Antispam amp Antiphishing Mail Protection Real Time Antivirus Real time web pr
147. ed locked the drive letter and the full path of the vault The table at the bottom displays the content of the selected vault 21 2 1 Creating a Vault To create a new vault use any of these methods m Click Create vault m Right click in the vaults table and select Create m Right click on your Desktop or in a folder on your computer point to BitDefender File Vault and select Create Encryption 238 BitDefender Internet Security 2009 A new window will appear BitDefender 2009 Create Vault The full path of the vault file on disk C Documents and SettingslvdanciulDesktoplgigilgigi bvd Browse Drive letter G v Password eecccccee v Format drive The password must be at least 8 characters length Vault size MB 50 2 e MT a Create File Vault Proceed as follows 1 Specify the location and the name of the vault file m Click Browse select the location of the vault and save the vault file under the desired name m Type the full path of the vault file on the disk 2 Choose a drive letter from the menu When you open the vault a virtual disk drive labeled with the selected letter appears in My Computer 3 Type the vault password in the Password field Anyone trying to open the vault and access its files must provide the password 4 Select Format drive to format the virtual drive assigned to the vault 5 If you want to change the default siz
148. ed mounted or to the step 4 if it is locked unmounted If you click Select an existing File Vault then you must click the desired vault name You will go either to the step 5 if the selected vault is opened mounted or to the step 4 if it is locked unmounted Select Create New File Vault if none of the existing vaults are suitable for your needs You will go to the step 3 Click Next Step 3 6 Create Vault This is where you can specify information for the new Vault File Vault 77 BitDefender Internet Security 2009 Bit Defender Internet Security 2009 Max File Vault Step 3 of 6 SER Meek MRR Step 4 Enter password Step 5 Summary Step 6 Results Create Vault Specify the new Vault creation informations Enter path for the File Vault L Browse Drive Letter Lor Enter password for the File Vault The password must have at least 8 characters Confirm password for the File Vault Enter Vault size MB 150 The size must contain only digits Q Cancels the wizard without any further changes 2 Cbitdefender Back Next Cancel Create Vault To complete the file vault related information follow these steps 1 Click Browse and choose a location for the bva file Note Remember that the file vault is an encrypted file on your computer with the bvd extension 2 Select a drive letter for the new file vault from the corresponding drop down menu Note Remember that when you mount the bvd
149. efox You can easily and efficiently manage antiphishing protection and the White List using the BitDefender Antiphishing toolbar integrated into one of the above web browsers Getting Started 48 BitDefender Internet Security 2009 The antiphishing toolbar represented by the BitDefender icon is located on the topside of browser Click it in order to open the toolbar menu Note i If you cannot see the toolbar open the View menu point to Toolbars and check BitDefender Toolbar Antivirus software BitDefender The future of security now Windows Internet Explorer Ge IB http www bitdefender com x 8 X Fie Edit View Favorites Tools Help Bitdefender um Disable ed software BitDefender The future of secur em B ih B Page a Tools Add to White List My BitDefender ContactUs Forum W Cart View White List efender Help All Countries Regions x Search Go About Company Defense Center Downloads Solutions Support Partners Antiphishing Toolbar The following commands are available on the toolbar menu m Enable Disable enables disables the BitDefender Antiphishing toolbar Note C3 If you choose to disable the antiphishing toolbar you will no longer be protected against phishing attempts m Settings opens a window where you can specify the antiphishing toolbar s settings The following options are available Enable Scanning enables antiphish
150. enabled Admin Strong Indicates the password s strength for specific users Password When the status buttons are green the security risk of your system is at a minimum To turn the buttons green follow these steps 1 Click the Fix buttons to fix security vulnerabilities one by one 2 If one issue is not fixed on the spot follow the wizard to fix it If you want to exclude an issue from monitoring just clear the Yes monitor this component checkbox Security 59 7 2 Tasks BitDefender Internet Security 2009 This is where you can find links to the most important security tasks full system scan deep scan update now The following buttons are available m Full System Scan starts a full scan of your computer archives excluded m Deep Scan starts a full scan of your computer archives included m Scan My Documents starts a quick scan of your documents and settings m Update Now starts an immediate update m Vulnerability Scan 7 2 1 Scanning with BitDefender To scan your computer for malware run a particular scan task by clicking the corresponding button The following table presents the available scan tasks along with their description Full System Scan Deep Scan Scan My Documents Scans the entire system except for archives In the default configuration it scans for all types of malware threatening your system s security such as viruses spyware adware rootkits and others Sca
151. ental m Web Control to filter web navigation according to the rules set by you in the Web section m Applications Control to block access to the applications specified by you in the Applications section Control 184 BitDefender Internet Security 2009 m Instant Messaging Control to allow or block chat with IM contacts according to the rules set by you in the IM Traffic section m Web Time Limiter to allow web access according to the timetable set by you in the Time Limiter section m Web Access to block access to all websites not just the ones in the Web section m Keyword Filtering to filter web mail and instant messaging access according to the rules set by you in the Keywords section m Heuristic web filter to filter web access according to pre established rules based on age categories 4 In order to fully benefit from the features offered by the Parental Control you must configure the selected controls To learn how to configure them please refer to the following topics in this chapter 18 1 1 Protecting Parental Control Settings If you are not the only person with administrative rights using this computer it is recommended that you protect your Parental Control settings with a password By setting a password you will prevent other users with administrative rights from changing the Parental Control settings that you configured for a specific user BitDefender will ask you by default to set a pas
152. entity rules Let s consider the case when you create a rule that prevents your credit card number from being sent over HTTP web Whenever your credit card number is submitted on a website from your user account the respective page is blocked If you want for example to buy footwear from an online shop which you know to be secure you will have to specify an exception to the respective rule To open the window where you can manage exceptions click Exceptions Privacy Control 205 BitDefender Internet Security 2009 Exceptions x Allowed Web e mail address Exception type ie Ge Q o Exceptions To add an exception follow these steps 1 Click Add to add a new entry in the table 2 Double click Specify allowed address and provide the web site the e mail address or the IM contact that you want to add as exception 3 Double click Choose type and choose from the menu the option corresponding to the type of address previously provided m f you have specified a web address select HTTP m f you have specified an e mail address select SMTP m f you have specified an IM contact select IM To remove an exception from the list select it and click Remove Click OK to save the changes 19 2 3 Managing Rules You can see the rules created so far listed in the table To delete a rule select it and click the Delete button Privacy Control 206 BitDefender Internet Security 2009 To edit a rule
153. er a certain piece of mail should make it to your Inbox or not Every e mail that comes from the Internet is first checked with the Friends list Spammers list filter If the sender s address is found in the Friends list the e mail is moved directly to your Inbox Otherwise the Spammers list filter will take over the e mail to verify if the sender s address is on its list The e mail will be tagged as SPAM and moved in the Spam folder located in Microsoft Outlook if a match has been made Else the Charset filter will check if the e mail is written in Cyrillic or Asian characters If so the e mail will be tagged as SPAM and moved in the Spam folder If the e mail is not written in Asian or Cyrillic it will be passed to the Image filter The Image filter will detect all the e mail messages containing attached images with spam content The URL filter will look for links and it will compare the links found with the links from the BitDefender database In case of a match it will add a SPAM score to the e mail The NeuNet Heuristic filter will take over the e mail and will perform a set of tests on all the message components looking for words phrases links or other characteristics of SPAM The result is that it will add a Spam score to the e mail too Note 63 If the e mail is tagged as SEXUALLY EXPLICIT in the subject line BitDefender will consider it SPAM The Bayesian filter module will further analyze the message according to statis
154. er chat application that supports Yahoo Messenger or MSN To configure instant messaging encryption go to Encryption gt IM Encryption in the Advanced View e Note You can easily configure instant messaging encryption using the BitDefender toolbar from the chat window For more information please refer to Integration into Messenger p 50 Encryption 235 BitDefender Internet Security 2009 BitDefender Internet Security 2009 Trial HE STATUS There is 1 pending issue IM Encryption File Vault General Antivirus V IM Encryption is enabled v Yahoo Messenger Encryption is enabled Antispam 5 w Windows Live MSN Messenger Encryption is enabled arental Control Encryption Exclusions Privacy Control i r Firewall User ID IM Program Vulnerability Encryption Game Laptop Mode Network Update Registration span Current Connections User ID IM Program Encryption Status IM encryption ensures that your instant messenging conversations over Yahoo Messenger or Windows Live MSN Messenger remain private Conversations are encrypted only if both you and your contact have BitDefender 2009 installed Sbitdefender Buy My Account Register Help Support Histor Instant Messaging Encryption By default IM Encryption is enabled for both Yahoo Messenger and Windows Live MSN Messenger You can choose to disable IM Encryption for a specific chat application only or c
155. er to BitDefender Scanner p 150 Contextual Scanning To scan a file or a folder without configuring a new scan task you can use the contextual menu This is called contextual scanning Open Right click the file or folder you want to be scanned and select BitDefender Antivirus 2009 Explore The BitDefender Scanner will appear and the scanning Search Sharing and Security will be initiated For more information please refer to Scen with BitDefender 2009 BitDefender Scanner p 150 Send To t BitDefender File vault Cut Copy You can modify the scan options and see the report files by accessing the Properties window of the Contextual Menu Scan task Create Shortcut Delete Rename Properties Contextual Scan Drag amp Drop Scanning Drag the file or folder you want to be scanned and drop it over the Scan Activity Bar as shown below Antivirus 148 BitDefender Internet Security 2009 Drop File The BitDefender Scanner will appear and the scanning will be initiated For more information please refer to BitDefender Scanner p 150 Manual Scanning Manual scanning consists in directly selecting the object to be scanned using the BitDefender Manual Scan option from the BitDefender program group in the Start Menu Note Manual scanning is very useful as it can be performed when Windows works in Safe Mode too To select the object to be scanned b
156. er to the ChkRootKit homepage Nessus Network Scanner Nessus is a remote security scanner for Linux Solaris FreeBSD and Mac OS X For more information please refer to the Nessus homepage Iptraf Iptraf is an IP Network Monitoring Software For more information please refer to the Iptraf homepage Iftop Iftop displays bandwidth usage on an interface For more information please refer to the Iftop homepage MTR MTR is a network diagnostic tool For more information please refer to the MTR homepage PPPStatus PPPStatus displays statistics about the incoming and outgoing TCP IP traffic For more information please refer to the PPPStatus homepage Wavemon Wavemon is a monitoring application for wireless network devices For more information please refer to the Wavemon homepage USBView USBView displays information about devices connected to the USB bus For more information please refer to the USBView homepage Pppconfig Pppconfig helps automatically setting up a dial up ppp connection DSL PPPoe DSL PPPoe configures a PPPoE ADSL connection 1810rotate 1810rotate toggles the video output on i810 hardware using i810switch 1 For more information please refer to the 1810rotate homepage Overview 287 BitDefender Internet Security 2009 Mutt Mutt is a powerful text based MIME mail client For more information please refer to the Mutt homepage Mozilla Firefox Mozilla Firefox is a well
157. erability Encryption Game Laptop Mode Network Update Registration Q bitdefender Identity Control Status Identity Reaistry Cookie Script v Identity protection Total attempts blocked 0 Rule Name Rule Type H Smtp IM Whole words Matchcase Description credit card credit yes yes no yes no Buy My Account Register Help Support Histor If you want to use Identity Control follow these steps 1 Select the Identity Control check box 2 Create rules to protect your sensitive data For more information please refer to Creating Identity Rules p 202 3 If needed define specific exceptions to the rules you have created For more information please refer to Defining Exceptions p 205 Privacy Control 201 BitDefender Internet Security 2009 19 2 1 Creating Identity Rules To create an identity protection rule click the Add button and follow the configuration wizard Step 1 4 Welcome Window BitDefender Wizard The Identity Control module monitors the HTTP web and SMTP mail 8 traffic flowing out of your computer for what might be personal information such as credit card numbers SSN s and other user defined strings e g bits of passwords This wizard will take you through the steps required to create Identity Control rules It can also be accessed from the Settings gt Privacy Control gt Advanced Settings window by clicking the Add rule icon
158. erating system is not working properly because of virus infections That usually happens when you don t use an antivirus product The update of the virus signatures is made automatically without user intervention each time you start the BitDefender Rescue CD BitDefender Rescue CD is a BitDefender re mastered Knoppix distribution which integrates the latest BitDefender for Linux security solution into the GNU Linux Knoppix Live CD offering a desktop antivirus which can scan and disinfect existing hard drives including Windows NTFS partitions At the same time BitDefender Rescue CD can be used to restore your valuable data when you cannot boot Windows Note BitDefender Rescue CD can be downloaded from this location http download bitdefender com rescue_cd 28 1 System Requirements Before booting BitDefender Rescue CD you must first verify if your system meets the following requirements Processor type x86 compatible minimum 166 MHz but do not expect a great performance in this case An i686 generation processor at 800MHz would make a better choice Memory Minimum 512 MB of RAM Memory 1 GB recommended CD ROM BitDefender Rescue CD runs from a CD ROM therefore a CD ROM and a BIOS capable to boot from it is required Internet connection Although BitDefender Rescue CD will run with no Internet connection the update procedures will require an active HTTP link even through some proxy server Therefore for an up to date
159. erformed by BitDefender on your system 5 3 BitDefender Icon in the System Tray To manage the entire product more quickly you can also use the BitDefender Icon in the System Tray If you double click this icon the BitDefender will open Also by right clicking the icon a contextual menu will allow you to quickly manage the BitDefender product bag About m Show opens the BitDefender A m Help opens the help file that explained the BitDefender Update Now Internet Security 2009 in detail Basic Settings m About opens the BitDefender web page i m Fix all issues helps you remove security vulnerabilities BitDefender Icon m Turn on off Game Mode turns Game Mode on off m Update now starts an immediate update A new window will appear where you can see the update status m Basic settings allows you to easily enable or disable important security modules A new window will appear where you can activate inactivate them with a simple click While in Game Mode you can see the letter G over the BitDefender icon If there are critical issues affecting the security of your system an exclamation mark is displayed over the fi BitDefender icon You can hover the mouse over the icon to see the number of issues affecting the system s security Getting Started 32 5 4 5 5 BitDefender Internet Security 2009 Scan Activity Bar The Scan activity bar is a graphic visualization of the scanning activity
160. es all IP protocols TCP Transmission Control Protocol TCP enables two hosts to establish a connection and exchange streams of data TCP guarantees delivery of data and also guarantees that packets will be delivered in the same order in which they were sent UDP User Datagram Protocol UDP is an IP based transport designed for high performance Games and other video based applications often use UDP A number Represents a specific IP protocol other than TCP and UDP You can find the complete list of assigned IP protocol numbers at www iana org assignments protocol numbers m Network Events the network events the rule applies to The following events may be taken into account Connect Preliminary exchange of standard messages used by connection oriented protocols such as TCP to establish a connection With connection oriented protocols data traffic between two computers occurs only after a connection is established Traffic Flow of data between two computers Listen State in which an application monitors the network awaiting to establish a connection or to receive information from a peer application m Local Ports the ports on your computer the rule applies to m Remote Ports the ports on the remote computers the rule applies to m Local whether the rule applies only to computers in the local network Action whether the application is allowed or denied access to network or Internet under the specified circumstances
161. ets VB Scripts Malicious scripts can compromise your system It is recommended that you block scripts From all domains you do not trust Sbitdefender Buy My Account Register Help Support Histor Script Control You can see the rules created so far listed in the table Important The rules are listed in order of their priority starting from the top meaning the first rule has the highest priority Drag amp drop rules in order to change their priority To delete a rule select it and click the Delete button To modify the rule parameters double click the rule and make the desired changes in the configuration window To manually create a rule click the Add button and configure the rule parameters in the configuration window 19 5 1 Configuration Window When you edit or manually add a rule the configuration window will appear Privacy Control 214 BitDefender Internet Security 2009 Select Address and Action Enter domain Select action 9 Permit Deny Select the specific domain s that you want to allow or block scripting for Generally you should use this wizard to specify the domains you want to permit scripting from It is recommended that you block scripts from all domains you don t explicitly trust Q NT Select Address and Action You can set the parameters m Domain address type in the domain on which the rule should apply Action select the action of the rule Ac
162. ffic according to the rules you create in the Identity section m Registry Control asks for your permission whenever a program tries to modify a registry entry in order to be executed at Windows start up m Cookie Control asks for your permission whenever a new website tries to set a cookie m Script Control asks for your permission whenever a website tries to activate a script or other active content At the bottom of the section you can see the Privacy Control statistics 19 1 1 Configuring Protection Level You can choose the protection level that better fits your security needs Drag the slider along the scale to set the appropriate protection level There are 3 protection levels Permissive Only Registry control is enabled Default Registry control and Identity Control are enabled Aggressive Registry control Identity Control and Script Control are enabled You can customize the protection level by clicking Custom level In the window that will appear select the protection controls you want to enable and click OK Click Default Level to position the slider at the default level Privacy Control 199 BitDefender Internet Security 2009 19 2 Identity Control Keeping confidential data safe is an important issue that bothers us all Data theft has kept pace with the development of Internet communications and it makes use of new methods of fooling people into giving away private information Whether it is
163. for vulnerabilities Vulnerability 246 BitDefender Internet Security 2009 Step 3 6 Change Weak Passwords Bit Defender Internet Security 2009 AL Vulnerability Scan EZE Step 3 Passwords Step 4 Applications Step 5 Windows Step 6 Finish User Passwords User Name Strength Status Administrator Strong Ok cosmin Weak Fix This is a list of the Windows accounts passwords set on your computer and the level of protection that they provide Click the Fix button to modify a the weak passwords bitdefender izes User Passwords You can see the list of the Windows user accounts configured on your computer and the level of protection their password provides Click Fix to modify the weak passwords A new window will appear BitDefender Choose method to fix Force user to change password at next login Q Change user password Type password Confirm password For cose Change Password Vulnerability 247 BitDefender Internet Security 2009 Select the method to fix this issue m Force user to change password at next login BitDefender will prompt the user to change the password the next time the user logs on to Windows m Change user password You must type the new password in the edit fields Note For a strong password use a combination of uppercase and lowercase letters numbers and special characters such as or Click OK to change the password Click Next Step 4 6
164. gistration Wizard The first time you start your computer after installation a registration wizard will appear The wizard helps you register BitDefender and configure a BitDefender account You MUST create a BitDefender account in order to receive BitDefender updates The BitDefender account also gives you access to free technical support and special offers and promotions If you loose your BitDefender license key you can log in to your account at http myaccount bitdefender com to retrieve it C Note If you do not want to follow this wizard click Cancel You can open the registration wizard anytime you want by clicking the Register link located at the bottom of the user interface Installing BitDefender 6 BitDefender Internet Security 2009 2 1 1 Step 1 2 Register BitDefender Internet Security 2009 Bit Defender Internet Security 2009 BitDefender Registration Wizard Step 1 of 2 Welcome to the BitDefender Registration Wizard This wizard will help you register BitDefender and create or update your BitDefender Account Your current BitDefender license status is Trial Your current BitDefender license key is BE1B409B7E067AD03090 This license key will expire in 30 days Licensing Options If you want to keep the current key please select the first option IF you want to add a new key please select the second option and fill the key in the box below Continue using the current key Iwant to register the p
165. green OK status button is displayed Issue Description Vulnerability check Monitors Microsoft Windows Updates Microsoft Windows Office is enabled Updates and Microsoft Windows accounts passwords to ensure that your OS is up to date and is not vulnerable to password bypass Critical Microsoft Install available critical Microsoft updates updates Other Microsoft Install available non critical Microsoft updates updates Windows Install new Windows security updates as soon as they become Automatic Updates available is enabled Admin Strong Indicates the password s strength for specific users Password When the status buttons are green the security risk of your system is at a minimum To turn the buttons green follow these steps 1 Click the Fix buttons to fix security vulnerabilities one by one 2 If one issue is not fixed on the spot follow the wizard to fix it If you want to exclude an issue from monitoring just clear the Yes monitor this component checkbox Status Bar 109 BitDefender Internet Security 2009 13 Registration BitDefender Internet Security 2009 comes with 30 day trial period If you want to register BitDefender Internet Security 2009 to change the license key or to create a BitDefender account click the Register link located at the bottom of the BitDefender window The registration wizard will appear 13 1 Step 1 1 Register BitDefender Internet Security 2009 Bit Defender Internet
166. hat your antispam filter has begun to lose efficiency This may be due to improper training i e you have mistakenly tagged a number of legitimate messages as spam or vice versa If your filter is very inaccurate you may need to wipe the filter database and retrain the filter by following the next steps of this wizard Select Wipe antispam filter database if you want to reset the Bayesian database Use the amp Save Bayes Load Bayes buttons to save load the Bayesian database list to a desired location The file will have dat extension Select Skip this step if you want to pass over this step Click Back to go to the previous step or click Next to continue the wizard Getting Started 45 Step 4 6 Train Bayesian Filter with Legitimate Mail BitDefender 2009 Train the Bayesian Filter on Existing E mail Step 4 of 6 Train the Bayesian Filter on Existing E mail You can choose a specific folder to be used by the Bayesian Filter as reference For non spam BitDefender Internet Security 2009 Outlook EQ Deleted Items s CARE 3 Outbox Sent Items Calendar Contacts Journal Notes as iv vi Include subfolders v Automatically add to Friends list Skip this step Q bitdefender Train Bayesian Filter with Legitimate Mail Please select a folder that contains legitimate e mail messages These messages will be used to train the antispam filter There are two advan
167. he Import email addresses from drop down menu For Microsoft Outlook Express Windows Mail a new window will appear from where you can select the folder that contains the e mail addresses you want to add to the Friends list Choose them and click Select In both cases the e mail addresses will appear in the import list Select the desired ones and click 2 to add them to the Friends list If you click amp all the e mail addresses will be added to the list To delete an item from the list select it and click Remove button If you click amp Clear list button you will delete all entries from the list but notice it is impossible to recover them Use the amp Save Load buttons to save load the Friends list to a desired location The file will have bw1 extension To reset the content of the current list when you load a previously saved list select When load empty current list Note We recommend that you add your friends names and e mail addresses to the Friends list BitDefender does not block messages from those on the list therefore adding friends helps ensure that legitimate messages get through Click Apply and OK to save and close the Friends list m Settings opens the Settings window where you can specify some options for the Antispam module Getting Started 41 BitDefender Internet Security 2009 BitDefender 2009 Antispam Settings x Settings Alerts Configure Antispam rule v
168. hen the computer first starts a reminder calendar or application programs can be startup items Normally an alias of a file is placed in this folder rather than the file itself System tray Introduced with Windows 95 the system tray is located in the Windows taskbar usually at the bottom next to the clock and contains miniature icons for easy access to system functions such as fax printer modem volume and more Double click or right click an icon to view and access the details and controls TCP IP Glossary Transmission Control Protocol Internet Protocol A set of networking protocols widely used on the Internet that provides communications across interconnected networks of computers with diverse hardware architectures and various operating systems TCP IP includes standards for how computers communicate and conventions for connecting networks and routing traffic 302 BitDefender Internet Security 2009 Trojan A destructive program that masquerades as a benign application Unlike viruses Trojan horses do not replicate themselves but they can be just as destructive One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer The term comes from a story in Homer s Iliad in which the Greeks give a giant wooden horse to their foes the Trojans ostensibly as a peace offering But after the Trojans drag the horse inside their ci
169. here are many more Path The exact directions to a file on a computer These directions are usually described by means of the hierarchical filing system from the top down The route between any two points such as the communications channel between two computers Phishing The act of sending an e mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft The e mail directs the user to visit a Web site where they are asked to update personal information such as Glossary 300 BitDefender Internet Security 2009 passwords and credit card social security and bank account numbers that the legitimate organization already has The Web site however is bogus and set up only to steal the user s information Polymorphic virus A virus that changes its form with each file it infects Since they have no consistent binary pattern such viruses are hard to identify Port An interface on a computer to which you can connect a device Personal computers have various types of ports Internally there are several ports for connecting disk drives display screens and keyboards Externally personal computers have ports for connecting modems printers mice and other peripheral devices In TCP IP and UDP networks an endpoint to a logical connection The port number identifies what type of port it is For example port 80 i
170. hese steps 1 2 3 4 5 Click Switch to Advanced View if you are in Basic View Click Game Laptop Mode from the left side menu Click the Game Mode tab Click the Advanced Settings button Under the Use HotKey option set the desired hotkey m Choose the modifier keys you want to use by checking one the following Control key Ctr1 Shift key Shift or Alternate key Alt m In the edit field type the letter corresponding to the regular key you want to use For example if you want to use the Ctr1 Alt D hotkey you must check only Ctrl and Alt and type D Note Removing the checkmark next to Use HotKey will disable the hotkey 5 7 Integration into Mail Clients BitDefender integrates directly through an intuitive and easy to use toolbar into the following mail clients m Microsoft Outlook m Outlook Express m Windows Mail m Mozilla Thunderbird 5 7 1 Antispam Toolbar At the topside of your mail client you can see the Antispam toolbar Getting Started 35 BitDefender Internet Security 2009 El D g From i X bfcoi com 5 Date Today ntation bitdefender ats E BtDefender txt IE E Drafts ATTENTION ALL DAY a INVESOTR ALERT IT LOOKS LIKE ANOTHER WATCH SWNM LIKE A HA E Inbox Junk E mail 105 A Outbox Company Name SOUT y N Antispam Toolbar Important The difference between BitDefender Antispam for Microsoft Outlook or Outlook Express Window
171. hey disappear The same thing happens to all statistics corresponding to an application which generates traffic or has open ports and which you close For a comprehensive list of events regarding the Firewall module usage enabling disabling firewall traffic blocking modifying settings or generated by the activities detected by this module scanning ports blocking connection attempts or traffic according to the rules view the BitDefender Firewall log file by clicking Show Log The file is located in the Common Files folder of the current Windows user under the path BitDefender BitDefender Firewall bdfirewall txt If you want the log to contain more information select Increase log verbosity 234 BitDefender Internet Security 2009 21 Encryption BitDefender offers encryption capabilities to protect your confidential documents and your instant messaging conversations through Yahoo Messenger and MSN Messenger 21 1 Instant Messaging IM Encryption By default BitDefender encrypts all your instant messaging chat sessions provided that m Your chat partner has a BitDefender version installed that supports IM Encryption and IM Encryption is enabled for the instant messaging application used for chatting m You and your chat partner use either Yahoo Messenger or Windows Live MSN Messenger Important BitDefender will not encrypt a conversation if a chat partner uses a web based chat application such as Meebo or oth
172. hose used for exploration in Windows Click the box with to open an option or the box with to close an option Note You can observe that some scan options although the sign appears cannot be opened The reason is that these options weren t selected yet You will observe that if you select them they can be opened m Scan accessed files and P2P transfers options scans the accessed files and the communications through Instant Messaging Software applications ICQ NetMeeting Yahoo Messenger MSN Messenger Further on select the type of the files you want to be scanned Option Description Scan Scan all files All the accessed files will be scanned accessed regardless their type files Scan program files Only the program files will be scanned This only means only the files with the following extensions exe bat com dll ocx Antivirus 124 Antivirus BitDefender Internet Security 2009 opin Desertor Scr bin dat 386 vxd sys wdm Cla class ovl ole exe hlp doc dot xls ppt wbk wiz pot ppa xla xlt vbs vbe mdb rtf htm hta html xml xtp php d8p 5 wshs chm lnk prf pro 2url smm pdf msi ini csc cmd bas eml and nws Scan user defined Only the files with the extensions specified by extensions Scan for riskware Scan boot Scan inside archives Scan packed files First action Deny access and continue Clean file Delete file
173. ies to If you want the rule to apply to all applications select Any Firewall 228 Firewall BitDefender Internet Security 2009 m Command line If you want the rule to apply only when the selected application is opened with a specific command in the Windows command line interface clear the Any check box and type the respective command in the edit field m Protocol Select from the menu the IP protocol the rule applies to If you want the rule to apply to all protocols select Any f you want the rule to apply to a specific protocol select Other An edit field will appear Type the number assigned to the protocol you want to filter in the edit field e m Events Note IP protocol numbers are assigned by the Internet Assigned Numbers Authority IANA You can find the complete list of assigned IP protocol numbers at www iana org assignments protocol numbers Depending on the selected protocol choose the network events the rule applies to The following events may be taken into account Event Description Connect Preliminary exchange of standard messages used by Traffic Listen connection oriented protocols such as TCP to establish a connection With connection oriented protocols data traffic between two computers occurs only after a connection is established Flow of data between two computers State in which an application monitors the network awaiting to establish a connection or to receive inf
174. if you want to change anything Q File Vault Wizard Add files to Vault 2 Cbitdefender Back Next Cancel Summary Click Next Step 6 6 Results This is where you can view the vault content File Vault 80 BitDefender Internet Security 2009 Bit Defender Internet Security 2009 Max File Vault Step 6 of 6 Step 1 Addfiles Step 2 Select vault Step 3 Create Vault Step 4Enter password Step 5 Summary step 6 Results Display Vault Content I Wew Rich Text Document rtf Rich Text Document I New Wordpad Document 2 doc Wordpad Document Q File Vault Wizard Add files to Vault a bitdefender Finish Results Click Finish 9 2 2 Removing Files from Vault By clicking Remove Vault Files a wizard will guide you through the process of removing files from a specific vault Step 1 5 Select Vault Here you can specify the vault to remove files from File Vault 81 BitDefender Internet Security 2009 Bit Defender Internet Security 2009 Max File Vault Step 1 of 5 Step 1 Select vault Step 2 Enter password Step 3 Select Files Step 4 Summary Step 5 Results Select Vault Please choose the Vault to remove files Browse for a Vault File Select an existing Vault File Vault Name File Path Opened Drive gigi E Documents and Settings test Desktop gigi bvd No dada E Documents and Settings test Desktop dada bvd Yes E Q File Vault Wizard Removes files from Vault x
175. ii BitDefender Internet Security 2009 24 2 Adding Computers to the BitDefender Network 200 260 24 3 Managing the BitDefender Network 0 000 cece e 262 25 Updat fos cision ascent m 265 25 1 Automatic Update z repetere E EEE a Win adt 265 25 1 1 Requesting am Update 2 cease taiii dana edad ae 267 25 1 2 Disabling Automatic Update sluuussellleseeelllees 267 25 2 Update Setlings s seite ira Oben EE E Poke waa ee hanes 268 25 2 1 Setting Update Locations 4sc0teeceri4aade E ENERET 269 25 2 2 Configuring Automatic Update scssi src hie taane a uon a 269 25 2 3 Configuring Manual Update 2d aacetgeedtesaaaeisees 270 25 2 4 Configuring Advanced Settings siir isrierisiinrire rrit inrit aas 270 25 2 5 Managing PFoXxies ssia nirera secede aana ZR E EE AE AAN 270 26 Registration cesis esee ako aae Rea RERERRERRRRRERRREA 273 26 1 Registering BitDefender Internet Security 2009 2 4 273 26 2 Creating a BitDefender Account 0 00 eee eee 275 Getting Help 1isuciueiad un nur pnta aii aln E una Sos QR nin 278 27 Support eeeeiere ea he ERR RARE RERRRRRNUREERERRAREREA 279 27 1 BitDefender Knowledge Base 00c cece cece teen eee eee 279 21 2 Asking fot Help 2 2cece cad o pRPRIEO PER UMORHUPUELRHEE UII NEUE EE RUP qe 280 21 2 1 Goto Web Sell SerVvi6B i xcocevipo
176. ill be prompted before installing it Update 269 BitDefender Internet Security 2009 25 2 3 Configuring Manual Update To specify how the manual update update by user request should be performed select one of the following options in the Manual Update Settings category m Silent update the manual update will be performed automatically in the background without user intervention m Prompt before downloading updates every time an update is available you will be prompted before downloading it 25 2 4 Configuring Advanced Settings To prevent the BitDefender update process from interfering with your work configure the options in the Advanced Settings category m Wait for reboot instead of prompting If an update requires a reboot the product will keep working with the old files until the system is rebooting The user will not be prompted for rebooting therefore the BitDefender update process will not interfere with the user s work m Don t update if scan is in progress BitDefender will not update if a scan process is running This way the BitDefender update process will not interfere with the scan tasks Note C3 If BitDefender is updated while a scan is in progress the scan process will be aborted m Don t update if game mode is on BitDefender will not update if the game mode is turned on In this way you can minimize the product s influence on system performance during games 25 2 5 Managing Proxies If
177. ill contain no confidential data such as your name or IP address and that they will not be used for commercial purposes By enabling this option reports regarding potential virus outbreaks are sent to BitDefender labs for analysis Please note that these reports will contain no confidential data such as your name or IP address and that they will not be used for commercial purposes 105 BitDefender Internet Security 2009 12 Status Bar As you can easily notice in the upper part of BitDefender Internet Security 2009 window there is a status bar displaying the number of pending issues Click the Fix All Issues button to easily remove any threats to your computer security A security status window will appear The security status displays a systematically organized and easily manageable list of security vulnerabilities on your computer BitDefender Internet Security 2009 will let you know whenever a problem can affect your computer s security BitDefender Fix All Issues x Real time file protection is enabled w Yes ok You have never scanned your computer for malware v Yes Fix Update performed today Yes oK Firewall is enabled w Yes OK 7 Online security Monitor Status Antispam is enabled w Yes oK Identity control is enabled Ne Not monitored Antiphishing Protection is enabled v Yes OK Parental Control Monitor Status Parental Control is not configured C Ne Not monitored Administrator Administ
178. in associated materials are the property of their respective owners The license will terminate immediately without notice if you are in breach of any of its terms and conditions You shall not be entitled to a refund from BITDEFENDER or any resellers of BitDefender as a result of termination The terms and conditions concerning confidentiality and restrictions on use shall remain in force even after any termination BITDEFENDER may revise these Terms at any time and the revised terms shall automatically apply to the corresponding versions of the Software distributed with the revised terms If any part of these Terms is found void and unenforceable it will not affect the validity of rest of the Terms which shall remain valid and enforceable In case of controversy or inconsistency between translations of these Terms to other languages the English version issued by BITDEFENDER shall prevail Contact BITDEFENDER at 24 Preciziei Boulevard West Gate Building H2 ground floor Sector 6 Bucharest Romania or at Tel No 40 21 206 34 70 or Fax 40 21 264 17 99 e mail address office bitdefender com End User Software License Agreement xiii BitDefender Internet Security 2009 Preface This guide is intended to all users who have chosen BitDefender Internet Security 2009 as a security solution for their personal computers The information presented in this book is suitable not only for computer literates it is accessible to everyone who
179. ing 00 cece ee eee 186 18 2 Web COMM eodeni orren paste ieue NORD OR E DOR DIPUS I PR FERRE 187 18 2 1 Configuration Wizard esee rnm nee been 188 18 2 2 Specify EXCeptions eoi sms tacts ed nREENIPINEREERA NEU peni 189 18 2 3 BitDefender Web Blacklist 5 000 ccc ee nnn 190 18 3 Applications Control more rr RRDUPES re Sprenger ee 191 18 3 1 Configuration Wizard secs tI rp er peor eee ee 192 18 4 Keyword Filtering tpe Ree E RES OrPeS DUIS eer p Oa REY ri 192 18 4 1 Configuration Window isssssssseeeee eee 193 18 5 Instant Messaging IM Control 0 00 ccc eee ee eee 194 18 5 4 Configuration WiIndOW x 3 5 55 e erm EDI Ren Ree RERO Ed 196 18 6 Web Time Limite uoo eoa ette dt Feria e Rd Reed es 196 19 Privacy Control oi cece cerit ERR RR 198 19 1 Privacy Control Status ee e se nda DRE Veniet orae Ra 198 19 1 1 Configuring Protection Level luuseelllseseslllleeenn 199 19 2 Identity Control 22e ero peu Ree ERR Oir RRIS qe EET ded Up b edRE 200 19 2 1 Creating Identity Rules elei eee b ead eee dee RE EGER ben 202 19 222 Defining EXGCeptionis i i aian nnda mee b Rx Re ERU ed 205 19 2 3 Managing RUES 4 Ee Deae ed Ree re d ue 206 19 3 Registry Control iat s ced ur enti exse ce een sen ded ente seat 207 19 4 Gookie Control 5er e m oe tre oe Ie ORAL CR I OG ARR 209 vii BitDefender Internet Security 2009 19 4 1 Configuration Windo
180. ing scanning Ask before adding to whitelist prompts you before adding a web site to the White List m Add to White List adds the current web site to the White List Note Adding a site to the White List means that BitDefender will not scan the site for phishing attempts anymore We recommend you to add to the White List only sites that you fully trust m View White List opens the White List Getting Started 49 5 9 BitDefender Internet Security 2009 You can see the list of all the web sites that are not checked by the BitDefender antiphishing engines If you want to remove a site from the White List so that you can be notified about any existing phishing threat on that page click the Remove button next to it You can add the sites that you fully trust to the White List so that they will not be scanned by the antiphishing engines anymore To add a site to the White List provide its address in the corresponding field and click Add m Help opens the help file m About opens a window where you can see information about BitDefender and where to look for help in case something unexpected appears Integration into Messenger BitDefender offers encryption capabilities to protect your confidential documents and your instant messaging conversations through Yahoo Messenger and MSN Messenger By default BitDefender encrypts all your instant messaging chat sessions provided that m Your chat partner has a BitDefender
181. ing to a specific vulnerability BitDefender will no longer notify you about the related issues Vulnerability 251 BitDefender Internet Security 2009 23 Game Laptop Mode The Game Laptop Mode module allows you to configure the special operation modes of BitDefender m Game Mode temporarily modifies the product settings so as to minimize the resource consumption when you play m Laptop Mode prevents scheduled tasks from running when the laptop is running on battery in order to save battery power 23 1 Game Mode Game Mode temporarily modifies protection settings so as to minimize their impact on system performance While in Game Mode the following settings are applied m All BitDefender alerts and pop ups are disabled m The BitDefender real time protection level is set to Permissive m The BitDefender firewall is set to Allow all This means that all new connections both incoming and outgoing are automatically allowed regardless of the port and protocol being used m Updates are not performed by default Note To change this setting go to Update gt Settings and clear the Don t update if Game Mode is on check box m Scheduled scan tasks are by default disabled By default BitDefender automatically enters Game Mode when you start a game from the BitDefender s list of known games or when an application goes to full screen You can manually enter Game Mode using the default Ctr1 Alt Shift G hotkey It is
182. ink Select this type of connection when you are using a modem and a telephone line to access the Internet BitDefender Rescue CD Howto 292 BitDefender Internet Security 2009 Connection Description netcardconfig Select this type of connection when you are using a local area network LAN to access the Internet It is also suitable for wireless connections gprsconnect Select this type of connection when you are accessing the Internet over a mobile phone network by using GPRS General Packet Radio Service protocol Of course you can use also a GPRS modem instead of a mobile phone pppoeconf Select this type of connection when you are using a DSL Digital Subscriber Line modem to access the Internet 3 Follow the on screen instructions If you re not sure what to write contact your system or network administrator for details Important Please be aware that you only activate the modem by selecting the above mentioned options To configure the network connection follow these steps 1 Right click the Desktop The BitDefender Rescue CD contextual menu will appear 2 Select Terminal as root 3 Type the following commands pppconfig 4 Follow the on screen instructions If you re not sure what to write contact your system or network administrator for details 29 5 How do update BitDefender At boot time the update of the virus signatures is made automatically But if you skipped this step here s how to
183. ions using the e mail address of your account Select one of the available options m Send me all messages from BitDefender m Send me only the most important messages m Don t send me any messages Click Finish l already have a BitDefender account BitDefender will automatically detect if you have previously registered a BitDefender account on your computer In this case provide the password of your account If you already have an active account but BitDefender does not detect it select Sign in to an existing BitDefender Account and provide the e mail address and the password of your account Registration 276 BitDefender Internet Security 2009 If you have forgotten your password click Forgot your password and follow the instructions Optionally BitDefender can inform you about special offers and promotions using the e mail address of your account Select one of the available options m Send me all messages from BitDefender m Send me only the most important messages m Don t send me any messages Click Finish Registration 277 BitDefender Internet Security 2009 Getting Help 278 BitDefender Internet Security 2009 27 Support As a valued provider BitDefender strives to provide its customers with an unparalleled level of fast and accurate support The Support Center which you can contact at the address provided below continually keeps up with the latest threats This is where all of your que
184. is or when the system is idle so as not to interfere with your work 16 2 1 Scan Tasks BitDefender comes with several tasks created by default which cover common security issues You can also create your own customized scan tasks Each task has a Properties window that allows you to configure the task and to see the scan results For more information please refer to Configuring Scan Tasks p 135 There are three categories of scan tasks Antivirus 132 BitDefender Internet Security 2009 m System tasks contains the list of default system tasks The following tasks are available Default Task Description Deep System Scan Scans the entire system In the default configuration it scans for all types of malware threatening your system s security such as viruses spyware adware rootkits and others Full System Scan Scans the entire system except for archives In the default configuration it scans for all types of malware threatening your system s security such as viruses spyware adware rootkits and others Quick System Scan Scans the Windows Program Files and All Users folders In the default configuration it scans for all types of malware except for rootkits but it does not scan memory the registry or cookies Autologon Scan Scans the items that are run when a user logs on to Windows By default the autologon scan is disabled If you want to use this task right click it select Schedule and set th
185. itDefender Desktop Profiles Logs user_0001 31216326177 3 00 xml Scan Paths Path 0000 E Documents and SettingsltestiDesktop Scan Log Example The scan log contains detailed information about the logged scanning process such as scanning options the scanning target the threats found and the actions taken on these threats 16 3 Objects Excluded from Scanning There are cases when you may need to exclude certain files from scanning For example you may want to exclude an EICAR test file from on access scanning or avi files from on demand scanning Antivirus 155 BitDefender Internet Security 2009 BitDefender allows excluding objects from on access or on demand scanning or from both This feature is intended to decrease scanning times and to avoid interference with your work Two types of objects can be excluded from scanning m Paths the file or the folder including all the objects it contains indicated by a specified path will be excluded from scanning m Extensions all files having a specific extension will be excluded from scanning Note The objects excluded from on access scanning will not be scanned no matter if they are accessed by you or by an application To see and manage the objects excluded from scanning go to Antivirus Exceptions in the Advanced View BitDefender Internet Security 2009 Trial SWITCH TO BASIC VIEW x STATUS There is 1 pending issue Ea Shield Virus Scan
186. k at all Postpone Task Run the scheduled task immediately after you exit Laptop Mode Game Laptop Mode 258 24 Network BitDefender Internet Security 2009 The Network module allows you to manage the BitDefender products installed on your home computers from a single computer BitDefender Internet Security 2009 Trial SWITCH TO BASIC VIEW X STATUS There is 1 pending issue mm Network General iam INTERNET Antivirus Pd Antispam Privacy Control Firewall vulnerability Encryption Game Laptop Mode Network Update Registration No PC click to add No PC click to add No PC click to add Qo Click here to manage your home network 2 bitdefender Network Map D Gn No gateway found No PC click to add C3 No PC click to add No PC click to add Join Create Network Buy My Account Register Help Support History To be able to manage the BitDefender products installed on your home computers you must follow these steps 1 Join the BitDefender home network on your computer Joining the network consists in configuring an administrative password for the home network management 2 Goto each computer you want to manage and join the network set the password 3 Go back to your computer and add the computers you want to manage Network 259 BitDefender Internet Security 2009 24 1 Joining the BitDefender Network To join the BitDefen
187. ke no action Solved issues count 4 File path Threat name Action result E kiturijkituri on home c Whereisit 3 51 WherelsIt exe Backdoor Bot 15122 deleted E System Volume Informatio 72B5CBOD RP260 40069234 exe Backdoor Bot 15122 deleted E muzicalscrisa dvd1 scris OPM 2 7 Loader launch exe Trojan Generic 227562 deleted E System Volume Informatio 72B5CBOD RP260 40069235 exe Trojan Generic 227562 deleted BitDefender has detected and blocked viruses on your computer This is the list of threats Please click the virus name to see its corresponding list of infected items bitdefender Actions You can see the number of issues affecting your system The infected objects are displayed in groups based on the malware they are infected with Click the link corresponding to a threat to find out more information about the infected objects You can choose an overall action to be taken for all issues or you can select separate actions for each group of issues The following options can appear on the menu Action Description Take No Action No action will be taken on the detected files Disinfect Disinfects infected files Delete Deletes detected files Unhide Makes hidden objects visible Antivirus 152 BitDefender Internet Security 2009 Click Continue to apply the specified actions Step 3 3 View Results When BitDefender finishes fixing the issues the scan results will appear in a new window
188. known web browser For more information please refer to the Mozilla Firefox homepage Elinks Elinks is a text mode web browser For more information please refer to the Elinks homepage Overview 288 BitDefender Internet Security 2009 29 BitDefender Rescue CD Howto This chapter contains information on how to start and stop the BitDefender Rescue CD scan your computer for malware as well as save data from your compromised Windows PC to a removable device However by using the software applications that come with the CD you can do many tasks the description of which goes far beyond the scope of this user s guide 29 1 Start BitDefender Rescue CD To start the CD set up the BIOS of your computer to boot off the CD put the CD in the drive and reboot the computer Make sure that your computer can boot from CD Wait until the next screen shows up and follow the on screen instructions to start BitDefender Rescue CD Note Select the language you want to use for the Rescue CD from the available list BitDefender Rescue CD based on Knoppix www hitdefender com Boot Splash Screen BitDefender Rescue CD Howto 289 BitDefender Internet Security 2009 At boot time the update of the virus signatures is made automatically This may take a while When the boot process has finished you will see the next desktop You may now start using BitDefender Rescue CD The Desktop 29 2 Stop BitDefender Rescue CD
189. l Last update My account Indicates the date when your BitDefender product was last updated Please perform regular updates in order to have a fully protected system Indicates the e mail address that you can use to access your on line account to recover your lost BitDefender license 116 BitDefender Internet Security 2009 tom Description key and to benefit from BitDefender support and other customized services Registration Indicates your license key type and status To keep your system safe you must renew or upgrade BitDefender if your key has expired Expires in Indicates the number of days left until the license key expires 15 2 Settings To configure general settings for BitDefender and to manage its settings go to General gt Settings in the Advanced View BitDefender Internet Security 2009 Trial zx Dashboard Settings SysInfo General Antivirus General Settings CJ Enable password protection for product settings vj Ask me if I want to configure a password when I enable Parental Control v Show BitDefender News security related notifications Firewall v Show pop ups on screen notes Vulnerability sis v Show popups in Advanced View Encryption E show popups in Basic view Game Laptop Mode v Load BitDefender at Windows startup Network ariel _ Enable the Scan Activity bar on screen graph of product activity Update Registration m Report Settings v Send virus rep
190. l form for all copies created irrespective of the media or form in which BitDefender exists You may not sub license rent sell lease or share the BitDefender license You may not reverse engineer recompile disassemble create derivative works modify translate or make any attempt to discover the source code for BitDefender LIMITED WARRANTY BITDEFENDER warrants that the media on which BitDefender is distributed is free from defects for a period of thirty days from the date of delivery of BitDefender to you Your sole remedy for a breach of this warranty will be that BITDEFENDER at its option may replace the defective media upon receipt of the damaged media or refund the money you paid for BitDefender BITDEFENDER does not warrant that BitDefender will be uninterrupted or error free or that the errors will End User Software License Agreement xi BitDefender Internet Security 2009 be corrected BITDEFENDER does not warrant that BitDefender will meet your requirements EXCEPT AS EXPRESSLY SET FORTH IN THIS AGREEMENT BITDEFENDER DISCLAIMS ALL OTHER WARRANTIES EXPRESS OR IMPLIED WITH RESPECT TO THE PRODUCTS ENHANCEMENTS MAINTENANCE OR SUPPORT RELATED THERETO OR ANY OTHER MATERIALS TANGIBLE OR INTANGIBLE OR SERVICES SUPPLIED BY HIM BITDEFENDER HEREBY EXPRESSLY DISCLAIMS ANY IMPLIED WARRANTIES AND CONDITIONS INCLUDING WITHOUT LIMITATION THE IMPLIED WARRANTIES OF MERCHANTABILITY FITNESS FOR A PARTICULAR PURPOSE TITLE NON
191. lays the update status your account status registration and license information General 115 15 1 1 Statistics 15 1 2 Overview BitDefender Internet Security 2009 m Filezone Indicates the evolution of the number of objects scanned by BitDefender Antimalware The height of the bar indicates the intensity of the traffic during that time interval m Netzone Indicates the evolution of the network traffic filtered by BitDefender Firewall The height of the bar indicates the intensity of the traffic during that time interval If you want to keep an eye on the BitDefender activity a good place to start is the Statistics section You can see the following items Item Description Scanned files Disinfected files Detected viruses Blocked port scans Indicates the number of files that were checked for malware at the time of your last scan Indicates the number of files that were disinfected at the time of your last scan Indicates the number of viruses that were found on your system at the time of your last scan Indicates the number of port scans blocked by BitDefender Firewall Port scans are frequently used by hackers to find open ports on your computer with the intent of exploiting them Keep Firewall and Stealth Mode enabled to be protected against port scans This is where you can see a summary of statistics regarding the update status your account status registration and license information Genera
192. ld Virus Scan Exclusions Quarantine General Antivirus Quarantine Folder Antispam E Parental File name Virus name Location Sent Privacy Control Firewall Vulnerability Encryption GamejLaptop Mode Network Update Registration Q This is where you can see a list of files that were quarantined during the last scans a Sbitdefender Buy My Account Register Help Support Histor Quarantine The Quarantine section displays all the files currently isolated in the Quarantine folder For each quarantined file you can see its name the name of the detected virus the path to its original location and the submission date Note When a virus is in quarantine it cannot do any harm because it cannot be executed or read 16 4 1 Managing Quarantined Files To delete a selected file from quarantine click the t Remove button If you want to restore a selected file to its original location click Restore You can send any selected file from the quarantine to the BitDefender Lab by clicking Send Antivirus 166 BitDefender Internet Security 2009 Contextual Menu A contextual menu is available allowing you to manage quarantined files easily The same options as those mentioned previously are available You can also select Refresh to refresh the Quarantine section 16 4 2 Configuring Quarantine Settings To configure the quarantine settings click Settings A new window will appear BitDefender Quarantine Settings x X
193. lding a Windows Account on this system In order to use this module you must enable and configure it Right click the name of the Windows Account to configure its corresponding Parental Control settings v I want to use Parental Control User List Status Administrator Teenager test Teenager Q bitdefender Pak e ee cancer Parental Control Configuration BitDefender Parental Control enables you to control the access to the Internet and to specific applications for each user holding a user account on the system If you want to use Parental Control follow these steps 1 Select want to use Parental Control 2 Right click the name of each Windows account and select the Parental Control profile to be applied Installing BitDefender 17 BitDefender Internet Security 2009 Child Offers restricted web access according to the recommended settings for users under the age of 14 Web pages with potentially harmful content for children porn sexuality drugs hacking etc are blocked Teenager Offers restricted web access according to the recommended settings for users from 14 to 18 years Web pages with sexual pornographic or adult content are blocked Adult Offers unrestricted access to all web pages regardless of their content Note To fully configure or disable Parental Control for specific Windows accounts start BitDefender switch to Advanced View and go to Parental Control You can configure P
194. le and faster updates you can configure two update locations a Primary update location and an Alternate update location By default these locations are the same http upgrade bitdefender com To modify one of the update locations provide the URL of the local mirror in the URL field corresponding to the location you want to change Note e We recommend you to set as primary update location the local mirror and to leave the I alternate update location unchanged as a fail safe plan in case the local mirror becomes unavailable In case the company uses a proxy server to connect to the Internet check Use proxy and then click Manage proxies to configure the proxy settings For more information please refer to Managing Proxies p 270 25 2 2 Configuring Automatic Update To configure the update process performed automatically by BitDefender use the options in the Automatic Update Settings category You can specify the number of hours between two consecutive checks for updates in the Time interval field By default the update time interval is set to 1 hour To specify how the automatic update process should be performed select one of the following options m Silent update BitDefender automatically downloads and implements the update m Prompt before downloading updates every time an update is available you will be prompted before downloading it m Prompt before installing updates every time an update was downloaded you w
195. license key Account 1 CD Rom label Your current BitDefender license status is Trial Your current BitDefender license key is BE1B409B7E067AD03090 This license key will expire in 30 days 2 Product registration card Licensing Options If you want to keep the current key please select the first option If you want to add a new key please select the second option and fill the key in the box below J Continue using the current key I want to register the product with a new key 3 Online purchase e mail oe Enter a new license key AR Buy a license key If you want to buy a license key please visit our online store at Renew Your BitDefender license Key Q Cbitdefender a Registration You can see the BitDefender registration status the current license key and how many days are left until the license expires To register BitDefender Internet Security 2009 1 Select want to register the product with a new key 2 Type the license key in the edit field Note You can find your license key m on the CD label m on the product registration card m in the online purchase e mail If you do not have a BitDefender license key click the provided link to go to the BitDefender online store and buy one Click Finish Registration 274 BitDefender Internet Security 2009 26 2 Creating a BitDefender Account As part of the registration process you MUST create a BitDefender account The Bit
196. licensed to use a product identified by BITDEFENDER as being eligible for the upgrade in order to use BitDefender A BitDefender labeled as an upgrade replaces and or supplements the product that formed the basis for your eligibility for the upgrade You may use the resulting upgraded product only in accordance with the terms of this License Agreement If BitDefender is an upgrade of a component of a package of software programs that you licensed as a single product BitDefender may be used and transferred only as part of that single product package and may not be separated for use by more than the total number of licensed users The terms and conditions of this license replace and supersede any previous agreements that may have existed between you and BITDEFENDER regarding the original product or the resulting upgraded product COPYRIGHT All rights titles and interest in and to BitDefender and all copyright rights in and to BitDefender including but not limited to any images photographs logos animations video audio music text and applets incorporated into BitDefender the accompanying printed materials and any copies of BitDefender are owned by BITDEFENDER BitDefender is protected by copyright laws and international treaty provisions Therefore you must treat BitDefender like any other copyrighted material You may not copy the printed materials accompanying BitDefender You must produce and include all copyright notices in their origina
197. ling BitDefender 9 BitDefender Internet Security 2009 Optionally BitDefender can inform you about special offers and promotions using the e mail address of your account Select one of the available options m Send me all messages from BitDefender m Send me only the most important messages m Don t send me any messages Click Finish 2 2 Configuration Wizard Once you have completed the registration wizard a configuration wizard will appear The wizard helps you configure specific product modules and set BitDefender to perform important security tasks Completing this wizard is not mandatory however we recommend you do so in order to save time and ensure your system is safe even before BitDefender Internet Security 2009 is installed Note e If you do not want to follow this wizard click Cancel BitDefender will notify you about the components that you need to configure when you open the user interface Installing BitDefender 10 BitDefender Internet Security 2009 2 2 1 Step 1 9 Welcome Window Bit Defender Internet Security 2009 Installing BitDefender BitDefender Configuration Wizard Step 1 of 9 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Welcome to the BitDefender Configuration Wizard This wizard will guide you through the steps necessary for you to configure the most important BitDefender modules apply the settings that will best cover your requirements and security needs take
198. list of urls that will not be processed by our engines 6 The URLs entered in the Whitelist will not be checked by the BitDefender Antiphishing engines You will not be notified about any threats existing on these pages New address Add Website o This is where you can define a list of websites URLs that should not be checked by BitDefender Antiphishing A save Close Antiphishing White List You can see the web sites that BitDefender does not currently check for phishing content Antivirus 130 BitDefender Internet Security 2009 To add a new web site to the white list type its url address in the New address field and click Add The white list should contain only web sites you fully trust For example add the web sites where you currently shop online OQ Note You can easily add web sites to the white list from the BitDefender Antiphishing toolbar integrated into your web browser If you want to remove a web site from the white list click the corresponding Remove button Click Close to save the changes and close the window 16 2 On demand Scanning The main objective for BitDefender is to keep your computer clean of viruses This is first and foremost done by keeping new viruses out of your computer and by scanning your e mail messages and any new files downloaded or copied to your system There is a risk that a virus is already lodged in your system before you even install BitDefender This is why
199. ll be asked to restart your computer Click Reboot to immediately reboot your system If you want to reboot your system later just click OK We recommend that you reboot your system as soon as possible Parental 72 BitDefender Internet Security 2009 9 File Vault BitDefender comes with a File Vault module that helps you keep your data not only safe but confidential To achieve this goal use file vault File Vault You surely want your sensitive files to be kept away from prying eyes This is where the File Vault section of the File Manager module comes in handy m The file vault is a secured storage space for personal information or sensitive files m The file vault is an encrypted file on your computer with the bvd extension m As it is encrypted the data inside it is invulnerable to theft or to a security breach m When you mount this bva file a new logical partition a new drive will appear It will be easier for you to understand this process if you think of a similar one mounting an ISO image as virtual CD Just open My Computer and you will see a new drive based on your file vault You will be able to do file operations on it copy delete change etc The files are protected as long as they reside on this drive because a password is required for the mounting operation When finished lock unmount your vault in order to start protecting its content To enter the File Manager module click the File Vault tab
200. look Outlook Express Windows Mail select the appropriate option from the Import email addresses from drop down menu For Microsoft Outlook Express Windows Mail a new window will appear from where you can select the folder that contains the e mail addresses you want to add to the Spammers list Choose them and click Select In both cases the e mail addresses will appear in the import list Select the desired ones and click 2 to add them to the Spammers list If you click amp all the e mail addresses will be added to the list To delete an item from the list select it and click Remove button If you click amp Clear list button you will delete all entries from the list but notice it is impossible to recover them Use the amp Save Load buttons to save load the Spammers list to a desired location The file will have bw1 extension To reset the content of the current list when you load a previously saved list select When load empty current list Click Apply and OK to save and close the Spammers list m e Friends opens the Friends list that contains all the e mail addresses from which you always want to receive e mail messages regardless of their content Note Any mail coming from an address contained in the Friends list will automatically be delivered to your Inbox without further processing Getting Started 39 BitDefender Internet Security 2009 Bit
201. ly add all your contacts from the Address Book to the Friends list contact company de george_mayer gmail com Wieanpierre yahoo fr office bitdefender com Mpr company com sales company com Z Select all C Skip this step Q bitdefender Ee Fill in the Friends List Here you can see all the addresses from your Address Book Please select those you want to be added to your Friends list we recommend to select them all You will receive all the e mail messages from these addresses regardless of their content To add all your contacts to the Friends list check Select all Select Skip this step if you want to pass over this step Click Back to go to the previous step or click Next to continue the wizard Getting Started 44 BitDefender Internet Security 2009 Step 3 6 Delete Bayesian Database BitDefender 2009 Train the Bayesian Filter X Step 3 of 6 Train the Bayesian Filter sten4 steps steps If the BitDefender Antispam is not working properly we recommend retraining the Bayesian filter In order to do so you have to wipe the previous filter _ Clear Antispam filter database You can choose to save the Bayesian filter before deleting it save Bayes Ajload Bayes Check this option only if your antispam filter is very inaccurate In the Following steps you will retain the Bayesian Learning Engine Skip this step Q bitdefender a NLTNNN Delete Bayesian Database You may find t
202. ly on Windows Vista to be enabled after uninstalling BitDefender select the corresponding check boxes Click Remove to start the removal of BitDefender Internet Security 2009 from your computer During the removal process you will be prompted to give us your feedback Please click OK to take an online survey consisting of no more than five short questions If you do not want to take the survey just click Cancel Once the removal process is completed a new window will appear Click Finish Repairing or Removing BitDefender 24 BitDefender Internet Security 2009 Note After the removal process is over we recommend that you delete the Bit Defender folder from Program Files An error occurred while removing BitDefender If an error has occurred while removing BitDefender the removal process will be aborted and a new window will appear Click Run UninstallTool to make sure that BitDefender has been completely removed The uninstall tool will remove all the files and registry keys that were not removed during the automatic removal process Repairing or Removing BitDefender 25 BitDefender Internet Security 2009 Basic Administration BitDefender Internet Security 2009 5 Getting Started Once you have installed BitDefender your computer is protected 5 1 Start BitDefender Internet Security 2009 The first step in getting the best from the BitDefender is to start the application To access the BitDefende
203. mational articles to supplement product helpfiles The BitDefender Knowledge Base is available any time at http kb bitdefender com Support 279 BitDefender Internet Security 2009 27 2 Asking for Help 27 2 1 Go to Web Self Service Got a question Our security experts are available to help you 24 7 via phone email or chat at no additional cost Please follow the links below English http www bitdefender com site KnowledgeBase German http www bitdefender com de KnowledgeBase French http www bitdefender com fr KnowledgeBase Romanian http www bitdefender com ro KnowledgeBase Spanish http www bitdefender com es KnowledgeBase 27 2 2 Open a support ticket If you want to open a support ticket and receive help via email just follow one of these links English http Awww bitdefender com site Main contact 1 German http www bitdefender de site Main contact 1 French http Awww bitdefender fr site Main contact 1 Romanian http www bitdefender ro site Main contact 1 Spanish http www bitdefender es site Main contact 1 Support 280 BitDefender Internet Security 2009 27 3 Contact Information Efficient communication is the key to a successful business During the past 10 years BITDEFENDER has established an unquestionable reputation by constantly striving for better communication so as to exceed the expectations of our clients and partners Should you have any questions
204. mpanies or organizations in the same domain By using friends or spammers list you can easily classify which people you want to receive e mail from friends no matter what the message contains or which people you never want to hear from again spammers The Friends Spammers lists can be managed from the Advanced View or from the Antispam toolbar integrated into some of the most commonly used mail clients Note We recommend that you add your friends names and e mail addresses to the Friends list BitDefender does not block messages from those on the list therefore adding friends helps ensure that legitimate messages get through Antispam 169 BitDefender Internet Security 2009 Charset Filter Many spam messages are written in Cyrillic and or Asian charsets The Charset Filter detects this kind of messages and tags them as SPAM Image Filter Since avoiding heuristic filter detection has become quite a challenge nowadays inbox folders are full with more and more messages only containing an image with unsolicited content To cope with this growing problem BitDefender introduced the Image filter that compares the image signature from the e mail with those from the BitDefender database In case of a match the e mail will be tagged as SPAM URL Filter Almost all spam messages include links to various web locations These locations usually contain more advertising and the possibility to buy things and sometimes they are
205. n and close a vault while maintaining its security While a vault is open you can add new files access current files or change them Physically the vault is a file stored on the local hard drive having the bvd extension Although the physical files representing the vaulted drives can be accessed from a different operating system such as Linux the information stored on them cannot be read because it is encrypted To manage the file vaults on your computer go to Encryption gt File Vault in the Advanced View Encryption 237 BitDefender Internet Security 2009 BitDefender Internet Security 2009 Trial a STATUS There is 1 pending issue IM Encryption File Vault General ivl File Vault is enabled Antivirus Vaults on this computer Mee 3402 Vault Status Drive Letter Full Path Firewall Vulnerability Encryption Game Laptop Mode Vault content eax Network Full Path File Type Update Registration Q This is where you can configure in detail the File Vault component a Sbitdefender Buy My Account Register Help Support Histor File Vault To disable File Vault clear the File Vault is enabled check box and click Yes to confirm If you disable File Vault all file vaults will be locked and you will no longer be able to access the files they contain The table at the top displays the file vaults on your computer You can see the name the status open
206. nd follow the wizard Security 62 BitDefender Internet Security 2009 Step 1 6 Select Vulnerabilities to Check Bit Defender Internet Security 2009 EA Vulnerability Scan Step 1 Select tasks Step 2 Scanning Step 3 Passwords Step 4 Applications Step 5 Windows Step 6 Finish Select tasks The wizard searches for available Windows updates weak passwords to Windows accounts and outdated applications BitDefender contains a list of applications that are checked for these vulnerabilities In order for all of these applications to be fully updated and protected it is recommended to select all the boxes below v User Passwords v Applications Updates v Critical Windows Updates v Other Windows Updates Qo Select the actions the vulnerability module should take when checking your system 2 bitdefender Pest cance Vulnerabilities Click Next to check the system for the selected vulnerabilities Security 63 BitDefender Internet Security 2009 Step 2 6 Checking for Vulnerabilities Bit Defender Internet Security 2009 Vulnerability Scan Step 1 Select tasks Step 2 Scanning Step 3 Passwords Step 4 Applications Step 5 Windows Step 6 Finish Status Scanning 1 Critical Windows Updates Q The scanning process is in progress as stop canca C bitdefender Vulnerability Check Wait for BitDefender to finish checking for vulnerabilities Security 64 BitDefender
207. nder Q Cbitdefender EE Next Cancel View Modes Choose between the two user interface view modes depending on your user experience with BitDefender m Basic View Simple interface suited for beginners and users who want to perform basic tasks and easily solve problems You just have to keep track of the BitDefender warnings and alerts and fix the issues that appear m Advanced View Advanced interface suited for more technical users who want to fully configure the product You can configure each product component and perform advanced tasks Click Next to continue Installing BitDefender 12 BitDefender Internet Security 2009 2 2 3 Step 3 9 Configure BitDefender Network Bit Defender Internet Security 2009 Installing BitDefender BitDefender Configuration Wizard Step 3 of 9 step 4 Steps Step 6 Step 7 Home Management Configuration Step 8 Step 9 BitDefender 2009 includes a new component Home Management which enables you to create a virtual network of all the computers in your household and to manage all of the BitDefender products installed in this network You can act as an administrator of a network that you create or you can be part of a network created and managed from another computer Click the check box below if you want to be part of the BitDefender Home Network You will be required to enter a Home Management password which will allow the administrator of your network to control the BitDefender setting
208. nder Account gives you access to technical support and special offers and promotions If you lose your BitDefender license key you can retrieve it by logging in to http myaccount bitdefender com You can choose to sign in to an existing BitDefender Account or to create a new one O Sign in to an existing BitDefender Account 8 Create a new BitDefender Account E mail Address vdanciu bitdefender com Password tree Forgot your passwor Re Type password pe FirstName Cosmin Last Name Danciu Country United States O Skip registration Send me all messages from BitDefender Send me only the most important messages Don t send me any messages Q Cbitdefender Back Finish Cancel Account Creation If you do not want to create a BitDefender account at the moment select Skip registration and click Finish Otherwise proceed according to your current situation m do not have a BitDefender account p 9 m already have a BitDefender account p 9 e Important You must create an account within 15 days after installing BitDefender if you register it the deadline is extended to 30 days Otherwise BitDefender will no longer update Installing BitDefender 8 BitDefender Internet Security 2009 I do not have a BitDefender account To create a BitDefender account select Create a new BitDefender account and provide the required information The data you provide here will remain confi
209. ning in progress The section above indicates the progress of and the section below statistics on this process By default AL BitDefender will try to disinfect the items detected as infected bitdefender mara Scanning You can see the scan status and statistics scanning speed elapsed time number of scanned infected suspicious hidden objects and other Note The scanning process may take a while depending on the complexity of the scan To temporarily stop the scanning process just click Pause You will have to click Resume to resume scanning You can stop scanning anytime you want by clicking Stop amp Yes You will go directly to the last step of the wizard Wait for BitDefender to finish scanning Step 2 3 Select Actions When the scanning is completed a new window will appear where you can see the scan results Antivirus 151 BitDefender 2009 Full System Scan Antivirus Scan Step 2 of 3 St Step Results Summary BitDefender Internet Security 2009 126 threat s that affected 243 object s require s your attention Generic Peed Eml 071872F7 Generic Peed Eml DA3EE9A2 Generic Peed Eml 0B4D14B2 Generic Peed Eml 0CE75927 Generic Peed Eml 100B7D60 2 issues left disinfection Failed 2 issues left disinfection Failed 2 issues left disinfection Failed 2 issues left disinfection Failed 2 issues left disinfection Failed Step3 Peed Eml 1005A 2 issues left disinfection Failed Ta
210. nnection before performing this task It is highly recommended to keep BitDefender updated to ensure the security of your system Status Checking for updates File 095 0kb Total Update 25 Okb Gbitdefender Gus E NE Updating BitDefender In this window you can see the status of the update process The update process is performed on the fly meaning that the files to be updated are replaced progressively In this way the update process will not affect product operation and at the same time all vulnerabilities will be excluded Security 61 BitDefender Internet Security 2009 If you want to close this window just click Cancel However this will not stop the update process Note e If you are connected to the Internet through a dial up connection then it is recommended I to regularly update BitDefender by user request Restart the computer if required In case of a major update you will be asked to restart your computer Click Reboot to immediately reboot your system If you want to reboot your system later just click OK We recommend that you reboot your system as soon as possible 7 2 3 Searching for Vulnerabilities Vulnerability Scan checks Microsoft Windows Updates Microsoft Windows Office Updates and the passwords to your Microsoft Windows accounts to ensure that your OS is up to date and that it is not vulnerable to password bypass To check your computer for vulnerabilities click Vulnerability Scan a
211. nning To exclude paths from scanning click the Add button You will be guided through the process of excluding paths from scanning by the configuration wizard that will appear Antivirus 157 BitDefender Internet Security 2009 Step 1 4 Select Object Type Bit Defender Internet Security 2009 AE Exclusions Wizard Step 1 of 4 Step2 Step 3 Step Please choose what type of rule you want to create You can choose to exclude paths or extensions The BitDefender Exclusions Wizard will quide you through the necessary steps to create rules that will enable the antivirus module to except specific files or folders from scanning It is not recommended to exclude files or folders from scanning unless you are an administrator and you have previously scanned the excluded items BitDefender will ask you if you want to perform an on demand scan of the excluded items to ensure that your computer is virus free Do not scan file or Folder paths Do not scan extensions Please choose the exceptions For the scanning process carefully and remember that it is recommended not to define any exception in order to be sure that your system is fully protected Cbitdefender nn ee Cane Object Type Select the option of excluding a path from scanning Click Next Antivirus 158 BitDefender Internet Security 2009 Step 2 4 Specify Excluded Paths Bit Defender Internet Security 2009 Exclusions Wizard Step 2 of 4 step3
212. ns that you accept or reject cookies from Cookies are used to track surfing behavior and other information Note that some sites will not function properly without cookies Q aisn S conce Select Address Action and Direction You can set the parameters m Domain address type in the domain on which the rule should apply m Action select the action of the rule Action Description Permit The cookies on that domain will execute Deny The cookies on that domain will not execute m Direction select the traffic direction Type Description Outgoing The rule applies only for the cookies that are sent out back to the connected site Incoming The rule applies only for the cookies that are received from the connected site Both The rule applies in both directions Privacy Control 212 Note You can accept cookies but never return them by setting the action to Deny and the direction to Outgoing Click Finish BitDefender Internet Security 2009 19 5 Script Control Scripts and other codes such as ActiveX controls and Java applets which are used to create interactive web pages can be programmed to have harmful effects Activex elements for example can gain total access to your data and they can read data from your computer delete information capture passwords and intercept messages while you re online You should only accept active content from sites you fully know and trust BitDefender lets you cho
213. ns the entire system In the default configuration it scans for all types of malware threatening your system s security such as viruses spyware adware rootkits and others Use this task to scan important current user folders My Documents Desktop and StartUp This will ensure the safety of your documents a safe workspace and clean applications running at startup Note e Since the Deep System Scan and Full System Scan tasks analyze the entire system the scanning may take a while Therefore we recommend you to run these tasks on low priority or better when your system is idle Security 60 BitDefender Internet Security 2009 When you initiate an on demand scanning process whether a quick or a full scan the BitDefender Scanner will appear Follow the three step guided procedure to complete the scanning process 7 2 2 Updating BitDefender New malware is found and identified every day This is why it is very important to keep BitDefender up to date with the latest malware signatures By default BitDefender checks for updates when you turn on your computer and every hour after that However if you want to update BitDefender just click Update Now The update process will be initiated and the following window will appear immediately Bit Defender Internet Security 2009 mA Update BitDefender Update BitDefender will check for newer Files and update them automatically Please make sure that you have an internet co
214. ntially harmful applications based on their behavior a ENT Behavioral Scanner Settings If you want to disable the Behavioral Scanner clear the Behavioral Scanner is enabled check box Important D Keep the Behavioral Scanner enabled in order to be protected against unknown viruses Configuring the Protection Level The Behavioral Scanner protection level automatically changes when you set a new real time protection level If you are not satisfied with the default setting you can manually configure the protection level Note Keep in mind that if you change the current real time protection level the Behavioral Scanner protection level will change accordingly Drag the slider along the scale to set the protection level that best fits your security needs Antivirus 128 BitDefender Internet Security 2009 Critical Applications are strictly monitored for possible malicious actions High Applications are intensely monitored for possible malicious actions Medium Applications are moderately monitored for possible malicious actions Low Applications are monitored for possible malicious actions Managing Excluded Applications You can configure the Behavioral Scanner not to check specific applications The applications that are not currently checked by the Behavioral Scanner are listed in the Excluded Applications table To manage the excluded applications you can use the buttons placed at the top of the table m
215. o is browse the folders select the folder you want to be scanned and click OK The BitDefender Scanner will appear and guide you through the scanning process Browse for Folder Please select the scan target H JB 3 Floppy A Es Local Disk C s Local Disk D s Local Disk E 8 Sf Framework on Marketing Agency agenc S vdanciu on hafslusers 2 Ez Control Panel Mobile Device Bes m QJ Nokia Phone Browser My Rlakinerl Discac il a vi l a B Cx Ce BitDefender Manual Scan Game Mode The new Game Mode temporarily modifies protection settings so as to minimize their impact on system performance While in Game Mode the following settings are applied m Minimize processor time amp memory consumption m Postpone automatic updates amp scans m Eliminate all alerts and pop ups m Scan only the most important files While in Game Mode you can see the letter G over the BitDefender icon 9 6 1 Using Game Mode If you want to turn Game Mode on use one of the following methods m Right click the BitDefender icon in the system tray and select Turn on Game Mode m Press Ctrl Shift Alt cG the default hotkey Important Do not forget to turn Game Mode off when you finish To do this use the same methods you did when you turned it on Getting Started 34 BitDefender Internet Security 2009 5 6 2 Changing Game Mode Hotkey If you want to change the hotkey follow t
216. ompletely Two tables are displayed m Encryption Exclusions lists the user IDs and the associated IM program for which encryption is disabled To remove a contact from the list select it and click the Remove button m Current Connections lists the current instant messaging connections user ID and associated IM program and whether or not they are encrypted A connection may not be encrypted for these reasons You explicitly disabled encryption for the respective contact Your contact does not have installed a BitDefender version that supports IM encryption Encryption 236 BitDefender Internet Security 2009 21 1 1 Disabling Encryption for Specific Users To disable encryption for a specific user follow these steps 1 Click the Add button to open the configuration window BitDefender Instant Messaging user setting gt User ID IM Program Yahoo Messenger O Windows Live MSN Messenger Ln Ee Adding Contacts 2 Type in the edit field the user ID of your contact 3 Select the instant messaging application associated with the contact 4 Click OK 21 2 File Vault BitDefender File Vault enables you to create encrypted password protected logical drives or vaults on your computer where you can securely store your confidential and sensitive documents The data stored on the vaults can only be accessed by users who know the password The password allows you to open store data o
217. on level that better fits your security needs Drag the slider along the scale to set the appropriate protection level There are 3 protection levels Antivirus 122 BitDefender Internet Security 2009 Permissive Covers basic security needs The resource consumption level is very low Programs and incoming mail messages are only scanned for viruses Besides the classical signature based scan the heuristic analysis is also used The actions taken on infected files are the following clean file deny access Default Offers standard security The resource consumption level is low All files and incoming amp outgoing mail messages are scanned for viruses and spyware Besides the classical signature based scan the heuristic analysis is also used The actions taken on infected files are the following clean file deny access Aggressive Offers high security The resource consumption level is moderate All files incoming amp outgoing mail messages and web traffic are scanned for viruses and spyware Besides the classical signature based scan the heuristic analysis is also used The actions taken on infected files are the following clean file deny access To apply the default real time protection settings click Default Level 16 1 2 Customizing Protection Level Advanced users might want to take advantage of the scan settings BitDefender offers The scanner can be set to scan only specific file extensions to search for specific
218. on your system The gray bars the File Zone show the number of scanned files per second on a scale from 0 to 50 The orange bars displayed in the Net Zone show the number rm of Kbytes transferred sent and received from the Internet every second on a scale from 0 to 100 Activity Bar Note The Scan activity bar will notify you when real time protection or the Firewall is disabled by displaying a red cross over the corresponding area File Zone or Net Zone You can use the Scan activity bar to scan objects Just drag the objects that you want to be scanned and drop them over it For more information please refer to Drag amp Drop Scanning p 148 When you no longer want to see the graphic visualization just right click it and select Hide To completely hide this window follow these steps 1 Click Switch to Advanced View if you are in Basic View 2 Click the General module from the left side menu 3 Click the Settings tab 4 Clear the Enable the Scan Activity bar on screen graph of product activity check box BitDefender Manual Scan If you want to quickly scan a certain folder you can use the BitDefender Manual Scan To access the BitDefender Manual Scan use the Windows Start menu by following the path Start Programs BitDefender 2009 BitDefender Manual Scan The following window will appear Getting Started 33 5 6 BitDefender Internet Security 2009 All you have to d
219. once If you want to delete all the rules created for a specific application select the application from the list and click the Remove rule button 20 3 3 Creating and Modifying Rules Creating new rules manually and modifying existing rules consist in configuring the rule parameters in the configuration window Creating rules To create a rule manually follow these steps 1 Click the Add rule button The configuration window will appear Firewall 227 BitDefender Internet Security 2009 2 Configure the main and the advanced parameters as needed 3 Click OK to add the new rule Modifying rules To modify an existing rule follow these steps 1 Click the Edit rule button or double click the rule The configuration window will appear 2 Configure the main and the advanced parameters as needed 3 Click OK to save the changes Configuring Main Parameters The Main tab of the configuration window allows configuring the main rule parameters BitDefender Add a New Firewall Rule x Main Advanced Program Path Dany Command Line v Any Protocol Any Im Events Adapter Types Z Connect Full Trust v Trusted Local Z Traffic v Safe v Unsafe v Listen M Blocked Loca x7 Blocked Action O Allow O Deny Q a oo Main Parameters You can configure the following parameters m Program Path Click Browse and select the application the rule appl
220. ons Please choose the exceptions For the scanning process carefully and remember that it is recommended not to define any exception in order to be sure that your system is fully protected Cbitdefender nn ee Cane Object Type Select the option of excluding an extension from scanning Click Next Antivirus 162 BitDefender Internet Security 2009 Step 2 4 Specify Excluded Extensions Bit Defender Internet Security 2009 Exclusions Wizard Step 2 of 4 step 3 Exclude extensions Step 4 Please enter here the extensions that should not be scanned l Selected extensions avi Audio Video Interleaved animation file Above you can select the extensions that you want to exclude from scanning Please make sure that you click add after you choose an extension You can add multiple items to this list Please choose the exceptions For the scanning process carefully and remember that it is recommended not to define any exception in order to be sure that your system is fully protected bitdefender P oaa O nee f cance Excluded Extensions To specify the extensions to be excluded from scanning use either of the following methods m Select from the menu the extension that you want to be excluded from scanning and then click Add Note The menu contains a list of all the extensions registered on your system When you select an extension you can see its description if available m Type the
221. ons category Option Description n e Scan files Scan all files Scan program files only Scan user defined extensions Open packed programs Open archives Antivirus All files are scanned regardless of their type Only the program files will be scanned This means only the files with the following extensions exe bat com dll ocx scr bin dat 386 vxd sys wdm cla class ovl ole exe hlp doc dot xls ppt wbk wiz pot ppa xla xlt vbs vbe mdb rtf htm hta html xml xtp php asp js shs chm lnk pif prc url smm pdf msi ini csc cmd bas eml and nws Only the files with the extensions specified by the user will be scanned These extensions must be separated by Scans packed files Scans inside archives 139 Open e mail archives Scan boot sectors Scan memory Scan registry Scan cookies BitDefender Internet Security 2009 Option Description EN Scanning archived files increases the scanning time and requires more system resources You can click the Archive size limit field and type the maximum size of the archives to be scanned in kilobytes KB Scans inside mail archives Scans the system s boot sector Scans the memory for viruses and other malware Scans registry entries Scans cookie files m Action options Specify the action to be taken on the each category of detected files using the options in the Action options category Antivirus Note To set
222. ormation from a peer application m Trust level Select the trust levels the rule applies to m Action Select one of the available actions Allow Deny The specified application will be allowed network Internet access under the specified circumstances The specified application will be denied network Internet access under the specified circumstances 229 BitDefender Internet Security 2009 Configuring Advanced Parameters Firewall The Advanced tab of the configuration window allows configuring advanced rule parameters BitDefender Add a New Firewall Rule x Main Advanced Direction Both iv IP Version Any iv Local Address Tei v Any Port s v Any Remote Address Ip s v Any Port s VJ any LJ Apply this rule only for directly connected computers Q a cc Advanced Parameters You can configure the following advanced parameters m Direction Select from the menu the traffic direction the rule applies to Direction Description Outbound The rule applies only for the outgoing traffic Inbound The rule applies only for the incoming traffic Both The rule applies in both directions m IP version Select from the menu the IP version IPv4 IPv6 or any the rule applies to m Local Address Specify the local IP address and port the rule applies to as follows 230 BitDefender Internet Security 2009 If yo
223. orts vj Enable BitDefender Outbreak Detection Q This is where you can configure the main BitDefender settings 2 bitdefender Buy My Account Register Help Support History General Settings General 117 BitDefender Internet Security 2009 Here you can set the overall behavior of BitDefender By default BitDefender is loaded at Windows startup and then runs minimized in the taskbar 15 2 1 General Settings m Enable password protection for product settings enables setting a password in order to protect the BitDefender configuration Note 65 If you are not the only person with administrative rights using this computer it is recommended that you protect your BitDefender settings with a password If you select this option the following window will appear BitDefender x Type the password in the Password field re type it in the Retype password field and click OK Once you have set the password you will be asked for it whenever you want to change the BitDefender settings The other system administrators if any will also have to provide am um em this password in order to change the BitDefender settings You must enter a password and retype it to confirm The password should be at least 8 characters long Password Retype password Enter password If you want to be prompted for the password only when configuring Parental Control you must also select Ask for Apply password
224. ose to run these elements or to block their execution With Script Control you will be in charge of which websites you trust and which you don t BitDefender will ask you for permission whenever a website tries to activate a script or other active content BitDefender Script Alert x 6 Internet Explorer e Path e program files internet explorer iexplore exe Question This program received active content Activex Java Applet Script from www msn com through http service Do you want to allow this program to store it locally _ Remember this answer Script Alert You can see the name of the resource Check Remember this answer option and click Yes or No and a rule will be created applied and listed in the rules table You will no longer be notified when the same site tries to send you active content To configure Script Control go to Privacy Control gt Script in the Advanced View Privacy Control 213 BitDefender Internet Security 2009 BitDefender Internet Security 2009 Trial ES LLITIITITIUOUX NN 7703 Status Identity Registry Cookie Script General Antivirus v Enable Script Control Em Total scripts blocked a Parental Control en Action Privacy Control Firewall Vulnerability Encryption Game Laptop Mode Network Update Registration Check this box to enable Script Control It will prompt you to allow or reject scripts such as ActiveX controls Java scripts and appl
225. otection ensures that all files downloaded via amp Antispyware Web HTTP are scanned for viruses and spyware Protection Basic Settings 103 BitDefender Internet Security 2009 Real Time Real time web antiphishing protection ensures that all files Antiphishing Web downloaded via HTTP are scanned for phishing attempts Protection Identity control Identity Control helps you keep confidential data safe by scanning all web and mail traffic for specific strings IM Encryption If your IM contacts have BitDefender 2009 installed all IM conversations via Yahoo Messenger and Windows Live Messenger will be encrypted 11 3 Parental control settings You can enable disable Parental Control module with one click Parental Control can block access to inappropriate web pages or to the internet for certain periods of time and it can filter mail IM and web traffic based on specific words 11 4 Network settings You can enable disable Firewall module with one click Firewall protects your computer from hacker and malicious outside attacks 11 5 File Vault settings You can enable disable File Vault module with one click File Vault keeps your documents private by encrypting them in special vaulted drives 11 6 General settings You can enable disable security related items with one click tom Description Game Mode Game Mode temporarily modifies protection settings so as to minimize their impact on system performance
226. otects your computer from all kinds of malware viruses Trojans spyware rootkits and so on The protection BitDefender offers is divided into two categories m Real time protection prevents new malware threats from entering your system BitDefender will for example scan a word document for known threats when you open it and an e mail message when you receive one Note Real time protection is also referred to as on access scanning files are scanned as the users access them m On demand scanning allows detecting and removing the malware that already resides in the system This is the classic scan initiated by the user you choose what drive folder or file BitDefender should scan and BitDefender scans it on demand The scan tasks allow you to create customized scanning routines and they can be scheduled to run on a regular basis 16 1 Real time Protection BitDefender provides continuous real time protection against a wide range of malware threats by scanning all accessed files e mail messages and the communications through Instant Messaging Software applications ICQ NetMeeting Yahoo Messenger MSN Messenger BitDefender Antiphishing prevents you from disclosing personal information while browsing the Internet by alerting you about potential phishing web pages To configure real time protection and BitDefender Antiphishing go to Antivirus Shield in the Advanced View Antivirus 121 BitDefender Internet Securi
227. password BitDefender You must enter the home management password Password eeecccce C Don t show this message again this session lt a HIN Enter Password Type the home management password and click OK C Note If you plan to run several tasks you might want to select Don t show this message again this session By selecting this option you will not be prompted again for this password during the current session Network 264 25 BitDefender Internet Security 2009 Update New malware is found and identified every day This is why it is very important to keep BitDefender up to date with the latest malware signatures If you are connected to the Internet through broadband or DSL BitDefender takes care of this itself By default it checks for updates when you turn on your computer and every hour after that If an update is detected you may be asked to confirm the update or the update is performed automatically depending on the automatic update settings The update process is performed on the fly meaning that the files to be updated are replaced progressively In this way the update process will not affect product operation and at the same time any vulnerability will be excluded Updates come in the following ways m Updates for the antivirus engines as new threats appear the files containing virus signatures must be updated to ensure permanent up to date protection against them This up
228. protection the Internet connection is a MUST Overview 285 BitDefender Internet Security 2009 Graphical resolution Standard SVGA compatible graphics card 28 2 Included Software BitDefender Rescue CD includes the following software packages Xedit This is a text file editor Vim This is a powerful text file editor containing syntax highlighting a GUI and much more For more information please refer to the Vim homepage Xcalc This is a calculator RoxFiler RoxFiler is a fast and powerful graphical file manager For more information please refer to the RoxFiler homepage MidnightCommander GNU Midnight Commander mc is a text mode file manager For more information please refer to the MC homepage Pstree Pstree displays running processes Top Top displays Linux tasks Xkill Xkill kills a client by its X resources Partition Image Partition Image helps you save partitions in the EXT2 Reiserfs NTFS HPFS FAT 16 and FAT32 file system formats to an image file This program can be useful for backup purposes For more information please refer to the Partimage homepage GtkRecover GtkRecover is a GTK version of the console program recover It helps you recover a file For more information please refer to the GtkRecover homepage Overview 286 BitDefender Internet Security 2009 ChkRootKit ChkRootkit is a tool that helps you scan your computer for rootkits For more information please ref
229. ps your documents private by encrypting them in enabled special vaulted drives When the status buttons are green the security risk of your data is at a minimum To turn the buttons green follow these steps 1 Click the Fix buttons to fix security vulnerabilities one by one 2 If one issue is not fixed on the spot follow the wizard to fix it If you want to exclude an issue from monitoring just clear the Yes monitor this component checkbox Tasks The following buttons are available m Add File to Vault starts the wizard that allows you to store your important files documents privately by encrypting them in special vaulted drives m Remove Vault Files starts the wizard that allows you to erase data from the file vault m View Vault starts the wizard that allows you to view the content of your file vaults m Lock Vault starts the wizard that allows you to lock your vault in order to start protecting its content 9 2 1 Adding Files to Vault The file vault is a special place which is used to store valuable things in safe conditions The documents from a file vault are encrypted By clicking Add Files to Vault a wizard will guide you through the process of creating a vault and adding documents to it File Vault 75 BitDefender Internet Security 2009 Step 1 6 Select Target Here you can specify the files or folders to be added to vault Bit Defender Internet Security 2009 File Vault Step 1 of 6
230. pter uude dee tox cA PR URB dod 116 15 2 Settings s dni pan aca ie duke Deets A ta dH ba Eon DU don adit das 117 15 241 General Setlings 2405 80 Cetera Ute RED Dn rade han 118 15 2 2 Virus Report Settings sisu dss dan Dedi bedded gue Sadar pedaceb kee 119 15 3 System Information sias eto hendre ae S edt eode enr 119 16 Antivirus ce eere re nne aut nee dan abaan iaaah 121 16 1 Real time Protection x sie Sea acter enact Ero rer vuU 4 QUPH CQ ee Bee eee ere 121 16 1 1 Configuring Protection Level 000 cece eee eee 122 16 1 2 Customizing Protection Level 00 ccc cece eee eee 123 16 1 3 Configuring the Behavioral Scanner 002000 cece eee eee 127 16 1 4 Disabling Real time Protection 000 eee eee eee 129 16 1 5 Configuring Antiphishing Protection 000 eee eee eee 130 16 2 On demand Scanning 0 0 0 cece eee eee 131 16 2 1 Scan TASKS aicc e cor So Pete ES De t eie Pet dete deg did 132 16 2 2 Using Shortcut Menu essor ideas RET LECPEESFCE TERM p EE 134 16 2 3 Creating Scam TaSksS eci ecc E IHR LEER p P urA RERELHMEDEES 135 16 2 4 Configuring Scan Tasks 000 cece eee eee eens 135 16 2 5 Scanning Objects cei ors niceg pete Ged ek ne REX ur ee Pee P ne 147 vi BitDefender Internet Security 2009 16 2 6 Viewing Scan 09S nere ot e sept AQ ake 154 16 3 Objects Excluded from Scanning 0 06 cece eet 155 1
231. r Internet Security 2009 main interface use the Windows Start menu by following the path Start Programs BitDefender 2009 BitDefender Internet Security 2009 or quicker double click the BitDefender icon in the system tray 5 2 User Interface View Mode BitDefender Internet Security 2009 meets the need of either very technical people or computer beginners So the graphical user interface is designed to suit each and every category of users You can chose to view BitDefender under Basic or Advanced mode depending on your user experience with our product Note You can easily select one of these windows by clicking respectively the Switch to Basic View button or the Switch to Advanced View button 5 2 1 Basic View Basic View is a simple interface that gives you access to all modules at a basic level You ll have to keep track of warnings and critical alerts and fix undesired issues Getting Started 27 BitDefender Internet Security 2009 BitDefender Internet Security 2009 Trial mE P S 5 mi LI DASHBOARD SECURITY PARENTAL FILE VAULT NETWORK j CRITICAL WARNING PROTECTED PROTECTED Status Tasks My computer s overall status Update Now LI CRITICAL WARNING gt Full System Scan gt Deep Scan There is 1 issue that affects your system s security Overview Registration Trial Last update Expires in Last scan 30 days Next scan Never Q bitdefender Buy My Account Register Help Suppo
232. rator C Ne Not monitored test Administrator Ne Not monitored File vault OK Vulnerability scan OK Q oum Status Bar 12 1 Local security We know it s important to be noticed whenever a problem can affect your computer s security By monitoring each security modules BitDefender Internet Security 2009 will let you know not only when you configure the settings that might affect your computer s security but when you forget to do important tasks The issues concerning local security are described in very explicit sentences In line with each sentence if there is something that might affect your computer s security Status Bar 106 BitDefender Internet Security 2009 you will see a red status button called Fix Otherwise a green OK status button is displayed Issue Description Real time file Ensures that all files are scanned as they are accessed by you protection is or by an application running on this system enabled You have scanned It is highly recommended to run an on demand scan as soon your computer for as possible to check if files stored on your computer are malware today malware free Automatic update Please keep automatic update enabled to ensure that the is enabled malware signatures of your BitDefender product are updated on a regular basis Updating now Product and malware signatures update is being performed Firewall is enabled Protects your computer from hacker and malicious outside atta
233. rdpad Document 2 doc Qo File Vault Wizard Removes files from Vault 23 bitdefender maor Select files Select the files to be removed and click Next Step 4 5 Summary This is where you can review chosen operations File Vault 84 BitDefender Internet Security 2009 Bit Defender Internet Security 2009 File Vault Step 4 of 5 P Step 1 Selectvault Step 2 Enter password step 3 Select iles step 4 Summary Step 5 Results Finish Operation Remove 1 files From Vault Name dada Path E Documents and Settings test Desktop dada bvd Status Opened on I Please review chosen operations and click Next if you wish to continue You can click Back if you want to change anything Q File v bitdefender It Wizard Removes files from Vault Back Next Cancel Summary Click Next Step 5 5 Results This is where you can view operation result File Vault 85 BitDefender Internet Security 2009 Bit Defender Internet Security 2009 File Vault Step 5 of 5 step i Select vault step 2 Enter password Step3 SelectFiles Step 4 Summary Step Resuls Display Operation Result Operation Remove Files from Vault Name dada Path E Documents and Settings test Desktop dada byd Result The operation succeeded Error Code Information 1 of 1 deleted Qo File Vault Wizard Removes files from Vault 2 Gbitdefender Results Click Finish 9 2 3 Viewing Files from Vault By clicking View
234. re the password when you enable the Parental Control for a specific user To successfully use Parental Control to restrict your children computer and online activities you must complete these main tasks 1 Create limited standard Windows user accounts for your children to use Note To learn how to create Windows user accounts go to the Windows Help and Support Center in the Start menu click Help and Support 2 Configure Parental Control for the Windows user accounts your children use Parental Control 182 BitDefender Internet Security 2009 To configure Parental Control go to Parental Control in the Advanced View BitDefender Internet Security 2009 Trial SWITCH TO BASIC VIEW STATUS There is 1 pending issue Status General Antivirus Windows accounts and settings E Double click on the username to edit parental control settings for that specific user Parental Control User name web Applications Keyword IM Time Limiter San Administrator disabled disabled disabled disabled disabled test disabled disabled disabled disabled disabled Firewall Vulnerability Encryption Game Laptop Mode Network Update Registration Q Click here to configure your Parental Control module in detail 2 bitdefender Buy My Account Register Help Support History Parental Control You can see the status of the Parental Control features configured for each Windows user account Double click a user name to
235. reen the security risk of your system is at a minimum To turn the buttons green follow these steps 1 Click the Fix buttons to fix security vulnerabilities one by one 2 If one issue is not fixed on the spot follow the wizard to fix it If you want to exclude an issue from monitoring just clear the Yes monitor this component checkbox 12 3 File vault The issues that might affect your data privacy are described in very explicit sentences In line with each sentence if there is something that might affect your data s privacy you will see a red status button called Fix Otherwise a green OK status button is displayed Issue Description The File Vault is File Vault keeps your documents private by encrypting them in enabled special vaulted drives When the status buttons are green the security risk of your data is at a minimum To turn the buttons green follow these steps Status Bar 108 BitDefender Internet Security 2009 1 Click the Fix buttons to fix security vulnerabilities one by one 2 If one issue is not fixed on the spot follow the wizard to fix it If you want to exclude an issue from monitoring just clear the Yes monitor this component checkbox 12 4 Vulnerability scan The issues concerning vulnerabilities are described in very explicit sentences In line with each sentence if there is something that might affect your computer s security you will see a red status button called Fix Otherwise a
236. rity 2009 on your desktop at the end of the installation m Eject CD when installation is complete to have the CD ejected at the end of the installation this option appears when you install the product from the CD m Turn off Windows Firewall to turn off Windows Firewall Important We recommend you to turn off Windows Firewall since BitDefender Internet Security 2009 already includes an advanced firewall Running two firewalls on the same computer may cause problems Installing BitDefender 5 BitDefender Internet Security 2009 m Turn off Windows Defender to turn off Windows Defender this option appears only on Windows Vista Click Install in order to begin the installation of the product If not already installed BitDefender will first install NET Framework 1 1 Wait until the installation is completed 6 Click Finish You will be asked to restart your system so that the setup wizard can complete the installation process We recommend doing so as soon as possible e Important After completing the installation and restarting the computer a registration wizard and a configuration wizard will appear Complete these wizards in order to register and configure BitDefender Internet Security 2009 and to create a BitDefender account If you have accepted the default settings for the installation path you can see in Program Files a new folder named BitDefender which contains the subfolder BitDefender 2009 2 1 Re
237. rmation the overall probability for the whole message to be SPAM is computed This module presents another interesting characteristic it is trainable It adapts quickly to the type of messages received by a certain user and stores information about all To function effectively the filter must be trained meaning to be presented with samples of SPAM and legitimate messages much like a hound is primed to trace a certain scent Sometimes the filter must be corrected too prompted to adjust when it makes a wrong decision Important D You can correct the Bayesian filter using the Is Spam and amp Not Spam buttons from the Antispam toolbar Note e Every time you perform an update m new image signatures will be added to the Image filter m new links will be added to the URL filter m new rules will be added to the NeuNet Heuristic filter This will help increase the effectiveness of your Antispam engine To protect you against spammers BitDefender can perform automatic updates Keep the Automatic Update option enabled 17 1 2 Antispam Operation The schema below shows the way BitDefender works INTERNET Antispam Operation Antispam 171 BitDefender Internet Security 2009 The antispam filters from the above schema Friends list Spammers list Charset filter Image filter URL filter NeuNet Heuristic filter and Bayesian filter are used in conjunction by the BitDefender Antispam Engine to determine wheth
238. roduct with a new key Enter a new license key Buy a license key TF you want to buy a license key please visit our online store at Renew Your BitDefender license Key zx Step 2 This is where you can find your license key 1 CD Rom label 2 Product registration card 3 Online purchase e mail 1 Q The BitDefender Registration Wizard will help you register BitDefender and create or update your BitDefender Account 21 bitdefender Registration hn Nent o Cancel You can see the BitDefender registration status the current license key and how many days are left until the license expires To continue evaluating the product select Continue using the current key To register BitDefender Internet Security 2009 1 Select I want to register the product with a new key 2 Type the license key in the edit field Note 65 You can find your license key m on the CD label m on the product registration card m in the online purchase e mail Installing BitDefender BitDefender Internet Security 2009 If you do not have a BitDefender license key click the provided link to go to the BitDefender online store and buy one Click Next to continue 2 1 2 Step 2 2 Create a BitDefender Account Bit Defender Internet Security 2009 BitDefender Registration Wizard Step 2 of 2 My Account registration Information about an existing BitDefender account was found on this computer The BitDefe
239. rt Histor Basic View m As you can easily notice in the upper part of the window there are two buttons and a status bar Item Description Settings Opens a windows where you can easily enable or disable important security modules Firewall Stealth Mode Automatic Update Game Mode etc Switch to Advanced Opens the Advanced View window This is where you can View see the full list of modules and to be able to configure in detail each of the component The BitDefender will remember this option the next time you will open the user interface Status Contains information about and helps you fix the security vulnerabilities of your computer m In the middle of the window there are five tabs Getting Started 28 BitDefender Internet Security 2009 Tab Description Dashboard Displays meaningful product statistics and your registration status together with links to the most important on demand tasks Security Displays the status of the security modules antivirus antiphishing firewall antispam IM encryption privacy vulnerability check and update modules together with the links to antivirus update and vulnerability check tasks Parental Displays the status of the modules that enable you to restrict your children s access to the internet and to specific applications File Manager Displays the status of the file vault together with links to the file vault Network Displays the BitDefender home network structur
240. rt observation Although you can omit it the notes can provide valuable information such as specific feature or a link to some related topic Important O This requires your attention and is not recommended to skip over it Usually it provides non critical but significant information Warning QB This is critical information you should treat with increased caution Nothing bad will happen if you follow the indications You should read and understand it because it describes something extremely risky 2 The Book Structure The book consists of several parts containing major topics Moreover a glossary is provided to clarify some technical terms Installation Step by step instructions for installing BitDefender on a workstation This is a comprehensive tutorial on installing BitDefender Internet Security 2009 Starting with the prerequisites for a successfully installation you are guided through the whole installation process Finally the removing procedure is described in case you need to uninstall BitDefender Basic Administration Description of basic administration and maintenance of BitDefender Advanced Administration A detailed presentation of the security capabilities provided by BitDefender You are taught how to configure and use all BitDefender modules so as to efficiently protect your computer against all kind of threats malware spam hackers innapropriate content and so on Preface XV BitDefender Internet
241. rticular nature of the Misc Tasks category only the Logs and Open options are available in this case 16 2 3 Creating Scan Tasks To create a scan task use one of the following methods m Duplicate an existing task rename it and make the necessary changes in the Properties window m Click New Task to create a new task and configure it 16 2 4 Configuring Scan Tasks Each scan task has its own Properties window where you can configure the scan options set the scan target schedule the task or see the reports To open this window click the Open button located on the right of the task or right click the task and then click Open Note For more information on viewing logs and the Logs tab please refer to Viewing Scan Logs p 154 Configuring Scan Settings To configure the scanning options of a specific scan task right click it and select Properties The following window will appear Antivirus 135 BitDefender Internet Security 2009 BitDefender New Task x Overview Paths Scheduler Logs Task properties Task name Desktop Last Run never Scheduled No Scanning options High MEDIUM Recommended for most users di Scan all files Medium Scan for viruses and spyware Low B Run the task with low priority C Minimize to tray Shut down computer when scan completes if no threats are Found Q This is where the main characteristics of a new scan task including s
242. rts send to the BitDefender Labs reports regarding the viruses identified in your computer m Enable BitDefender Outbreak Detection send to the BitDefender Labs reports regarding potential virus outbreaks Note The reports will contain no confidential data such as your name or IP address and they will not be used for commercial purposes Click Next to continue Installing BitDefender 19 BitDefender Internet Security 2009 2 2 7 Step 7 9 Select the Tasks to Be Run Bit Defender Internet Security 2009 UE BitDefender Configuration Wizard Step 7 of 9 Step 8 Step 9 Select Tasks We recommend you to update BitDefender and to run a system scan before you continue This will ensure that your system is protected right From the beginning IF you skip these tasks BitDefender will notify you that there are pending issues on your system Scheduling a daily scan at 2 AM will ensure that your system is virus free and that all your files are analyzed with the latest antimalware signatures IF you want to change the scheduling options later on please access Advanced view gt Antivirus gt Virus Scan v Update BitDefender w Run a quick system scan vi Run a full system scan every day at 2 AM Q Cbitdefender EE Next Cancel Task Selection Set BitDefender Internet Security 2009 to perform important tasks for the security of your system The following options are available m Update the BitDefender engines may requir
243. ry of this computer Nope dick Runan Update on this computer now EID Apply Profile Set this computer as Update Server of this Network Q This item represents a computer in your home network To add a PC you have to join or create a network by clicking on Join Create Network 2 C bitdefender Buy My Account Register Help Support Histor Network Map If you move the mouse cursor over a computer from the network map you can see brief information about it name IP address number of issues affecting the system security BitDefender registration status If you right click a computer name in the network map you can see all the administrative tasks you can run on the remote computer m Register this computer m Set the settings password m Run a scan task m Fix issues on this computer m Show history of this computer m Run an update on this computer now m Apply profile m Run a Tuneup task on this computer m Set this computer as Update Server of this Network Network 98 BitDefender Internet Security 2009 Before running a task on a specific computer you will be prompted to provide the local home management password BitDefender You must enter the home management password Password eeecccce E Don t show this message again this session ELEN os Enter Password Type the home management password and click OK Note f you plan to run several tasks you might want to select
244. s S or Encryption 241 BitDefender Internet Security 2009 3 Click OK to change the password 21 2 5 Adding Files to a Vault To add files to a vault follow these steps 1 Click Add file A new window will appear 2 Select the files folders you want to add to the vault 3 Click OK to copy the selected objects into the vault Note You cannot add system or application files to a vault 21 2 6 Removing Files from a Vault To remove a file from a vault follow these steps 1 Select from the vaults table the vault containing the file to be removed 2 Select the file to be removed from the table that displays the vault content 3 Click x Remove file Note 63 If the vault is open you can directly remove files from the virtual disk drive assigned to the vault Encryption 242 BitDefender Internet Security 2009 22 Vulnerability An important step in protecting your computer against malicious persons and applications is to keep up to date the operating system and the applications you regularly use Moreover to prevent unauthorized physical access to your computer strong passwords passwords that cannot be easily guessed must be configured for each Windows user account BitDefender regularly checks your system for vulnerabilities and notifies you about the existing issues 22 1 Status To configure the automatic vulnerability checking or run a vulnerability check go to Vulnerability g
245. s These files will appear in the report file Move files to Quarantine Moves hidden files into the quarantine Quarantined files cannot be executed or opened therefore the risk of getting infected disappears Make visible Reveals hidden files so that you can see them Archived files action options Scanning and handling files inside archives are subject to restrictions Password protected archives cannot be scanned unless you provide the password Depending on the archive format type BitDefender may not be able to disinfect isolate or delete infected archived files Configure the actions to be taken on the archived files detected using the appropriate options from the Archived files action options category o Select the action to be taken on the infected files detected The following options are available 141 BitDefender Internet Security 2009 Action Description Take no action Only keep record of infected archived files in the scan log After the scan is completed you can open the scan log to view information on these files Disinfect files Remove the malware code from the infected files detected Disinfection may fail in some cases such as when the infected file is inside specific mail archives Delete files Immediately remove infected files from the disk without any warning Move files to Quarantine Move infected files from their original location to the quarantine folder Quarantined files cannot be execute
246. s on demand on access or both Click the text in each cell in the right column of the table below and select the option that best suits your needs Selected objects When to apply c documents and settings ydanciu desktop eicar_test On access Please choose the exceptions For the scanning process carefully and remember that it is recommended not to define any exception in order to be sure that your system is fully protected bitdefender as nee S conce Scanning Type You can see a table containing the paths to be excluded from scanning and the type of scanning they are excluded from By default the selected paths are excluded from both on access and on demand scanning To change when to apply the exception click on the right column and select the desired option from the list Click Next Antivirus 160 BitDefender Internet Security 2009 Step 4 4 Scan Excluded Files Bit Defender Internet Security 2009 mA Exclusions Wizard Step 4 of 4 Finish We recommend you to perform an on demand task of the excluded target to make sure that your computer is virus free Please note that if you choose to go on with the scanning task an on demand scan wizard will be displayed At the end of the wizard you will be requested to choose the actions to be taken in case viruses are found LJ Select this if you want the scanning task to be started when you click finish Please choose the exceptions for the scanning
247. s Mail is that the SPAM messages are moved in the Spam folder for Microsoft Outlook while for Outlook Express Windows Mail they are moved in the Deleted Items folder In both cases the messages are tagged as SPAM in the subject line The Spam folder is created automatically by BitDefender in Microsoft Outlook and is listed at the same level with the items from the Folder list Calendar Contacts etc Each button from the BitDefender toolbar will be explained below m amp Ils Spam sends a message to the Bayesian module indicating that the selected e mail is spam The e mail will be tagged as SPAM and moved to the Spam folder The future e mail messages that fit the same patterns will be tagged as SPAM Note You can select one e mail or as many e mail messages as you want m t Not Spam sends a message to the Bayesian module indicating that the selected e mail is not spam BitDefender shouldn t have tagged it The e mail will be moved from the Spam folder to the Inbox directory The future e mail messages that fit the same patterns will no longer be tagged as SPAM Getting Started 36 BitDefender Internet Security 2009 Note 63 You can select one e mail or as many e mail messages as you want Important e The amp Not Spam button becomes active when you select a message marked as SPAM by BitDefender normally these messages are located in the Spam folder m amp Add spammer adds the sender of the selected e m
248. s and actions on this computer remotely v I want to be a part of the BitDefender Home Network Home Management password Re type password Q bitdefender EL e EBENEN BitDefender Network Configuration BitDefender enables you to create a virtual network of the computers in your household and to manage the BitDefender products installed in this network If you want this computer to be part of the BitDefender Home Network follow these steps 1 Select want to be a part of the BitDefender Home Network 2 Type the same administrative password in each of the edit fields e Important The password enables an administrator to manage this BitDefender product from another computer Click Next to continue 13 BitDefender Internet Security 2009 2 2 4 Step 4 9 Configure Identity Control Bit Defender Internet Security 2009 mE BitDefender Configuration Wizard Step 4 of 9 Step 5 Step 6 Step 7 Step 8 Step 9 Manage Identity Rules Page The BitDefender Identity Control module helps you keep your confidential data safe and it protects you against the theft of sensitive data such as your credit card number e mail address etc It will also help you maintain the confidentiality of your data by scanning all web and e mail traffic For specific strings In order to use this module you need to enable and configure Identity control All information that you enter here will be encrypted with under your account credenti
249. s list will automatically be delivered to your Inbox without further processing To configure the Friends list click Manage Friends or click the amp Friends button from the Antispam toolbar Configure the Friends List x Email address Domain name C When load empty current list 2 ere Se Remove Clearlist Save Load Q a ce NNCCANN Friends List Here you can add or remove entries from the Friends list If you want to add an e mail address check the Email address option type in the address and click The address will appear in the Friends list Important e Syntax name domain com Antispam 175 BitDefender Internet Security 2009 If you want to add a domain check the Domain name option type in the domain and click 3 The domain will appear in the Friends list Important D Syntax m domain com domain com and domain com all the received e mail messages from domain com will reach your Inbox regardless of their content m domain all the received e mail messages from domain no matter the domain suffixes will reach your Inbox regardless of their content m com all the received e mail messages having the domain suffix com will reach your Inbox regardless of their content To delete an item from the list select it and click t Remove button If you click C Clear list button you will delete all entries from the list bu
250. s to be scanned If the size is O Kb all files will be scanned regardless their size Type in the maximum size of the archives to be scanned in kilobytes KB If you want to scan all archives regardless of their size type 0 If this option is enabled BitDefender will not scan the network shares allowing for a faster network access We recommend you to enable this option only if the network you are part of is protected by an antivirus solution m Scan e mail traffic scans the e mail traffic LR ON Scan incoming mails Scan outgoing mails Scans all incoming e mail messages Scans all outgoing e mail messages m Scan http traffic scans the http traffic m Show warning when a virus is found opens an alert window when a virus is found in a file or in an e mail message 126 BitDefender Internet Security 2009 For an infected file the alert window will contain the name of the virus the path to it the action taken by BitDefender and a link to the BitDefender site where you can find more information about it For an infected e mail the alert window will contain also information about the sender and the receiver In case a suspicious file is detected you can launch a wizard from the alert window that will help you to send that file to the BitDefender Lab for further analysis You can type in your e mail address to receive information regarding this report m Scan files received sent over IM To scan the files
251. s used for HTTP traffic Report file A file that lists actions that have occurred BitDefender maintains a report file listing the path scanned the folders the number of archives and files scanned how many infected and suspicious files were found Rootkit A rootkit is a set of software tools which offer administrator level access to a system The term was first used for the UNIX operating systems and it referred to recompiled tools which provided intruders administrative rights allowing them to conceal their presence so as not to be seen by the system administrators The main role of rootkits is to hide processes files logins and logs They may also intercept data from terminals network connections or peripherals if they incorporate the appropriate software Rootkits are not malicious in nature For example systems and even some applications hide critical files using rootkits However they are mostly used to hide malware or to conceal the presence of an intruder into the system When combined with malware rootkits pose a great threat to the integrity and the security of a system They can monitor traffic create backdoors into the system alter files and logs and avoid detection Script Another term for macro or batch file a script is a list of commands that can be executed without user interaction Glossary 301 BitDefender Internet Security 2009 Spam Electronic junk mail or junk newsgroup postings Generally known as
252. s when web access is allowed Intervals S ML T W To LE 15 n 00 00 01 00 01 00 02 00 02 00 03 00 03 00 04 00 04 00 05 00 05 00 06 00 06 00 07 00 07 00 08 00 08 00 09 00 09 00 10 00 Legend 10 00 11 00 White means allowed 11 00 12 00 iw BB Grey means blocked E tonis Q Close Web Time Limiter To enable this protection select the check box corresponding to Enable Web Time Limiter Select the time intervals when all the internet connections will be blocked You can click individual cells or you can click and drag to cover longer periods Also you can click Check all to select all the cells and implicitly to block all the web access If you click Uncheck all the internet connections will be permitted all the time Important The boxes coloured in grey represent the time intervals when all internet connections are blocked Click Apply to save the changes Parental Control 197 BitDefender Internet Security 2009 19 Privacy Control BitDefender monitors dozens of potential hotspots in your system where spyware might act and also checks any changes made to your system and software It is effective in blocking Trojan horses and other tools installed by hackers who try to compromise your privacy and send your personal information like credit card numbers from your computer to the hacker 19 1 Privacy Control Status To configure the
253. se key click the provided link to go to the BitDefender online store and buy one Click Finish Registration 111 BitDefender Internet Security 2009 14 History The History link at the bottom of the BitDefender Security Center window opens another window with the BitDefender history amp events This window offers you an overview of the security related events For instance you can easily check if the update was successfully performed if malware was found on your computer etc f x BitDefender History amp Events Module Antivirus Real time protection Firewall Name of the action Action Taken Date and time Antispam Priva Parental C Update Network IM Encryption File Vault On demand tasks Name of the action Task name Date and time Scan stopped by user Desktop 7 17 2008 11 22 57 PM Vulnerability o Click the events in the list to view their details A bitdefender EIN E Events In order to help you filter the BitDefender history amp events the following categories are provided on the left side m Antivirus m Firewall m Antispam m Privacy Control m Parental Control m Update m Network 112 History BitDefender Internet Security 2009 m File Vault A list of events is available for each category Each event comes with the following information a short description the action BitDefender took on it when it happened and the date and time when i
254. select Yes 20 2 4 Network Zones You can add allowed or blocked computers for a specific adapter A trusted zone is a computer that you fully trust All traffic between your computer and an trusted computer is allowed To share resources with specific computers in an unsecured wireless network add them as allowed computers A blocked zone is a computer that you do not want to communicate at all with your computer The Zones table displays the current network zones per adapter To add a zone click the Add button Firewall 223 BitDefender Internet Security 2009 BitDefender add Zone x Zone 10 10 100 49 10 10 100 58 10 10 100 43 10 10 100 41 10 10 100 40 10 10 100 27 10 10 100 26 10 10 100 24 10 10 100 23 10 10 100 14 10 10 100 8 10 10 100 4 10 10 100 3 10 10 100 1 v Action O Allow Deny n Add zone Proceed as follows 1 Select the IP address of the computer you want to add 2 Select the action m Allow to allow all traffic between your computer and the selected computer m Deny to block all traffic between your computer and the selected computer 3 Click OK 20 3 Rules To manage the firewall rules controlling applications access to network resources and Internet go to Firewall gt Rules in the Advanced View Firewall 224 Firewall BitDefender Internet Security 2009 BitDefender Internet Security 2009 Trial a STATUS There is 1 pending issue
255. sily notice in the upper part of the window there are a button and a status bar Item Description Switch to Basic View Opens the Basic View window This is where you can see Status the basic BitDefender interface including the main modules Security Tune Up File Manager Network and a dashboard The BitDefender will remember this option the next time you will open the user interface Contains information about and helps you fix the security vulnerabilities of your computer m On the left side of the window there is a menu containing all security modules Getting Started 30 BitDefender Internet Security 2009 Module Description General Allows you to access the general settings or to view the dashboard and detailed system info Antivirus Allows you to configure your virus shield and scanning operations in detail to set exceptions and to configure the quarantine module Antispam Allows you to keep your Inbox to be SPAM free and also to configure the antispam settings in detail Firewall Allows you to protects your computer from inbound and outbound unauthorized connection attempts It is quite similar to a guard at your gate it will keep a watchful eye on your Internet connection and keep track of who to allow access to the Internet and who to block Privacy Control Allows you to prevent data theft from your computer and protect your privacy while you are online Parental Control Allows you to protect
256. spective line must look like this BROWN HttpProxy myuser mypassword proxy company com 8080 6 Press F2 to save the current file confirm saving and then press F10 to close it 7 Type the command bdscan update 29 6 How do save my data Let s assume that you cannot start your Windows PC due to some unknown issues At the same time you desperately need to access some important data from your computer This is where BitDefender Rescue CD comes in handy BitDefender Rescue CD Howto 294 BitDefender Internet Security 2009 To save your data from the computer to a removable device such as an USB memory stick just follow these steps 1 Put the BitDefender Rescue CD in the CD drive the memory stick into the USB drive and then restart the computer Note C3 If you plug the memory stick at a later moment you have to mount the removable device by following these steps a Double click the Terminal Emulator shortcut on the Desktop b Type the following command mount media sdb1 Please be aware that depending on your computer configuration it might be sda1 instead of sdb1 2 Waituntil BitDefender Rescue CD finishes booting The following window will appear Desktop Screen 3 Double click the partition where the data you want to save is located e g sda3 BitDefender Rescue CD Howto 295 BitDefender Internet Security 2009 Note C3 When working with BitDefender Rescue CD you will de
257. ssible Note e If you are connected to the Internet through a dial up connection then it is recommended I to regularly update BitDefender by user request 25 1 2 Disabling Automatic Update If you want to disable automatic update a warning window will appear BitDefender V This option will disable the Automatic Update For how long do you want to disable the Automatic Update 5 minutes v ao Disable Automatic Update You must confirm your choice by selecting from the menu how long you want the automatic update to be disabled You can disable the automatic update for 5 15 or 30 minutes for an hour permanently or until the system restart Warning This is a critical security issue We recommend you to disable automatic update for as little time as possible If BitDefender is not updated regularly it will not be able to protect you against the latest threats 267 BitDefender Internet Security 2009 25 2 Update Settings The updates can be performed from the local network over the Internet directly or through a proxy server By default BitDefender will check for updates every hour over the Internet and install the available updates without alerting you To configure the update settings and manage proxies go to Update gt Settings in the Advanced View BitDefender Internet Security 2009 Trial mE STATUS There is 1 pending issue FIX ALL ISSUES Update Settings
258. st specify them in the corresponding fields Note The supported web browsers are Internet Explorer Mozilla Firefox and Opera If you use another browser by default BitDefender will not be able to obtain the proxy settings of the current user m Your own set of proxy settings proxy settings that you can configure if you are logged in as an administrator Update 271 BitDefender Internet Security 2009 The following settings must be specified Address type in the IP of the proxy server Port type in the port BitDefender uses to connect to the proxy server Username type in a user name recognized by the proxy Password type in the valid password of the previously specified user When trying to connect to the Internet each set of proxy settings is tried at a time until BitDefender manages to connect First the set containing your own proxy settings will be used to connect to the Internet If it does not work the proxy settings detected at installation time will be tried next Finally if those do not work either the proxy settings of the current user will be taken from the default browser and used to connect to the Internet Click OK to save the changes and close the window Click Apply to save the changes or click Default to load the default settings Update 272 BitDefender Internet Security 2009 26 Registration To find complete information on your BitDefender product and the registration s
259. stant Messaging IM Control allows you to specify the IM contacts your children are allowed to chat with Parental Control 194 BitDefender Internet Security 2009 Note The IM Control is only available for Yahoo Messenger and Windows Live MSN Messenger To configure IM Control for a specific user account double click the respective user and click the IM Traffic tab BitDefender 2009 Parental Control x Status Web Applications Keywords IM Traffic Time limiter V Enable Instant Messaging control Deny or allow chat with the following IM contacts Contact name IM Application Action user_id yahoo com Yahoo Deny X Block all IM users that are not in this list Q Instant Messaging Control Select the Enable Instant Messaging Control check box if you want to use this control feature You must add rules to specify the IM contacts the user is allowed or not to chat with To add a rule click the Add button and configure the rule parameters in the configuration window To delete a rule select it and click the Delete button To edit an existing rule double click the rule or click the Edit button and make the desired changes in the configuration window If you have defined all IM contacts the user is allowed to chat with select Block all IM users that are not in this list In this way only the IM contacts explicitly allowed can send instant messages to the user Parental Control 195 BitDefen
260. stions are answered in a timely manner With BitDefender dedication to saving customers time and money by providing the most advanced products at the fairest prices has always been a top priority Moreover we believe that a successful business is based on good communication and commitment to excellence in customer support You are welcome to ask for support at support bitdefender com at any time For a prompt response please include in your email as many details as you can about your BitDefender your system and describe the problem you have encountered as accurately as possible 27 1 BitDefender Knowledge Base The BitDefender Knowledge Base is an online repository of information about the BitDefender products It stores in an easily accessible format reports on the results of the ongoing technical support and bugfixing activities of the BitDefender support and development teams along with more general articles about virus prevention the management of BitDefender solutions with detailed explanations and many other articles The BitDefender Knowledge Base is open to the public and freely searchable The extensive information it contains is yet another means of providing BitDefender customers with the technical knowledge and insight they need All valid requests for information or bug reports coming from BitDefender clients eventually find their way into the BitDefender Knowledge Base as bugfix reports workaround cheatsheets or infor
261. sword when enabling Parental Control Parental Control 185 BitDefender Internet Security 2009 To ensure that you are the only one that changes the Parental Control settings we recommend that you enable password protection By default this will only protect the parental module but you can change this from the Advanced Settings window Would you like to set a pasword now Password Retype password Password must have at least 8 characters Don t ask for a password when enabling Parental Control Q as QNI Set Password Protection To set the password protection do the following 1 Type the password in the Password field 2 Type the password again in the Retype Password field to confirm it 3 Click OK to save the password and close the window Once you set the password if you want to change the Parental Control settings you will be asked to provide the password The other system administrators if any will also have to provide this password in order to change the Parental Control settings Note This password will not protect other BitDefender settings In case you do not set a password and you do not want this window to appear again check Don t ask for a password when enabling Parental Control 18 1 2 Configuring Heuristic Web Filtering The heuristic web filter analyzes web pages and blocks those that match the patterns of potentially inappropriate content Parental Control 186
262. t History The columns in the Network Configuration table provide detailed information on the network you are connected to m Adapter the network adapter your computer uses to connect to the network or the Internet m Type the trust level assigned to the network adapter Depending on the network adapter configuration BitDefender may automatically assign the adapter a trust level or prompt you for more information m Stealth whether you can be detected by other computers m Generic whether generic rules are applied to this connection Firewall 221 BitDefender Internet Security 2009 m Addresses the IP address configured on the adapter m Gateways the IP address your computer uses to connect to Internet 20 2 1 Changing the Trust Level BitDefender assigns each network adapter a trust level The trust level assigned to the adapter indicates how trustworthy the respective network is Based on the trust level specific rules are created for the adapter regarding how the System and BitDefender processes access the network and the Internet You can see the trust level configured for each adapter in the Network Configuration table under the Type column To change the trust level click the arrow from the Type column and select the desired level Full Trust Disable the firewall for the respective adapter Trusted Local Allow all traffic between your computer and computers in the local network Safe Allo
263. t Register Help Support Histor Automatic Update Here you can see when the last check for updates and the last update were performed as well as information about the last update performed if successful or the errors that occurred Also information about the current engine version and the number of signatures is displayed If you open this section during an update you can see the download status Important O To be protected against the latest threats keep the Automatic Update enabled You can get the malware signatures of your BitDefender by clicking Show Virus List An HTML file that contains all the available signatures will be created and opened in a web browser You can search through the database for a specific malware signature or click BitDefender Virus List to go to the online BitDefender signature database Update 266 BitDefender Internet Security 2009 25 1 1 Requesting an Update The automatic update can be done anytime you want by clicking Update Now This update is also known as Update by user request The Update module will connect to the BitDefender update server and will verify if any update is available If an update was detected depending on the options set in the Manual Update Settings section you will be asked to confirm the update or the update will be made automatically Important It may be necessary to restart the computer when you have completed the update We recommend doing it as soon as po
264. t Status in the Advanced View BitDefender Internet Security 2009 Trial a STATUS There is 1 pending issue Ez Status Settings General mE v Automatic Vulnerability Checking is enabled Antispam iini rol Last Vulnerability Check Status Firewall Vulnerability Encryption Game Laptop Mode Network Update Registration Q Click here to configure the Vulnerability module in detail a Sbitdefender Buy My Account Register Help Support Histor Vulnerability Status Vulnerability 243 BitDefender Internet Security 2009 The table displays the issues covered in the last vulnerability check and their status You can see the action you have to take to fix each vulnerability if any If the action is None then the respective issue does not represent a vulnerability Important To be automatically notified about system or application vulnerabilities keep the Automatic Vulnerability Checking enabled 22 1 1 Fixing Vulnerabilities To fix a specific vulnerability double click it and depending on the issue proceed as follows m If Windows updates are available click Install All System Updates to install them m f an application is outdated use the Home Page link provided to download and install the latest version of that application m f a Windows user account has a weak password force the user to change the password at the next logon or change the password yourself You c
265. t notice it is impossible to recover them Use the Save amp Load buttons to save load the Friends list to a desired location The file will have bw1 extension To reset the content of the current list when you load a previously saved list select When load empty current list Note We recommend that you add your friends names and e mail addresses to the Friends list BitDefender does not block messages from those on the list therefore adding friends helps ensure that legitimate messages get through Click Apply and OK to save and close the Friends list 17 2 3 Configuring the Spammers List The Spammers list is a list of all the e mail addresses from which you don t want to receive messages regardless of their content Note Any e mail message received from an address contained in the Spammers list will be automatically marked as SPAM without further processing To configure the Spammers list click Manage Spammers or click the amp Spammers button from the Antispam toolbar Antispam 176 BitDefender Internet Security 2009 Configure the Spammers List x S Email address Domain name C When load empty current list ie et Si amp Remove Clearlist Save Load Q a NECCUNN Spammers List Here you can add or remove entries from the Spammers list If you want to add an e mail address check the Email address option type in the address and click The ad
266. t occurred If you want to find out more information about a particular event in the list double click that event Click Clear Log if you want to remove old logs or Refresh to make sure the latest logs are displayed History 113 BitDefender Internet Security 2009 Advanced Administration 114 BitDefender Internet Security 2009 15 General The General module provides information on the BitDefender activity and the system Here you can also change the overall behavior of BitDefender 15 1 Dashboard To see product activity statistics and your registration status go to General gt Dashboard in the Advanced View BitDefender Internet Security 2009 Trial ahs Dashboard Settings SysInfo General Aus Statistics Overview ERES Scanned files 0 Last update 7 17 2008 10 40 PM Parental C ol Disinfected files 0 MyAccount No account Privacy Control Detected viruses 0 Registration Trial Firewall Last scan Never Expires in Vulnerability Next scan Never 30 days Encryption File Activity Network Activity Game Laptop Mode Network Update Registration 135208020002 800021292300 806 Q Click here to access the general settings or to view the dashboard and detailed system info a bitdefender Buy My Account Register Help Support Histor Dashboard The dashboard consists of several sections m Statistics Displays important information regarding the BitDefender activity m Overview Disp
267. tDefender Internet Security 2009 increased You can also add addresses from your Address Book to your Friends list Spammers list m BitDefender Antispam opens the BitDefender user interface 5 7 2 Antispam Configuration Wizard The first time you run your mail client after you have installed BitDefender a wizard will appear helping you to configure the Friends list and the Spammers list and to train the Bayesian filter in order to increase the efficiency of the Antispam filters Note The wizard can also be launched any time you want by clicking the amp Wizard button from the Antispam toolbar Step 1 6 Welcome Window BitDefender 2009 Welcome to Antispam Optimization Wizard Step 1 of 6 Welcome to Antispam Optimization Wizard Step2 Step 3 Step 4 Steps Step 6 This is the BitDefender Antispam wizard It will quide you through the process of training the Learning Bayesian Filter so that the efficiency of BitDefender Antispam is Further increased The Learning Engine is a tool that automatically detects potential spam based on a predefined set of rules You can also define your own Spammers or Friends list Q bitdefender Welcome Window a a oo Click Next Getting Started 43 BitDefender Internet Security 2009 Step 2 6 Fill in the Friends List BitDefender 2009 Add your contacts to friends list X Step 2 of 6 Add your contacts to friends list EE Step steps step You can automatical
268. tDefender icon to open it m Shut down the computer when scan completes if no threats are found Click OK to save the changes and close the window To run the task just click Scan Customizing Scan Level Advanced users might want to take advantage of the scan settings BitDefender offers The scanner can be set to scan only specific file extensions to search for specific malware threats or to skip archives This may greatly reduce scanning times and improve your computer s responsiveness during a scan Click Custom to set your own scan options A new window will appear Antivirus 137 BitDefender Internet Security 2009 BitDefender Custom Settings x iE v Scan for viruses Scan for adware Scan for spyware Scan for application Scan for dialers Scan for rootkits B Virus scanning options Scan files Open packed programs RIE M a gm V iV O Open archives Open email archives Scan boot sectors Scan memory v Scan registry Scan cookies B Action options Ei Action to take when an infected file is found II Action lt Disinfect files gt B Action to take when a suspect file is found II Action Take No Action mos Action fn taka when a hidden fla ic fad 0 V kal E IE Com m 2 Default Px Scan Settings The scan options are organized as an expandable menu very similar to those used for exploration in
269. tatus go to Registration in the Advanced View BitDefender Internet Security 2009 Trial SWITCH TO BASIC VIEW eae STATUS There is 1 pending issue m Registration General Antivirus Product Informations Anispam BitDefender Internet Security 2009 Version 12 0 8 Parental Ci Privacy Control rivacy Control Registration Information Firewall n x Expires in 30 days Vulnerability eee License key BE1B40987E067AD03090 Encryption Game Laptop Mode REGGAE Update Registration This is data about your BitDefender version about the registration and validity of the license key You can also create your BitDefender account and register your product if the case C bitdefender Buy My Account Register Help Support Histor Registration This section displays m Product Information the BitDefender product and version m Registration Information the e mail address used to log your BitDefender account if configured the current license key and how many days are left until the license expires 26 1 Registering BitDefender Internet Security 2009 Click Register now to open the product registration window Registration 273 BitDefender Internet Security 2009 Bit Defender Internet Security 2009 a Registration Wizard Step 1 Welcome to the BitDefender Registration Wizard This is where you can find your This wizard will help you register BitDefender and create or update your BitDefender
270. tempt to boot from a diskette infected with a boot sector virus will cause the virus to become Glossary 297 BitDefender Internet Security 2009 active in memory Every time you boot your system from that point on you will have the virus active in memory Browser Short for Web browser a software application used to locate and display Web pages The two most popular browsers are Netscape Navigator and Microsoft Internet Explorer Both of these are graphical browsers which means that they can display graphics as well as text In addition most modern browsers can present multimedia information including sound and video though they require plug ins for some formats Command line In a command line interface the user types commands in the space provided directly on the screen using command language Cookie Within the Internet industry cookies are described as small files containing information about individual computers that can be analyzed and used by advertisers to track your online interests and tastes In this realm cookie technology is still being developed and the intention is to target ads directly to what you ve said your interests are It s a double edge sword for many people because on one hand it s efficient and pertinent as you only see ads about what you re interested in On the other hand it involves actually tracking and following where you go and what you click Understandably so there is a debate over
271. tep if you want to pass over this step Click Back to go to the previous step or click Next to continue the wizard Getting Started 47 BitDefender Internet Security 2009 Step 6 6 Summary 5 8 BitDefender 2009 Optimizations chosen by you x Step 6 of 6 Optimizations chosen by you Email addresses from Address Book were selected to be added to the friends list The option to reset the Learning Engine Bayesian content was not selected Folder Inbox was selected to train the Learning Engine Bayesian Also the resulting addresses will be added to the Friends list Folder Deleted Items was selected to train the Learning Engine Bayesian Also the resulting addresses will be added to the spammers list 0 a Close this dialog when training completes Q bitdefender oe Summary Here you can view all the settings for the configuration wizard You can make any changes by returning to the previous steps click Back If you do not want to make any modifications click Finish to end the wizard Integration into Web Browsers BitDefender protects you against phishing attempts when you are surfing the Internet It scans the accessed web sites and alerts you if there are any phishing threats A White List of web sites that will not be scanned by BitDefender can be configured BitDefender integrates directly through an intuitive and easy to use toolbar into the following web browsers m Internet Explorer m Mozilla Fir
272. the case when you create a rule that prevents your credit card number from being sent over HTTP web Whenever your credit card number is submitted on a website from your user account the respective page is blocked If you want for example to buy footwear from an online shop which you know to be secure you will have to specify an exception to the respective rule To open the window where you can manage exceptions click Exceptions Add Exception Allowed Web e mail address Exception Type Q n n Identity Control Exceptions To add an exception follow these steps 1 Click the Add button to add a new entry in the table 2 Double click Specify allowed address and provide the web address or the mail address that you want to add as exception 16 BitDefender Internet Security 2009 3 Double click Choose type and choose from the menu the option corresponding to the type of address previously provided m f you have specified a web address select HTTP m f you have specified an e mail address select SMTP To remove an exception select it and click the Remove button Click OK to close the window 2 2 5 Step 5 9 Configure Parental Control Bit Defender Internet Security 2009 E BitDefender Configuration Wizard Step 5 of 9 Step 6 step 7 step 6 Step 9 BitDefender Parental Control BitDefender Parental Control enables you to control the access to the Internet and to specific applications For each user ho
273. the corresponding checkbox Click Apply to save the changes Parental Control 191 BitDefender Internet Security 2009 18 3 1 Configuration Wizard The configuration wizard is a 1 step procedure Step 1 1 Select Application to Block Enter application name Browse C Documents and Settings vdanciu Desktop game i Click browse to select a program file Important The files blocked in this manner are also protected from modifications and cannot be copied or moved Q Finish Select Application to Block Click Browse select the application to be blocked and click Finish 18 4 Keyword Filtering The Keyword Filtering helps you block users access to e mail messages web pages and instant messages that contain specific words Using the Keyword Filtering you can prevent your children from seeing inappropriate words or phrases when they are online Note The instant messaging Keyword Filtering is only available for Yahoo Messenger and Windows Live MSN Messenger To configure the Keyword Filtering for a specific user double click the respective user and click the Keywords tab Parental Control 192 BitDefender Internet Security 2009 BitDefender 2009 Parental Control di Status Web Applications Keywords IM Traffic Time limiter iv Enable Keyword Filtering Block web pages and e mail messages which contain these words gt Word HTTP POPS IM Match
274. tical information regarding the rate at which specific words appear in messages Classified SPAM as compared to those declared NON SPAM by you or by the heuristic filter A Spam score will be added to the e mail If the aggregate score URL score heuristic score Bayesian score exceeds the SPAM score for a message set by the user in the Status section as a tolerance level the message is considered SPAM Important O If you are using other email client than Microsoft Outlook or Microsoft Outlook Express A you should create a rule to move the e mail messages tagged as SPAM by BitDefender to a custom quarantine folder BitDefender appends the prefix SPAM to the subject of the messages considered to be SPAM Antispam 172 17 2 Status To configure the Antispam protection go to Antispam gt Status in the Advanced View BitDefender Internet Security 2009 Trial STATUS There is 1 pending issue FIX ALL ISSUES Status Settings General Antivirus Antispam Parental Control Privat Firewall Vulnerability Encryption Game Laptop Mode Network Update Registration BitDefender Internet Security 2009 Antispam is enabled Friends list Spammers list Protection Level M Aaaressive Moderate Permissive Antispam Statistics Received e mails this session Spam e mails this session Total e mails received Total spam e mails SWITCH TO BASIC VIEW xX 0 Manage
275. tion Description Permit The scripts on that domain will execute Deny The scripts on that domain will not execute Click Finish Privacy Control 215 BitDefender Internet Security 2009 20 Firewall The Firewall protects your computer from inbound and outbound unauthorized connection attempts It is quite similar to a guard at your gate it will keep a watchful eye on your Internet connection and keep track of who to allow access to the Internet and who to block Note A firewall is essential if you have a broadband or DSL connection In Stealth Mode your computer is hidden from malicious software and hackers The firewall module is capable of automatically detecting and protecting against port scans streams of packets sent to a machine in order to find access points often in preparation for an attack 20 1 Settings To configure the firewall protection go to Firewall gt Settings in the Advanced View Firewall 216 BitDefender Internet Security 2009 BitDefender Internet Security 2009 Trial SWITCH TO BASIC VIEW x STATUS There is 1 pending issue Settings Network Rules Activity General Antivirus v Firewall is enabled Computer name BDENTLAPS XP Bytes sent 1 1 MB 0 0 Bjs Co Computer IPs 10 10 15 29 16 Bytes received 10 6 MB 338 0 B s Gateways 10 10 0 1 Portscans detected 0 Privacy Control Packets dropped 1073 i Opened ports 12 Firewall Incoming connections 0 m Outgoing conn
276. ts after a task has run right click the task and select Logs The following window will appear BitDefender New Task x Overview Paths Scheduler Logs Status Date amp Time Summary EEZ Q Scan Pox Scan Logs Here you can see the report files generated each time the task was executed For each file you are provided with information on the status of the logged scanning process the date and time when the scanning was performed and a summary of the scanning results Antivirus 154 BitDefender Internet Security 2009 Two buttons are available m Delete to delete the selected scan log m Show to view the selected scan log The scan log will open in your default web browser Note Also to view or delete a file right click the file and select the corresponding option from the shortcut menu Click OK to save the changes and close the window To run the task just click Scan Scan Log Example The following figure represents an example of a scan log BitDefender Log File File Edit View Favorites Tools Help x A Posen she Favorites 42 So ee S Address E Documents and Settings test Application Data BitDefender Desktop Profiles Logs user_0001 1216326177_3_00 xml BitDefender Log File Product BitDefender Internet Security 2009 Version BitDefender UIScanner 12 Scanning task Desktop Log date 23 22 57 17 07 2008 Log path E Documents and Settings test Application Data B
277. ts objects stored on your computer files registry memory etc Online security This is where you can check the status of each security modules that protects your online transactions and your computer while connected to internet Vulnerability scan This is where you can check whether crucial software on your PC is up to date Passwords to Windows accounts are checked against security rules Click the box labeled to open a category or click the one labeled to close it 7 1 1 Local security We know it s important to be noticed whenever a problem can affect your computer s security By monitoring each security modules BitDefender Internet Security 2009 will let you know not only when you configure the settings that might affect your computer s security but when you forget to do important tasks The issues concerning local security are described in very explicit sentences In line with each sentence if there is something that might affect your computer s security you will see a red status button called Fix Otherwise a green OK status button is displayed C Real time file Ensures that all files are scanned as they are accessed by you protection is or by an application running on this system enabled You have scanned Itis highly recommended to run an on demand scan as soon your computer for as possible to check if files stored on your computer are malware today malware free Automatic update Please keep automatic updat
278. ty 2009 BitDefender Internet Security 2009 Trial SWITCH TO BASIC VIEW x STATUS There is 1 pending issue Shield Virus Scan Exclusions Quarantine General Antivirus v Real time protection is enabled mE Last system scan never Protection Level Parental Privacy Firewall DEFAULT Standard security low use of resources YL lity i eamefobity sorae Scan all fles includes network scan Encryption Scan incoming and outgoing e mail messages Default Scan for viruses and spyware Game Laptop Mode Do not scan Web HTTP traffic Actions on infected files Disinfect file Move file to quarantine Network Permissive Scan using B HAVE heuristic analysis Scan IM traffic Update Registration CustomLevel Po Scanner Settings iv Antiphishing Protection is enabled v Antiphishing enabled for Internet Explorer Antiphishing enabled for Mozilla Firefox v Antiphishing enabled for Yahoo Messenger v Antiphishing enabled for Microsoft Windows Live Messenger Q Sbitdefender Buy My Account Register Help Support Histor Real time Protection You can see whether Real time protection is enabled or disabled If you want to change the Real time protection status clear or select the corresponding check box Important D To prevent viruses from infecting your computer keep Real time protection enabled To start a quick system scan click Scan Now 16 1 1 Configuring Protection Level You can choose the protecti
279. ty walls Greek soldiers sneak out of the horse s hollow belly and open the city gates allowing their compatriots to pour in and capture Troy Update A new version of a software or hardware product designed to replace an older version of the same product In addition the installation routines for updates often check to make sure that an older version is already installed on your computer if not you cannot install the update BitDefender has it s own update module that allows you to manually check for updates or let it automatically update the product Virus A program or piece of code that is loaded onto your computer without your knowledge and runs against your will Most viruses can also replicate themselves All computer viruses are manmade A simple virus that can copy itself over and over again is relatively easy to produce Even such a simple virus is dangerous because it will quickly use all available memory and bring the system to a halt An even more dangerous type of virus is one capable of transmitting itself across networks and bypassing security systems Virus definition The binary pattern of a virus used by the antivirus program to detect and eliminate the virus Worm Glossary A program that propagates itself over a network reproducing itself as it goes It cannot attach itself to other programs 303
280. u have more than one network adapters you can clear the Any check box and type a specific IP address If you have selected TCP or UDP as protocol you can set a specific port or a range between 0 and 65535 If you want the rule to apply to all ports select Any m Remote Address Specify the remote IP address and port the rule applies to as follows To filter traffic between your computer and a specific computer clear the Any check box and type its IP address f you have selected TCP or UDP as protocol you can set a specific port or a range between 0 and 65535 If you want the rule to apply to all ports select Any m Apply this rule only to directly connected computers Select this option when you want the rule to apply only to the local traffic attempts m Check process parent chain for the original event You can only modify this parameter if you have selected Strict automatic rules go to the Settings tab and click Advanced Settings Strict rules mean that BitDefender prompts you for action when an application request network Internet access everytime the parent process is different 20 3 4 Advanced Rule Management If you need advanced control over the firewall rules click Advanced A new window will appear Firewall 231 BitDefender Internet Security 2009 BitDefender advanced Firewall Rules Edit x Fiter on Any Adapter v Di ah SE Index Application Cmd Line CheckP Adapter Protoco Lo
281. update BitDefender 1 Double click the Update Signatures shortcut on the Desktop The following window will appear BitDefender Rescue CD Howto 293 BitDefender Internet Security 2009 Update signatures Hi this menu will help you update signatures files You can use it to set your network or to install signatures from your harddisk Network Configure network Cumulative Load cumulative zip file from harddisk owl Update Try update aqain Update Signatures 2 Do one of the following m Select Cumulative to install signatures already saved on your hard disk by browsing your computer and loading the cumulative zip file m Select Update to immediately connect to the internet and download the latest virus signatures 3 Click OK 29 5 1 How do update BitDefender over a proxy If there is a proxy server between your computer and the Internet some configurations were to be done in order to update the virus signatures To update BitDefender over a proxy just follow these steps Right click the Desktop The BitDefender Rescue CD contextual menu will appear Select Terminal as root Type the command cd ramdisk BitDefender scanner etc Type the command mcedit bdscan conf to edit this file by using GNU Midnight Commander mc 5 Uncomment the following line HttpProxy just delete the sign and specify the domain username password and server port of the proxy server For example the re
282. ure that you have an internet connection before performing this task It is highly recommended to keep BitDefender updated to ensure the security of your system Status Checking for updates File 0 Okb Total Update i 25 okb Q Cbitdefender Ln cance Updating BitDefender In this window you can see the status of the update process The update process is performed on the fly meaning that the files to be updated are replaced progressively In this way the update process will not affect product operation and at the same time all vulnerabilities will be excluded If you want to close this window just click Cancel However this will not stop the update process Note C3 If you are connected to the Internet through a dial up connection then it is recommended to regularly update BitDefender by user request Restart the computer if required In case of a major update you will be asked to restart your computer Click Reboot to immediately reboot your system If you want to reboot your system later just click OK We recommend that you reboot your system as soon as possible Dashboard 55 BitDefender Internet Security 2009 7 Security BitDefender comes with a Security module that helps you keep your BitDefender up to date and your computer virus free To enter the Security module click the Security tab BitDefender Internet Security 2009 Trial SETTINGS SWITCH TO ADVANCED VIEW PEIES STATUS There is 1 pen
283. ve X is notable for a complete lack of security controls computer security experts discourage its use over the Internet Adware Adware is often combined with a host application that is provided at no charge as long as the user agrees to accept the adware Because adware applications are usually installed after the user has agreed to a licensing agreement that states the purpose of the application no offense is committed However pop up advertisements can become an annoyance and in some cases degrade system performance Also the information that some of these applications collect may cause privacy concerns for users who were not fully aware of the terms in the license agreement Archive A disk tape or directory that contains files that have been backed up A file that contains one or more files in a compressed format Backdoor A hole in the security of a system deliberately left in place by designers or maintainers The motivation for such holes is not always sinister some operating systems for example come out of the box with privileged accounts intended for use by field service technicians or the vendor s maintenance programmers Boot sector A sector at the beginning of each disk that identifies the disk s architecture sector size cluster size and so on For startup disks the boot sector also contains a program that loads the operating system Boot virus A virus that infects the boot sector of a fixed or floppy disk An at
284. version installed that supports IM Encryption and IM Encryption is enabled for the instant messaging application used for chatting m You and your chat partner use either Yahoo Messenger or Windows Live MSN Messenger Important BitDefender will not encrypt a conversation if a chat partner uses a web based chat application such as Meebo or other chat application that supports Yahoo Messenger or MSN You can easily configure instant messaging encryption using the BitDefender toolbar from the chat window By right clicking the BitDefender toolbar you will be provided with the following options m Permanently enabling disabling encryption for a certain chat partner m Inviting a certain chat partner to use encryption m Removing a certain chat partner from Parental Control blacklist Getting Started 50 BitDefender Internet Security 2009 C hitdefender Permanently disable encryption For mariusma Invite mariusma to use encryption Add mariusma to Parental Control blacklist Instant Messaging Encryption Options Just click one of the above mentioned options in order to use it Getting Started 51 BitDefender Internet Security 2009 6 Dashboard By clicking the Dashboard tab you will be provided with meaningful product statistics and your registration status together with links to the most important on demand tasks BitDefender Internet Security 2009 Trial zx a XY amp E rity DASHBOARD SECURITY PAR
285. w neppure RARE 211 19 5 Script Control oue cr a be PR e RO eec RU RR e RO e Pot 213 19 51 Configuration Window st sni rr e Rte eR ue 214 20 Firewall esnea kevin e EE rade dux E EU ES 216 20 1 Settings ciere deci ahs Yet Dar UR ands ened Raus 216 20 1 1 Setting the Default Action oriasi se rasinn aaa cece eet eee 218 20 1 2 Configuring Advanced Firewall Settings 000ee sees 219 20 2 INGLWOIK x bcm pte pacha kann dmaeehe anna E sine aan Laas 221 20 2 1 Changing the Trust Level 00 0 cece eee cnet 222 20 2 2 Configuring the Stealth Mode 00 ccc eee eee eens 222 20 2 3 Configuring Generic Settings necne ada vec meer as 223 20 244 Network Zones c isses use rta ae Rer NR RA ORARE Y RR RERO ARE 223 20 3 RUSS 2 iae Lene dept ag E i aoa it E RE DR EAE LETE 224 20 3 1 Adding Rules Automatically s is prst inrano pannaan eee ee eee 227 20 3 2 Deleting RUES ec x pirat neon be atanag eden twain aden qure oie 227 20 3 3 Creating and Modifying Rules 0 000 eee resinen ra 227 20 3 4 Advanced Rule Management 00 cc eect e eee 231 20 4 Connection Control 15 esa a e par tm bane ach em Rar RR RR 233 21 Encryption 222 60sec svec ccs cecces eee euis uu SEERA nna coa a R SEER REN 235 21 1 Instant Messaging IM Encryption 0 000 eee ee eee 235 21 1 1 Disabling Encryption for Specific Users 00 0c e eens 237 21 2 File
286. w sharing resources with computers in the local network This level is automatically set for local home or office networks Unsafe Stop network or Internet computers from connecting to your computer This level is automatically set for public networks if you received an IP address from an Internet Service Provider Blocked Local Block all traffic between your computer and computers in the local network while providing Internet access This trust level is automatically set for unsecured open wireless networks Blocked Completely block network and Internet traffic through the respective adapter 20 2 2 Configuring the Stealth Mode Stealth Mode hides your computer from malicious software and hackers in the network or the Internet To configure the Stealth Mode click the arrow v from the Stealth column and select the desired option Firewall 222 BitDefender Internet Security 2009 On Stealth Mode is on Your computer is not visible from both the local network and the Internet Off Stealth Mode is off Anyone from the local network or the Internet can ping and detect your computer Remote Your computer cannot be detected from the Internet Local network users can ping and detect your computer 20 2 3 Configuring Generic Settings If the IP address of a network adapter is changed BitDefender modifies the trust level accordingly If you want to keep the same trust level click the arrow v from the Generic column and
287. xtensions e g Unix VMS and MS DOS They are usually from one to three letters some sad old OSes support no more than three Examples include c for C source code ps for PostScript txt for arbitrary text Heuristic A rule based method of identifying new viruses This method of scanning does not rely on specific virus signatures The advantage of the heuristic scan is that itis not fooled by a new variant of an existing virus However it might occasionally report suspicious code in normal programs generating the so called false positive IP Internet Protocol A routable protocol in the TCP IP protocol suite that is responsible for IP addressing routing and the fragmentation and reassembly of IP packets Java applet A Java program which is designed to run only on a web page To use an applet on a web page you would specify the name of the applet and the size length and width in pixels that the applet can utilize When the web page is accessed the browser downloads the applet from a server and runs it on the user s machine the client Applets differ from applications in that they are governed by a strict security protocol For example even though applets run on the client they cannot read or write data onto the client s machine Additionally applets are further restricted so that they can only read and write data from the same domain that they are served from Glossary 299 BitDefender Internet Security 200
288. y BitDefender in the Windows Start menu follow the path Start Programs BitDefender 2009 BitDefender Manual Scan The following window will appear Antivirus 149 BitDefender Internet Security 2009 Choose the object that you want to be scanned and Browse for Folder a click OK Please select the scan target ESS The BitDefender Scanner will appear and the BG 3 Floppy A scanning will be initiated For more information Es Local Disk C pem i Local Disk 0 please refer to BitDefender Scanner p 150 s Local Disk E EB CD RW Drive F GS Framework on Marketing Agency agenc m vdanciu on hafslusers Z Control Panel Mobile Device vi Cancel Manual Scanning BitDefender Scanner When you initiate an on demand scanning process the BitDefender Scanner will appear Follow the three step guided procedure to complete the scanning process Step 1 3 Scanning BitDefender will start scanning the selected objects Antivirus 150 BitDefender Internet Security 2009 BitDefender 2009 Full System Scan zx Antivirus Scan Step 1 of 3 Scan Status Current Scanned Item ef gt HKEY_LOCAL_MACHINE SYSTEM CURRENT th gt C WINDOWS SYSTEM32 DRIVERS BDFSFLTR SYS Elapsed Time 00 00 03 Files Second 8 Scan Statistics Scanned Items 24 Not Scanned Items Infected Items Suspect Items Hidden Items Hidden Processes o o o o o Antivirus scan
289. you receive or send using Yahoo Messenger or Windows Live Messenger select the corresponding check boxes Click OK to save the changes and close the window 16 1 3 Configuring the Behavioral Scanner The Behavioral Scanner provides a layer of protection against new threats for which signatures have not yet been released It constantly monitors and analyses the behavior of the applications running on your computer and alerts you if an application has a suspicious behavior The Behavioral Scanner alerts you whenever an application tries to perform a possible malicious action and prompts you for action BitDefender Behavioral Scanner If you know and trust the detected application click Allow The Behavioral Scanner will no longer scan the application BitDefender has blocked Q a possible malicious application for possible malicious behavior Di lt oxygen gt xml Editor 6 1 If you want to immediately close the application click OK Application C Program Files Oxygen 6 11 oxygen6 1 exe Biti at Behavioral Scanner Alert To configure the Behavioral Scanner click Scanner Settings Antivirus 127 BitDefender Internet Security 2009 BitDefender Behavioral Scanner Settings x X Behavioral Scanner is enabled Critical Applications are intensely monitored for possible malicious actions gt High r Medium cj Low Excluded Applications a n Path Behavioural Scanner detects pote
290. your children against inappropriate content by using your customized computer access rules Encryption Allows you to encrypt Yahoo and Windows Live MSN Messenger communications and also to local encrypt your critical files folders or partitions Vulnerability Allows you to keep crucial software on your PC up to date Game Laptop Mode Allows you to postpone the BitDefender scheduled tasks while your laptop runs on batteries and also to eliminate all alerts and pop ups when you are playing Network Allows you to configure and manage several computers in your household Update Allows you to obtain info on the latest updates to update the product and to configure the update process in detail Registration Allows you to register BitDefender Internet Security 2009 to change the license key or to create a BitDefender account m Furthermore the BitDefender Advanced View window contains several useful shortcuts Getting Started 31 BitDefender Internet Security 2009 Link Description My Account Allows you to create or to login to your BitDefender account BitDefender account provides you free access to technical support Register Allows you to enter a new license key or to view the current license key and the registration status Help Gives you access to a help file that learn you how to use BitDefender Support Allows you to contact the BitDefender support team History Allows you to see a detailed history of all tasks p

Download Pdf Manuals

image

Related Search

Related Contents

Philips Remote control for DVD recorder CRP640  Understanding Human-Battery Interaction on  Toastess CG-1174  berichte in hopex it risk management  本文 (PDF形式:208KB)  ESX Q-300.2  USER MANUAL    フレゼニウスダイアライザー FX  Culture - Seine-et  

Copyright © All rights reserved.
Failed to retrieve file