Home
Bitdefender Welding System 9 Antispyware User's Manual
Contents
1. System Info Quarantine E i Scan A H O Quick scan BitDefender can scan sit O Deep scan your system or part El of it for known Sp Scan processes spyware threats Antispyware Scanicookiss The scan uses a Cc H Scan registry constantly updated i spyware signature Scan files Advanced gt gt gt database Update 04 3 Floppy 4 El A quick scan will s Local Disk C i check critical system OB Dvo Drive D i settings and the i programs which are El currently running i A deep scan will do the same but will also i examine all the i contents of a drive or folder you choose Scan More Help Scan In this section you can configure BitDefender to scan your computer The main objective for BitDefender is to keep your computer clean of spywares This is first and foremost done by keeping new spywares out of your computer and by scanning your e mail messages and any new files downloaded or copied to your system consoe DZ Antispyware module There is a risk that a spyware is already lodged in your system before you even install BitDefender This is why it s a very good idea to scan your computer for resident spywares after you ve installed BitDefender And it s definitely a good idea to fre quently scan your computer for spywares BitDefender allows four types of on demand scan e Immediate scanning there are a few steps to follow i
2. Product installation Product installation Product installation BitDefender 9 Antispyware installation Product installation O l 1 BitDefender 9 Antispyware installation The BitDefender 9 Antispyware installation section of this user guide contains the following topics System requirements Installation steps Upgrade Removing repairing or modifying BitDefender features 1 1 System requirements To ensure a proper functioning of the product before installation verify that the following system requirements are met Minimum Processor Pentium MMX 200 MHz Minimum hard disk space 40MB Minimum RAM Memory 64MB 128MB Recommended Operating system Windows 98 ME 2000 XP Internet Explorer 5 5 1 2 Installation steps Locate the setup file and double click it This will launch a wizard which will guide you through the setup process Installation steps Ol Product BitDefender 9 Antispyware installation installation PY 19 BitDefender 9 Antispyware Setup End User License Agreement bitdefender Please read the folowing license agreement carefully BitDefender 9 Antispyol which includes License and Varranty Choose Setup Type Antispyware Choose the setup type that best suits your needs Free hourly updates IF YOU DO NOT AGREE TO THESE TERN Custom Setup US bitdefender Select the way you want features to be installed secu
3. Disk drive Download E mail Events False positive Filename extension Heuristic It s a machine that reads data from and writes data onto a disk A hard disk drive reads and writes hard disks A floppy drive accesses floppy disks Disk drives can be either internal housed within a computer or external housed in a separate box that connects to the computer To copy data usually an entire file from a main source to a peripheral device The term is often used to describe the process of copying a file from an online service to one s own computer Downloading can also refer to copying a file from a network file server to a computer on the network Electronic mail A service that sends messages on computers via local or global networks An action or occurrence detected by a program Events can be user actions such as clicking a mouse button or pressing a key or system occurrences such as running out of memory Occurs when a scanner identifies a file as infected when in fact it is not The portion of a filename following the final point which indicates the kind of data stored in the file call CVScommit Many operating systems use filename extensions e g Unix VMS and MS DOS They are usually from one to three letters some sad old OSes support no more than three Examples include c for C source code ps for PostScript txt for arbitrary text A rule based method of identifying new viruses Th
4. LICENSE PACKS If you purchase a License Pack and you have acquired this License Agreement for multiple licenses of BitDefender you may make the number of addi tional copies of the computer software portion of BitDefender specified above as License and Warranty Licensed copies You are also entitled to make a corresponding number of secondary copies for portable computer use as specified above in the section entitled Applica tion Software TERM OF LICENSE The license granted hereunder shall commence on the date that you install copy or otherwise first use BitDefender and shall continue only on the computer on which it is initially installed UPGRADES If BitDefender is labeled as an upgrade you must be properly licensed to use a product identified by SOFTWIN as being eligible for the upgrade in order to use the BitDefender An BitDefender labeled as an upgrade replaces and or supple ments the product that formed the basis for your eligibility for the upgrade You may use the resulting upgraded product only in accordance with the terms of this License Agreement If BitDefender is an upgrade of a component of a package of software programs that you licensed as a single product BitDefender may be used and transferred only as part of that single product package and may not be separated for use on more than one computer COPYRIGHT All right title and interest in and to BitDefender and all copyright rights in and to BitDefender
5. e Silent update the manual update will be made automatically in background e Ask before download every time you perform a manual update you will asked before downloading and installing the updates Important D If you select Ask before download and you close amp exit the management console the manual update will not be performed 8 2 4 Interface options e Wait for reboot instead of prompting If an update requires a reboot the product will keep working with the old files until the system is rebooting The user will Update module M 08 rss not be prompted for rebooting therefore the BitDefender update process will not interfere with the user s work Click Apply to save the changes or click Default to load the default settings Best practices Best practices Best practices Best practices O g Best practices 9 Best practices The Best practices section of this user guide contains the topic e Antispyware 9 1 Antispyware Steps to be followed in order to ensure a spyware free computer 1 Perform an update by user request of your spyware signatures as described in the Automatic update p 83 section 2 Perform a full scan of your system as described in the mmediate scanning p 55 section 3 In the Status section of the General module keep enabled Antispyware and Automatic update 4 Inthe Shield section of the Antispyware module keep enabled the most import
6. There are 3 types of events Y Information Warning and Critical Examples of events e Information when an e mail was scanned e Warning when a suspected file was detected e Critical when an infected file was detected For each event the following information are offered the date and the time when the event occurred a small description and its source Antivirus or Update Double click an event to see its properties You can filter these events in 2 ways by type or by source e Click Filter to select what types of event to display e Select the event source from the drop down men General module M 06 rss If the management console is open at the Events section and at the same time an event occurs you must click Refresh to see that event To delete all the events from the list click Clear log 6 5 About To access this section click About tab in the General module In this section you can find the contact information and the product details BitDefender 9 AntiSpyware Status Registration Settings Events About About BitDefender gt BitDefender 9 Antispyware Build 9 General sai iii Si il provides security BitDefender tm El solutions to satisty Contact Information A il the protection i il requirements of Antispyware c 2001 2005 SOFTWIN All rights reserved today s computing i environment S Web www bitdefender com
7. 07 Step 1 1 Select address and action Step 1 1 Select Address and Action EEN Select the specific Dati cone domain s that you www sontwin ro want to allow or block scripting for Generally you should use this wizard to specify the Permit domains you want to Deny Permit scripting from itis recommended Select action that you block scripts from all domains you dont explicitly trust Please note that some sites will not function properly without scripts Select address and action You can set the parameters e Domain address type in the domain on which the rule should apply e Action select the action of the rule Action Description Permit The scripts on that domain will execute Deny The scripts on that domain will not execute Click Finish Click Apply to save the changes 7 1 4 Cookies Control Click Advanced gt gt gt corresponding to Cookies Control to configure this protection Antispyware module consoe DZ Privacy rules Direction Domain Action x Double click rules to edit then click Apply Script Control Cookies are a very common occurrence on the Internet They are small files stored on your computer Websites create these cookies in order to keep track of specific information about you Cookies are generally made to make your life easier For example they can help the
8. Scan user defined exten Only the files with the extensions specified by the sions user will be scanned These extensions must be nw separated by Exclude extensions from The files with the extensions specified by the user scan will NOT be scanned These extensions must be nw separated by Scan inside archives The accessed archives will be scanned With this option on the computer will slow down Scan packed files All packed files will be scanned e Scan floppy drive on access scans the floppy drive when it is accessed e Action to take when an infected file is found select from the drop down menu the first action to take on infected files BitDefender allows selecting two actions in case an infected file is found You can select one of the following actions Action Description Deny access and continue In case an infected file is detected the access to this will be denied Clean file Disinfects the infected file Antispyware module consoe IZ Action Description Delete file Deletes the infected files immediately without any warning Move file to quarantine Move the infected files into the quarantine Second action to take when first fails select from the drop down menu the second action to take on infected files in case the first action fails You can select one of the following actions Action Description Deny access and continue In case an infected file is detected
9. including but not limited to any images photographs logos animations video audio music text and applets incorporated into BitDefender the accompanying printed materials and any copies of BitDefender are owned by SOFTWIN BitDefender is protected by copyright laws and international treaty provi sions Therefore you must treat BitDefender like any other copyrighted material ex cept that you may install BitDefender on a single computer provided you keep the original solely for backup or archival purposes You may not copy the printed mater ials accompanying BitDefender You must produce and include all copyright notices in their original form for all copies created irrespective of the media or form in which BitDefender exists You may not sub license rent sell or lease BitDefender You may not reverse engineer recompile disassemble create derivative works modify translate or make any attempt to discover the source code for BitDefender LIMITED WARRANTY SOFTWIN warrants that the media on which BitDefender is distributed is free from defects for a period of thirty days from the date of delivery of BitDefender to you Your sole remedy for a breach of this warranty will be that SOFTWIN at its option may replace the defective media upon receipt of the dam aged media or refund the money you paid for BitDefender SOFTWIN does not warrant that BitDefender will be uninterrupted or error free or that the errors will be corrected SOFTW
10. please Automatic check for updates input your proxy Verify every lt 1 gt hours i server s address and Confirm update i authentication data if O Silent update applicable Prompt before downloading updates By defautt Prompt before installing updates BitDefender Manual update settings Silent update Prompt before downloading updates E Advanced options Wait for reboot instead of prompting Y Don t update if scan is in progress automatically checks for updates every hour Please note that some updates may require areboot BitDefender will keep working with the old files until Apply 0 Deraur reboot 4 bitdefender More Help secure pier cry I Update Settings The updates can be performed from the local network over the Internet directly or through a proxy server Update module M 08 rss The window with the update settings contains 4 categories of options Update loca tion settings Automatic update options Manual update type and Interface options organized in an expandable menu similar to the ones from Windows Note 6 Click the box labeled to open a category or click the one labeled to close it 8 2 1 Update location settings For more reliable and faster updates you can configure two update locations a Primary update location and an Alternate update location For both of them you must co
11. the access to this will be denied Delete file Deletes the infected files immediately without any warning Move file to quarantine Move the infected files into the quarantine The same actions as for infected files are available for suspected ones Do not scan files greater than type in the maximum size of the files to be scanned If the size is O Kb all files will be scanned Exclude path from scan click corresponding to this option in order to specify a folder that will be excluded from scanning The consequence of this will be that the option will expand and a new option New item will appear Click the corres ponding checkbox of the new item and from the exploring window select the folder you want to be excluded from scanning 7 1 2 Dial Control Click Advanced gt gt gt corresponding to Dial Control to configure this protection Antispyware module M 07 Dial applications rules x Phone Numbers Application Action Double click rules to edit then click Apply Dial Control The dialers are applications that use computer s modems in order to dial different phone numbers Usually the dialers are used to access various locations by dialing a high cost phone numbers With Dial Control you will be in charge of which connections to different phone numbers you permit or block This function monitors all dialers attempting to access a computer modem immediately wa
12. you will be asked to confirm the update or the update will be made automatically The automatic update can also be done anytime you want by clicking Update Now This update is also known as Update by user request The Update module will connect to the BitDefender update server and will verify if any update is available If an update was detected depending on the options set in the Manual update type section you will be asked to confirm the update or the update will be made automatically Update module Management O 8 console Important lt may be necessary to restart the computer when you have completed the update We recommend doing it as soon as possible Note If you are connected to the Internet through a dial up connection then it s a good idea to make it a regular habit to update BitDefender by user request 8 2 Update settings To access this section click Update tab from the Settings module BitDefender 9 AntiSpyware Update Settings Update settings E Update location settings E Primary update location settings IL http Mupgrade bitdetender com Use proxy Alternate update location settings E http upgrade bitdefender com Use proxy Updates can be performed over the Internet directly or through a proxy server If you access the Internet through a 5 Automatic update options proxy server
13. 2 Select application and action Step 1 2 Select Application and Action Select application O Any Select application Select action O Permit Deny Check Any if you want this rule to apply for all the programs It you want to select a specific Application click Browse Then choose the action for this rule Permit or Deny Next Cancel Select application and action You can set the parameters e Application select the application for the rule You can choose only one applic ation click Select file then Browse and select the application or all the applica tions just click Any e Action select the action of the rule Action Description Permit The action will be permitted Deny The action will be denied Click Next Antispyware module Antispyware module aa 07 Step 2 2 Select the phone numbers Step 2 2 Select Phone Numbers ess Check Any if you Select phone number went this rule to O Any apply for any phone Specity phone number number You can also create 89899898 89899898 a rule that permits a certain program to dial only certain numbers such as that of your Internet Service Provider or your fax news service Add Remove Back __Finish__ __cancei Select the phone numbers Click Specify phone numbers
14. In other words it is enough to open the management console in order to have access to all modules Antispyware and Update To access the management console use the Windows Start menu by following the path Start gt Programs gt BitDefender 9 gt BitDefender 9 Antispyware or quicker double click the BitDefender icon from the system tray BitDefender 9 AntiSpyware Status Registration Settings Events About Antispyware is enabled General Blocked registry entries H Total detected files Automatic update is enabled Last update never US bitdefender secure your every DIE Essential status El information about the i BitDefender modules is displayed here Check or uncheck the i boxes to the left to enable or disable the i modules i Greyed out modules i are disabled items marked in red require your immediate attention BitDefender comes i fully configured for i maximum security Click the tabs to view more detailed i information or to i change settings manually Welcome More Help Management console On the left side of the management console you can see the module selector O 5 Management console e General in this section you can see a summary of all the BitDefender main set tings product details and contact information Here you can also register the product e Antispy
15. at no charge as long as the user agrees to accept the adware Because adware applications are usually installed after the user has agreed to a licensing agreement that states the purpose of the application no offense is committed However pop up advertisements can become an annoyance and in some cases degrade system performance Also the information that some of these applications collect may cause privacy concerns for users who were not fully aware of the terms in the license agreement A disk tape or directory that contains files that have been backed up A file that contains one or more files in a compressed format A hole in the security of a system deliberately left in place by designers or maintainers The motivation for such holes is not always sinister some operating systems for example come out of the box with privileged accounts intended for Boot sector Boot virus Browser Command line Cookie use by field service technicians or the vendor s maintenance programmers A sector at the beginning of each disk that identifies the disk s architecture sector size cluster size and so on For startup disks the boot sector also contains a program that loads the operating system A virus that infects the boot sector of a fixed or floppy disk An attempt to boot from a diskette infected with a boot sector virus will cause the virus to become active in memory Every time you boot your system from that point on
16. e Deep scan If you select this option you have the possibility to select some other settings For antispyware scan you have 3 options e Scan processes scans all processes from memory against spywares e Scan cookies scans all cookie files against spywares e Scan registry scans all registry entries against spywares The section contains the following buttons e Add file s opens a browsing window where you can select the file s you want to scan e Add folder s same as above but you select which folder s you want BitDefender to scan instead of which file s Note You can also use drag and drop to add files folders to the list e Remove item s removes the file s folder s that has been previously selected from the list of objects to be scanned Note Only the file s folder s that were added afterwards can be deleted but not those that were automatically seen by BitDefender e Advanced opens a window where you can specify which files to be scanned the action on the infected files generating alert messages saving scan results in report files Antispyware module ao 07 e Scan launches the system scanning taking in account the selected scan options Important D If you are not that familiar with computers now is the time to just click the Scan button BitDefender will start the scanning of your computer using the standard settings which are sufficient Step
17. edhe toe ane pee ee ee al a 79 8 Update module si iii teed beeen eee iii 83 8 1 Automatic update LL 83 8 2 Update Settings ey enne i A e e vaaata a 85 8 2 1 Update location settings LL 86 8 2 2 Automatic update Options 87 8 2 3 Manual update type 87 8 2 4 Interface options LL LL 87 Best practicas is caida idos is ici 89 9 Best practices ion ia a i eee ae i 91 97 AntiSpyware ciaci n a A Geet a edd eg 91 040 O ato ds bi 93 10 SUpport sac io ccs o A A aa i 95 10 1 Support department LL 95 10 2 On line AAA e E 95 10 2 1 BitDefender Knowledge Base LL 95 10 3 Contact information iii ii aed cae a aa e oi 96 103 1 Web addresses iiime sanie pi e na 96 10 3 2 e A a ii i E e a a ee ee 97 BitDefender 9 Antispyware 11 Frequently Asked Questions cece eee eens 99 Glossary dalai ee 101 BitDefender 9 Antispyware License and Warranty License and Warranty This License Agreement is a legal agreement between you either an individual or a single entity end user and SOFTWIN for use of the SOFTWIN software product identified above which includes computer software and may include associated media printed materials and online or electronic documentation BitDefender all of which are protected by U S and international copyright laws and international treaty protection By installing copying or otherwise using BitDefender you agree to be bound by the t
18. for this scan event Event Name scan Event Description scheduler scan O Run the scan task with Low priority D Minimize scan window on start O Shut down the PC when scan is completed Next Cancel Intro Type in the name of the new event in the Event name field and a short description in the Event description field The following options are available e Run the task with Low priority Decreases the priority of the scan process You will allow other programs to run faster and increase the time needed for the scan process to finish e Minimize scan window on start Minimizes the scan window to system tray Double click the BitDefender icon to open it e Shut down the PC when scan is completed Shut down the computer after the scan process has finished Click Next to continue If you click Cancel a window will appear requesting you to confirm your option to abort the wizard or to continue Antispyware module O 7 Management console Step 2 9 Start Time Date Select the start date time and repetition of the scan event O Once OO Periodically At every Start Date Start Time 260820058 v hs4o52 Close the scan window if no threats are found on scanned target s Back Next Cancel Start Time Date Select the scan frequency e Once launches the scan only once at a certain moment e Periodically
19. gt Job Opportunities lt jobs bitdefender com gt Virus Submissions lt virus_submission bitdefender com gt Spam Submissions lt spam_submission bitdefender com gt Report Abuse lt abuse bitdefender com gt Product web site http www bitdefender com Product ftp archives ftp ftp bitdefender com pub Local distributors http www bitdefender com partner_list BitDefender Knowledge Base http kb bitdefender com Getting help 10 10 3 2 Address The BitDefender offices are ready to respond to any inquiries regarding their areas of operations in both commercial and general matters Their respective addresses and contacts are listed below Germany Softwin GmbH Karlsdorfer Strabe 56 88069 Tettnang Technischer Support lt supportQbitdefender de gt Vertrieb lt vertrieb bitdefender de gt Phone 07542 94 44 44 Fax 07542 94 44 99 Product web site http www bitdefender de Spain Constelaci n Negocial S L C Balmes 195 2 planta 08006 Barcelona Soporte t cnico lt soporte bitdefender es com gt Ventas lt comercial bitdefender es com gt Phone 34 932189615 Fax 34 932179128 Sitio web del producto http www bitdefender es com U S A BitDefender LLC 6301 NW 5th Way Suite 3500 Fort Lauderdale Florida 33308 Technical support lt support bitdefender us gt Sales lt sales bitdefender us gt Phone 954 776 62 62 800 388 80 62 10 Getting help Fax 954 776 64 6
20. is detected an alert window will prompt you to select the action on the infected file Caught by BitDefender File Infected with EICAR Test File not a virus Select action to perform o O Delete O Copy to quarantine O Move to quarantine O Rename O Ignore O Apply to all Action Selection You can view the name of the file and the name of the spyware Select one of the following actions to take on the infected file e Disinfect disinfects the infected file e Delete deletes the infected file Antispyware module M 07 om e Copy to quarantine copies the infected file into the quarantine Move to quarantine moves the infected file into the quarantine e Rename changes the extension of the infected files The new extension of the infected files will be vir e Ignore ignores the infection No action will be taken on the infected file If you scan a folder and you wish the action on the infected files to be the same for all select the checkbox corresponding to Apply to all Note En If the Disinfect option is not enabled it means the file cannot be disinfected The best choice is to isolate it in the quarantine zone and send it to us for analysis or delete it Click OK 7 2 4 Scheduled scanning To access this section click Scheduler tab from the Antispyware module Antispyware module Management O 7 console Shield BitDefender 9 An
21. kB If you want to change this value type in a new one in the corresponding field e Automatically send quarantine sends automatically the quarantined files to the BitDefender Labs for further analysis You can set the time period between two consecutive sending processes in minutes in the Send quarantine every field e Automatically delete sent files deletes automatically the quarantined files after sending them to the BitDefender Lab for analysis e Drag amp Drop settings if you are using the Drag amp Drop method to add files to the quarantine here you can specify the action copy move or prompt user Submission settings e Your address type in your e mail address in case you want to receive e mail messages from our experts regarding the suspicious files submitted for ana lysis 7 5 Report To access this section click Report tab from the Antispyware module Antispyware module M 07 BitDefender 9 AntiSpyware Shield Scan Scheduler System Info Quarantine Report Report General Name Last Modified Size il The Report section spyscan_1130772572 log 10 31 2005 5 29 37 PM 2 KI i lists all the report files i generated so far i The default names of Antispyware i the reports generated H i by various 3 i i BitDefender components are Update i yscan og logs i user initiated virus i scans H aspyscan log logs i antispyware
22. launches the scan periodically at certain time intervals hours days weeks months years starting with a specified date and time If you want the scan to be repeated after certain intervals select the checkbox cor responding to Periodically and type in the At every edit box the number of minutes hours days weeks months years you want to repeat this process Note En Use the up down arrows of this box in order to increase decrease the number of minutes hours days weeks months years Select the time interval minutes hours days weeks months years to which the scan be repeated Important O If you made your option for a repeated scan the event will be launched for an un limited time period In order to give up the event it must be erased from the events list of the Scheduler window Antispyware module Management O 7 console If you want to automatically close the scan window if no infected or suspected files were found during the scan process select the checkbox corresponding to this option Click Back to go to the previous step or click Next to continue the wizard Step 3 9 Target Objects Select the objects you want to be scanned by BitDefender Boot Files Mail Database Archives Packed Files Back Next Cancel Target Objects Select the objects you want to be scanned Boot scans the boot sector in order to identify the boot viruses Files scans
23. on the danger of computer viruses BitDefender security solutions satisfy the protection requirements of today s business environment enabling management of all complex threats that endanger a network from a small local area to large multi server multi platform WAN s 2 3 SOFTWIN Bucharest based SOFTWIN is the leading provider of complex software solutions and services in Romania SOFTWIN focuses on providing software solutions and services that enable fast growing companies to solve critical business challenges and to capitalize on new business opportunities SOFTWIN enables companies to focus on their core business and expand to new markets by outsourcing non core activities SOFTWIN employs over 500 highly qualified professionals experienced in developing customized solutions and services Since its establishament in 1990 SOFTWIN s average annual revenue has increased by 30 SOFTWIN has 4 divisions which also define the company s main business lines e CRM O 2 Description and features e Business Information Solutions e eContent Solutions e Data Security Solutions SOFTWIN provides services and solutions to customers worldwide Over 90 of the company s turnover is achieved from exports to the US and European Union Using cutting edge technologies SOFTWIN successfully developed over 500 software development projects over 3 500 content structuring projects for international partners having over 43 mill
24. rules are listed in order of their priority starting from the top meaning the first rule has the highest priority Drag amp drop rules in order to change their priority To delete a rule just select it and click Delete To modify a rule s attribute just double click its field To temporarily deactivate a rule without deleting it clear the corres ponding checkbox The rules can be input automatically through the alert window or manually click New rule and choose the parameters for the rule The configuration wizard will ap pear Antispyware module aa 07 Configuration wizard The configuration wizard is a 1 step procedure Step 1 1 Select address action and direction Step 1 1 Select Address and Action a Select the specific domain s that you www softwin ro want to allow or block scripting for Generally you Select ection should use this wizard to specify the O Permit domains you want to Deny Permit scripting from t is recommended Enter domain that you block scripts from all domains you dont explicitly trust Please note that some sites will not function properly without scripts Select address action and direction You can set the parameters Domain address type in the domain on which the rule should apply Action select the action of the rule Action Description Permit The cookies on that domain will execute Deny The
25. select a different skin click the corresponding color Use the A Save All Settings amp Load All Settings buttons to save load the settings you have made for BitDefender to a desired location This way you can use the same settings after you reinstall or repair your BitDefender product Click Apply to save the changes If you click Default you will load the default settings 6 4 Events To access this section click Events tab from the General module General module Management O 6 console BitDefender 9 AntiSpyware Status Registration Settings Events About Event logger TV Select event source X H i Alerts and actions General il such as detected Jeer H i viruses or spyware G H Double click an item for details programs firewall i il alerts attempts to run Antispyware H Type Date Time Description Sourc prohibited software H il or access blocked 3 H i webpages are logged j to provide support for Update El informed decisions H E about the security of i your system i Logged events can i be filtered by module i or by importance Pressing Clear log i will permanently i delete all entries Filter Clear og Refresh More Help US bitdefender secure your every DIE Events In this section all the events generated by BitDefender are displayed
26. the sign appears cannot be Y Scan floppy drive on access a E E Action to take when an infected tile is found opened The reason IS that these options ET First action lt Clean file gt A ue cn weren t selected yet You will observe that Action to take when a suspect file is found if you select them they can be opened El First action lt Clean file gt El Second action Deny access and continue J Do not scan files greater than 5000 Kb E Exclude path from scan OK Cancel Default Files Control e Scan accessed files and P2P transfers options scans the accessed files and the communications through Instant Messaging Software applications ICO NetMeet ing Yahoo Messenger MSN Messenger Further on select the type of the files you want to be scanned The following options are available Antispyware module M 07 e Option Description Scan all files All the accessed files will be scanned regardless their type Scan program files only Only the program files will be scanned This means only the files with the following extensions exe bat com d11 ocx scr bin dat 386 vxd Sys wdm cla class ovl ole exe hlp doc dot xls ppt wbk wiz pot ppa xla xlt vbs vbe mdb rtf htm hta html xml xtp php asp js shs chm 1nk pif prc url smm pdf msi ini csc cmd bas eml and nws
27. the continuous expansion of the Klez virus in various versions immediate antivirus protection has become once more a critical need for any computer system Innovative Awarded for innovation by the European Commission and EuroCase BitDefender has been proclaimed a winner of the European IST Prize awarded by the European Commission and by representatives of 18 academies in Europe Now O 2 Description and features in its eighth year the European IST Prize is a reward for groundbreaking products that represent the best of European innovation in information technology Comprehensive Covers every single point of your network providing complete security BitDefender security solutions for the corporate environment satisfy the protection requirements of today s business environment enabling management of all complex threats that endanger a network from a small local area to large multi server multi platform WAN s Your Ultimate Protection The final frontier for any possible threat to your computer system As virus detection based on code analysis has not always offered good results BitDefender has implemented behavior based protection providing security against born new malware These are the costs that organizations want to avoid and what the security products are designed to prevent Worm attacks Communication loss because of infected e mails E mail breakdown Cleaning and recovering systems Lost productivity experie
28. type in the phone number for which the rule will be applied and click Add Note En You can use wild cards in your list of banned phone number e g 1900 means all numbers beginning with 1900 will be blocked Check Any if you want this rule to apply for any phone number To delete a phone number select it and click Remove Note en You can also create a rule that permits a certain program to dial only certain numbers such as that of your Internet Service Provider or your fax news service Click Finish Click Apply to save the changes 7 1 3 Script Control Click Advanced gt gt gt corresponding to Script Control to configure this protection Antispyware module M 07 e Active content Rules x Domain Action Double click rules to edit then click Apply Script Control Scripts and other codes such as ActiveX controls and Java applets which are used to create interactive web pages can be programmed to have harmful effects ActiveX elements for example can gain total access to your data and they can read data from your computer delete information capture passwords and intercept messages while you re online You should only accept active content from sites you fully know and trust BitDefender lets you choose to run these elements or to block their execution With Script Control you will be in charge of which websites you trust and which you don t BitDefender will ask yo
29. website remember your name and preferences so that you don t have to enter them on every visit But cookies can also be used to compromise your privacy by tracking your surfing patterns This is where Cookie Control helps When enabled Cookie Control will ask for your permission whenever a new website tries to set a cookie Antispyware module M 07 You can see the name of the application that is Firewall Alert E trying to send the cookie file E rat Serer sirena Check Remember this answer option and click Yes SRP De or No and a rule will be created applied and listed Question in the rules table You will no longer be notified the This program wants to send a locally stored cookie to so law dsd ro Do you want to allow this program to next time when you connect to the same site send the cookie Remember this answer Yes No Cookie Control alert This will help you to choose which websites you trust and which you don t Note Because of the great number of cookies used on the Internet today Cookie Control can be quite bothersome to begin with At first it will ask a lot of questions about sites trying to place cookies on your computer As soon as you add your regular sites to the rule list surfing will become as easy as before Every rule that has been remembered can be accessed in the Cookies Control section for further fine tuning Important O The
30. you will have the virus active in memory Short for Web browser a software application used to locate and display Web pages The two most popular browsers are Netscape Navigator and Microsoft Internet Explorer Both of these are graphical browsers which means that they can display graphics as well as text In addition most modern browsers can present multimedia information including sound and video though they require plug ins for some formats In a command line interface the user types commands in the space provided directly on the screen using command language Within the Internet industry cookies are described as small files containing information about individual computers that can be analyzed and used by advertisers to track your online interests and tastes In this realm cookie technology is still being developed and the intention is to target ads directly to what you ve said your interests are It s a double edge sword for many people because on one hand it s efficient and pertinent as you only see ads about what you re interested in On the other hand it involves actually tracking and following where you go and what you click Understandably so there is a debate over privacy and many people feel of fended by the notion that they are viewed as a SKU number you know the bar code on the back of packages that gets scanned at the grocery check out line While this viewpoint may be extreme in some cases it is accurate
31. your system File zone The green bars the File Zone show the number of scanned files per second on a scale from O to 50 Activity bar Note The Scan activity bar will notify you when the Spyware Shield is disabled with a red cross over the corresponding area File Zone This way you will know if you are protected without opening the management console When you no longer want to see the graphic visualization just right click it and select Hide Note To completely hide this window clear Show Scan Activity Bar option from the General module Settings section M 05 vz General module conse DE 6 General module The General section of this user guide contains the following topics General information Product registration Management console settings Events About Note For more details regarding the General module check the description of the General module p 17 6 1 General information To access this section click Status tab from the General module General module M 06 rs Status Registration Settings Events About i Welcome j gt Antispyware is enabled H Blocked registry entries o Essential status Seneral El information about the y Total detected files 0 AAA tea det BitDefender modules il is displayed here Automatic update is enabled E Check or uncheck the Antispyware Last update never i bo
32. 2 800 388 80 64 Product web site http www bitdefender us Romania SOFTWIN 5th Fabrica de Glucoza St PO BOX 52 93 Bucharest Technical support lt suport bitdefender ro gt Sales lt sales bitdefender ro gt Phone 40 21 2330780 Fax 40 21 2330763 Product web site http www bitdefender ro Frequently Asked Questions Getting help 11 Frequently Asked Questions 11 1 General a 20 PD RP 1 How can tell if BitDefender is actually working In the General module access the Status section and look at the statistics What are the system requirements You will find them in the System requirements p 3 section How do uninstall BitDefender The removing procedure is described in the Removing repairing or modifying BitDefender features p 6 section How can register BitDefender The registration procedure is described in the Product registration p 27 section 1 2 Antispyware What is a quick scan A quick scan is a scan process against spywares Only the registry entries cookies processes and some specific files will be scanned What is the difference between quick scan and deep scan The difference is that when you perform a deep scan you can select to scan cookies processes or registry too What does Dial Control do Getting help Q 1 Q Frequently Asked Questions The Dial Control monitors all dialers attempting to access a com
33. 4 5 Select the scan options Advanced users might want to take advantage of the scan settings BitDefender offers The scanner can be set to skip file extensions directories or archives that you know to be harmless This may greatly reduce scanning times and improve your computer responsiveness during a scan Click Advanced from the Scan section to explore these options N The scan options are organized like an ex Scan book sectors pandable menu very much like the exploring Scan files Use heuristic detection ones from Windows v Y v Y Detect incomplete virus bodies Y v Scan for riskware Prompt for reboot E Action options Action to take when an infected file is found El First Action Disinfect files gt El Second action lt Move files to Quarantine gt y Action to take when a suspect file is found El First action Copy files to Quarantine El Second action None log objects Report options Show all scanned files Y Create report file Fle Other options Run the scan task with Low priority Shut down the PC when scan is completed Y Submit suspect files to BitDefender Lab Minimize scan window on start to systray Y OK Cancel Default Scan settings The scan options are grouped in four categories Scanning options Action options Report options Other o
34. 7 4 1 General Module ii s i A a ee E RN eae jaala 0 17 4 2 Antispyware module siia ssis aci ee I e ee a a 17 4 3 Update module is dea i AR RT de A e a A 17 Management CONSOLE 11113 ttt SELES 19 Db OVERVIEW siii ie ra ei ii 21 MESA CA a E e lalla J eee eae dal 22 5 2 Scan activity bal sassis a Wak a e e A AE E alus 23 6 General module 4 02 pri Rai 25 BitDefender 9 Antispyware 6 1 General information LL 25 6 11 Firewall di ia rea RE ina 26 6 1 2 Automatic Update ricsi emitia eaea aaa i aaoi i ai aa ayt a a a E R NE 27 6 2 Product registration LL 27 6 3 Management console settings LL 29 OA EVENTS ioni e e aa 32 6 5 ABOUT onssa ae a cada aaa 34 7 Antispyware module 0 cece eee eee eee 37 71 On access SCANNING sia aste bee a ee ade eee Wd a WR ia 37 411 Files Controlli nce esa Cae eee Eee Ee ee a Ee ee 39 2 1 2 Dial Control ie een a eae eee ee eS 41 FAS Script Control gate sadn ta ee tween Sachin de owes whew eal eed 45 7 1 4 Cookies Control esiu skeci i Wa ee ee ee eG 48 71 5 Registry Control nes siria 52 7 2 On demand Scanning sorsi aaa a ae ae 54 7 241 immediate scanning vic e a a a 55 7 2 2 Contextual scanning siii le aas a RR A ee 62 7 2 3 Drag amp Drop Scanning LL 63 7 2 4 Scheduled scanning iii ii aia ee ra ee 64 7 9 System Information suhe a ee ee ea eee da ed 75 774 Quarantine jes ee wee m ae e Pe Ree DE eee ae n 76 1748 0 Report i wath Sk
35. ERATION THIS SOFTWARE IS NOT FOR USE IN THE OPERATION OF AIRCRAFT NAVIGATION NUCLEAR FACILITIES OR COMMUNICATION SYSTEMS WEAPONS SYSTEMS DIRECT OR INDIRECT LIFE SUPPORT SYSTEMS AIR TRAFFIC CONTROL OR ANY APPLICATION OR INSTALL ATION WHERE FAILURE COULD RESULT IN DEATH SEVERE PHYSICAL INJURY OR PROPERTY DAMAGE GOVERNMENT RESTRICTED RIGHTS RESTRICTED RIGHTS LEGEND Use duplication or disclosure by the Government is subject to restrictions as set forth in subparagraph c 1 ii of the Rights in Technical Data and Computer Software clause at DFARS 252 227 7013 or subparagraphs c 1 and 2 of Commercial Computer Software Restricted Rights clause at 48 CFR 52 227 19 as applicable Contact SOFTWIN at 5 F ca de Glucoza str 72322 Sect 2 Bucharest Romania or at Tel No 40 21 2330780 or Fax 40 21 2330763 GENERAL This Agreement will be governed by the laws of Romania and by the in ternational copyright regulations and treaties This Agreement may only be modified by a license addendum which accompanies this Agreement or by a written document which has been signed by both you and SOFTWIN This Agreement has been written in the English language only and is not to be translated or interpreted in any other language Prices costs and fees for use of BitDefender are subject to change without License and Warranty prior notice to you In the event of invalidity of any provision of this Agreement the invalidity shall not affec
36. IN does not warrant that BitDefender will meet your requirements SOFTWIN HEREBY DISCLAIMS ALL OTHER WARRANTIES FOR BITDEFENDER WHETHER EXPRESSED OR IMPLIED THE ABOVE WARRANTY IS EXCLUSIVE AND License and Warranty IN LIEU OF ALL OTHER WARRANTIES WHETHER EXPRESSED OR IMPLIED INCLUD ING THE IMPLIED WARRANTIES OF MERCHANTABILITY FITNESS FOR A PARTIC ULAR PURPOSE OR NON INFRINGEMENT THIS WARRANTY GIVES YOU SPECIFIC LEGAL RIGHTS YOU MAY HAVE OTHER RIGHTS WHICH VARY FROM STATE TO STATE DISCLAIMER OF DAMAGES Anyone using testing or evaluating BitDefender bears all risk to the quality and performance of BitDefender In no event shall SOFTWIN be liable for any damages of any kind including without limitation direct or indirect damages arising out of the use performance or delivery of BitDefender even if SOFTWIN has been advised of the existence or possibility of such damages SOME STATES DO NOT ALLOW THE LIMITATION OR EXCLUSION OF LIABILITY FOR IN CIDENTAL OR CONSEQUENTIAL DAMAGES SO THE ABOVE LIMITATION OR EX CLUSION MAY NOT APPLY TO YOU IN NO CASE SHALL SOFTWIN S LIABILITY EXCEED THE PURCHASE PRICE PAID BY YOU FOR BITDEFENDER The disclaimers and limitations set forth above will apply regardless of whether you accept or use evaluate or test BitDefender IMPORTANT NOTICE TO USERS THIS SOFTWARE IS NOT FAULT TOLERANT AND IS NOT DESIGNED OR INTENDED FOR USE IN ANY HAZARDOUS ENVIRONMENT REQUIRING FAIL SAFE PERFORMANCE OR OP
37. Select the scan type e Non Heuristic means scanning the files with the procedure based on known virus signatures e Heuristic represents a method based on certain algorithms whose aim is to identify new unknown viruses Occasionally it may report a suspicious code in normal programs generating the so called false positive You have the following options e Send suspect files to BitDefender Lab You will be prompted to submit all suspect files to BitDefender lab after the scan process has finished e Scan for riskware Scan for threats other than viruses such as dialers spyware and adware These files will be treated as infected files Software that includes adware components might stop working if this option is enabled Click Back to go to the previous step or click Next to continue the wizard Antispyware module Management D 7 console Step 7 9 Action Mode Action Mode Action to take when an infected file is found y First action Disinfect files M Second action Move tiles to Guarantine Ni Back Next Cancel Action Mode BitDefender allows selecting two actions in case an infected or a suspected file is found Select the actions for infected and suspected files Action Description None No action will be taken on infected files These files will appear in the report file Prompt user for action When an infected file is detected a window will app
38. ade from v8 to v9 we recommend you to save BitDefender settings After the upgrading process is over you may load them 1 4 Removing repairing or modifying BitDefender features If you want to modify repair or remove BitDefender 9 Antispyware follow the path from the Windows start menu Start gt Programs gt BitDefender 9 gt Modify Repair or Uninstall You will be requested to confirm your choice by clicking Next A new window will appear where you can select e Modify to select new program components to add or to select currently installed components to remove e Repair to re install all program components installed by the previous setup BitDefender 9 Antispyware installation Product installation O l a Important Before repairing the product we recommend you to save the BitDefender settings After the repairing process is over you may load them e Remove to remove all installed components To continue setup select one of the three options listed above We recommend that you choose Remove for a clean re installation After the uninstall process is over we recommend that you delete the Softwin folder from the Program Files BitDefender 9 Antispyware installation O Product installation Description and features Description and features Description and features Description and features O E 2 Overview 2 BitDefender provides security solutions to sat
39. ant controls of BitDefender Files Control Dial Control and Registry Control 5 Program your BitDefender to scan your system at least once a week as described in the Scheduled scanning p 64 section O g Best practices Best practices Getting help Getting help Getting help Getting help 10 10 Support 10 1 Support department As a valued provider SOFTWIN strives to provide its customers with an unparallel level of fast and accurate support The Support Center listed below is continually being updated with the newest virus descriptions and answers to common questions so that you obtain the necessary information in a timely manner At SOFTWIN dedication to saving its customers time and money by providing the most advanced products at the fairest prices has always been a top priority Moreover we think that a successful business is based on a good communication and a com mitment to excellence in customer support You are welcome to ask for support at lt support bitdefender com gt any time For a prompt response please include in your email as many details as you can about your BitDefender about your system and describe the problem as accurate as pos sible 10 2 On line help 10 2 1 BitDefender Knowledge Base The BitDefender Knowledge Base is an online repository of information about BitDe fender products lt stores in an easily accessible format reports on the results of the ongo
40. ask e Modify modifies the properties of a previously created task It also launches the wizard Antispyware module M 07 e Note If you modify the event s name a new event will be created under the newly introduced name e Delete deletes a selected task e Run Now runs the selected task e Properties opens the properties of the selected task The Scheduler s screen also contains a list where all the scan tasks can be seen with their names the date of the first execution the date of the next execution and the task s type periodically or one time only If you right click a scheduled event a contextual menu with options similar to those described above will appear Note O You can also navigate through the scan events using the keyboard press the Delete button to erase the selected scan event press the Enter button in order to view the selected event properties or press the Insert button in order to create a new event the wizard will appear Note Click New to set up a new entry in the scheduler This will launch the scheduler wizard which step by step will allow you to define your scan The Scheduler allows an unlimited number of scheduled scan events Press the navigation buttons in order to scroll the page up or down or right to left Antispyware module Management D 7 console Step 1 9 Welcome Window ptr r rr r Enter a name and a short description
41. click Next If you do not agree with these terms click Cancel The installation process will be abandoned and you will exit setup You can choose what kind of installation you want typical custom or complete e Typical The program will be installed with the most common options This is the recommended option for most users Custom You may choose the components you want to install Recommen ded for advanced users only BitDefender 9 Antispyware installation Product installation O e Complete For full installation of the product All BitDefender modules will be installed If you select Typical or Complete you will skip step 5 If you have selected Custom a new window will appear containing all the BitDe fender components listed so that you may select the ones you would like to in stall If you click any component name a short description including the minimum space required on the hard disk will appear on the right side If you click any component icon a window will appear where you can choose to install or not the selected module You can select the folder where you want to install the product The default folder is C Program Files Softwin BitDefender 9 If you want to select another folder click Browse and in the window that will open select the folder you wish BitDefender to be installed in Click Next Click Next You have four options selected by default e Update BitDefender to up
42. cookies on that domain will not execute Direction select the traffic direction Type Description Outgoing The rule applies only for the cookies that are sent out back to the connected site Antispyware module M O7 se Type Description Incoming The rule applies only for the cookies that are received from the connected site Both The rule applies in both directions Click Finish Note E You can accept cookies but never return them by setting the action to Deny and the direction to Outgoing Click Apply to save the changes 7 1 5 Registry Control A very important part of the Windows operating system is called the Registry This is where Windows keeps its settings installed programs user information and so on The Registry is also used to define which programs should be launched automatically when Windows is started Viruses often use this in order to be automatically launched when the user restarts his computer Registry Control keeps an eye on the Windows Registry this is again useful for de tecting Trojan horses It will alert you whenever a program will try to modify a registry entry in order to be executed at Windows start up Antispyware module aa 07 You can deny this modification by clicking No or Registry Alert x A E E you can allow it by clicking Yes Windows Messenger If you want BitDefender to remember your answer 4 Path c program filesvnessengerimsmsg
43. ction click Register tab from the General module General module M 06 rs Status Registration Settings Events About il License status gt BitDefender 9 Antispyware i Evaluation version This panel holds General i information about the Product ID A2F34 11544 34491 89075 status of your i Expires on 11 30 2005 i BitDefender licenses Online Registration Press Buynowtto i Enter new key get a new license i key i Buy now H il Press Enter new key i and enter a valid i license key to i upgrade a trial license to full license status orto extend an il expired BitDefender il license i Press Online registration to il activate your i BitDefender products i to benefit from free BitDefender technical El support and free services US bitdefender Moreno Product registration This section contains information about the status of your BitDefender license Here you can register the product and you can see the expiring date The product is delivered with a trial registration key valid for thirty days At the end of the trial period if you want to purchase the product you have to provide a new license key Click Buy now to get a new License Key from the BitDefender online store Click Online registration to activate your BitDefender product in order to benefit from free BitDefender
44. date BitDefender at the end of the installation Your system must be connected to the Internet to update e Open readme file to open the readme file at the end of the installation e Place a shortcut on the desktop to place a shortcut to BitDefender on your desktop at the end of the installation Click Install in order to begin the installation of the product Click Finish to complete the product installation If you have accepted the default settings for the installation path a new folder named Softwin is created in Pro gram Files and it contains the subfolder BitDefender 9 Note en You may be asked to restart your system so that the setup wizard can complete the installation process BitDefender 9 Antispyware installation O Product installation 1 3 Upgrade The upgrade procedure can be done in one of the following ways e Install without removing the previous version v8 to v9 only Double click the setup file and follow the wizard described in the Installation steps p 3 section Important D During the installation process an error message caused by the Filespy ser vice will appear Click OK to continue the installation e Uninstall your previous version and install the new one for all BitDefender versions First of all you have to remove your previously version restart the computer and install the new one as described in the nstallation steps p 3 section Important D If you upgr
45. defender Antispyware N User s guide EN parres n nm a t AS narana dae as AAA Antispyware BitDefender 9 Antispyware BitDefender 9 Antispyware User s guide SOFTWIN Published 2005 11 02 Build 9 0 1 Copyright 2005 SOFTWIN Legal Notice All rights reserved No part of this book may be reproduced or transmitted in any form or by any means electronic or mechanical including photocopying recording or by any information storage and retrieval system without written permission from SOFTWIN except for the inclusion of brief quotations in reviews The content can not be modified in any way Warning and Disclaimer This product and its documentation are protected by copyright The information in this document is provided on an as is basis without warranty Although every precaution has been taken in the preparation of this document the authors will not have any liab ility to any person or entity with respect to any loss or damage caused or alleged to be caused directly or indirectly by the information contained in this work This book contains links to third party Websites that are not under the control of SOFTWIN and SOFTWIN is not responsible for the content of any linked site If you access a third party website mentioned in this guide you will do so at your own risk SOFTWIN provides these links only as a convenience and the inclusion of the link does not imply that SOFTWIN endorses or accepts any responsibilit
46. delivering effective i threat management Update Email seles bitdetender com for over 41 milion support bitdetender com i home and corporate H users in more than Phone 40 21 233 07 80 lil 400 countries Fax 40 21 233 07 63 gala ce ij BitDefender tm is certified by all the il major independent il reviewers ICSA Labs CheckMark and virus Bulletin and is http Awww bitdefender com support tag htm i the only security http bitdefender com product to have Please read the FAQ before contacting tech support received an IST Prize More Help secure your every Bit bitdefender General information BitDefender provides security solutions to satisfy the protection requirements of today s computing environment delivering effective threat management for over 41million home and corporate users in more than 100 countries General module conse DB BitDefender is certified by all the major independent reviewers ICSA Labs Check Mark and Virus Bulletin and is the only security product to have received an IST Prize M 06 rss General module Antispyware module aa 07 7 Antispyware module The Antispyware section of this user guide contains the following topics On access scanning On demand scanning Scheduled scanning System Information Quarantine Report Note For more details regarding the Antispyware
47. der configuration e Load BitDefender when Windows starts automatically launches BitDefender at system startup Note En We recommend you to keep this option selected e Start minimized minimizes the BitDefender management console after it has been loaded at system startup Only the BitDefender Icon will appear in the system tray e Receive security notifications receives from time to time security notifications regarding virus outbreaks sent by the BitDefender server e Send virus reports sends to the BitDefender Labs reports regarding viruses identified in your computer It helps us keep track of virus outbreaks The reports will contain no confidential data such as your name IP address or others and will not be used for commercial purposes The information supplied will contain only the virus name and will be used solely to create statistic reports e Show on screen notes shows pop up windows regarding the product status General module M 06 rs e Enable multiuser support allows other users that may be using this computer to have their own settings for BitDefender Note This option can only be enabled or disabled by users with administrator rights on the local machine e Enable activity bar enables disables the Scan activity bar p 23 e Choose skin allows you to select the color of the management console The skin represents the background image on the interface In order to
48. drives scans all local drives e Network drives scans all network drives Click Back to go to the previous step or click Next to continue the wizard Antispyware module Management D 7 console Step 5 9 File Mask File Mask Select the file types you want to be scanned by BitDefender O Al O Executables and documents O User defined extensions O List all scanned files Back Next Cancel File Mask Specify the types of the files that will be scanned This step is necessary if you have selected to scan files in the third step The following options are available e All scans all files no matter what their type is e Executables and documents scans only the program files and documents e From list scans only the files whose extensions appear in the list Note En These extensions must be separated by a semicolon If you wish to see the information about all scanned files infected or not select the option List all scanned files With this option checked the computer will slow down Click Back to go to the previous step or click Next to continue the wizard M 07 Step 6 9 Analysis Type BitDefender to perform O Non Heuristic O Heuristic Scan for riskware Select the type of analysis you want Send suspect files to the BitDefender Lab Antispyware module Back Next Cancel Analysis Type
49. dule check the description of the Update module p 17 8 1 Automatic update To access this section click Update tab from the Update module M 08 rs Update module BitDefender 9 AntiSpyware Pa Update Settings P il i Update BitDefender y i Automatic update is enabled i Itis extremely eneral _s Il important to keep i Update Statistics BitDefender up to lt Last checked 10 31 2005 5 26 30 PM date Your copy of H i BitDefender has been A i Last updated Never i Antispyware si i last updated on the Virus Signatures 245154 il date shown e Engine Version 7 04181 i Click Update now to Update Update now have BitDefender Hl i check now for a i newer version i BitDefender products Download status i are able to self repair i if necessary by i downloading the i damaged or missing files from BitDefender File 0 Okb il servers i Total update 0 1kb il Itis recommended to i keep the Automatic update option i enabled Sbitdefender More Heip secure your every bt Automatic Update If you are connected to the Internet through broadband or DSL BitDefender takes care of this itself lt checks for new spyware signatures when you turn on your computer and every hour after that If an update was detected depending on the options set in the Automatic update options section
50. e information about the last scanned files will be visible Three buttons are available e Stop opens a new window from where you can end the scan process Click Yes amp Close to exit the scan window e Pause stops temporally the scan process you can continue it by clicking Re sume e Show report opens the scan report Note En An icon will appear in the system tray when a scan process is running The report file is saved automatically in the Report section from the Antivirus module 7 2 2 Contextual scanning Right click the file or folder you want scanned and select the BitDefender Antivirus v9 Open A report file named vscan log will be created and Explore Search you can open it from the Report section Antivirus Enqueue in foobar2000 Play in foobar2000 module Add to Winamp s Bookmark list Enqueue in Winamp Play in Winamp Bitdefender Antivirus v9 Send To Cut Copy Create Shortcut Delete Rename Properties Contextual Scan Antispyware module 7 2 3 Drag amp Drop Scanning Management D 7 console Drag the file or folder you want scanned and drop it over the Scan Activity Bar like in the pictures below Drag the file Drop the file A report file named activbar log will be created and you can open it from the Report section Antivirus module In both alternative scanning contextual and drag amp drop Scanning the scan window will appear If a virus
51. e the document is opened An e mail client is an application that enables you to send and receive e mail Internal storage areas in the computer The term memory identifies data storage that comes in the form of chips and the word storage is used for memory that exists on tapes or disks Every computer comes with a certain amount of physical memory usually referred to as main memory or RAM This method of scanning relies on specific virus signatures The advantage of the non heuristic scan is that it is not fooled by what might seem to be a virus and does not generate false alarms Packed programs A file in a compression format Many operating systems and applications contain commands that enable you to pack a file so that it takes up less memory For example suppose you have a text file containing ten consecutive space charac ters Normally this would require ten bytes of storage However a program that packs files would replace the space characters by a special space series character followed by the number of spaces being replaced In this case the ten spaces would require only two bytes This is just one packing technique there are many more Path The exact directions to a file on a computer These directions are usually described by means of the hierarchical filing sys tem from the top down The route between any two points such as the communica tions channel between two computers Phishing The act of sendi
52. ear prompting the user to select the action on that file De pending on the importance of that file you can select to disinfect it isolate it in the quarantine zone or delete it Disinfect files Disinfects the infected file Delete files Deletes the infected files immediately without any warning Rename files Changes the extension of the infected files The new extension of the infected files will be vir By renaming the infected files the possibility of executing and thus of spreading the infection is removed At the same time they can be saved for further examination and analysis Copy files to quarantine Copies the infected files into the quarantine This means practically duplicating the infected file and the copy of Antispyware module M 07 e Action Description this file will appear in the guarantine but the infected file will not be moved from the initial location Move files to quarantine Moves the infected files into the guarantine zone When the virus is in guarantine it can t do any harm Note We recommend you to select the first action Disinfect files and the second action Move to quarantine The same actions as for infected files are available for suspected ones Click Back to go to the previous step or click Next to continue the wizard Step 8 9 Report Info If you want BitDefender to create a report check the Create report file box Create report file Report file name sch
53. ected report file e Refresh refreshes the Report section If the management console is open at the Report section and in the meantime you perform a scan of your computer the new report file with the scan results will be visible only after you click Refresh e Browse opens a window from where you can select the report files you want to see e Settings opens the advanced options for the report files The following window will appear Report settings Y Automatically delete old reports 1 Delete reports older than 3 days Create reports in C Program Files SoftwiniBitDefenderSiLogst Report Settings Note e Automatically delete old reports maintains under control the number of the report files by deleting those older than a specified number of days The default time interval is 3 days If you want to change this value type in a new one in the corresponding field Click the box with to open an option or the box with to close an option e Create reports in specifies the folder where the report files will be saved Antispyware module M O7 Ise Click Apply to save the changes If you click Default you will load the default settings Update module sr DE 8 Update module The Update section of this user guide contains the following topics e Automatic update e Update settings Note O For more details regarding the Update mo
54. edulelog Limit report file size to Back Next Cancel Action Mode To create a scan report check Create report file At this moment all the other options for the creation of a report file will be enabled Type the name of the report file in the Report file name field By default its name is schedule log It will contain all the information about the scan process the number of identified viruses the number of scanned files the number of disinfected and deleted files Antispyware module Management O 7 console You can also limit the size of the report file Type in the maximum file size in the corresponding field Note Click Back to go to the previous step or click Next to continue the wizard The report files can be seen in the Report section from the Antivirus module Step 9 9 Summary Please see below the scanning options Start 26 08 2005 16 40 52 Run one time only Targets nents and Settings cistrate My Documents File Mask Analysis heuristic Report Info schedule log Action to take when an Disinfect files Move files to Quarantine infected file is found Action to take when a Copy files to Quarantine None log objects suspect file is found Shut down the PC when scan ls completed No Priority Normal he Send suspect files to the Minimize scan window on start No BitDefender Lab Yes Elapsed time between end of scan and exi
55. enam ing the infected files the possibility of executing and thus of spreading the infection is removed At the same time they can be saved for further examination and analysis Antispyware module M 07 Action Description Copy files to Quarantine Copies the infected files into the quarantine This means practically duplicating the infected file and the copy of this file will appear in the quarantine but the infected file will not be moved from the initial loca tion Move files to Quarantine Moves the infected files into the quarantine e Specify the options for the report files Open Report options category in order to see all possible options Option Description Show all scanned files Lists all scanned files and their status infected or not in a report file With this option on the computer will slow down Create report Report file namevs This is an edit field that allows changing the file can log name of the report file Select this option and type in a new name Limit report size to Limits the size of the report file Type in the x KB maximum file size Note The report files can be seen in the Report section from the Antivirus module e Specify the other options Open Other options category from where you can select the following options Option Description Run the task with Low pri Decreases the priority of the scan process You will ority allow other programs to run faster a
56. epair itself if necessary by downloading the damaged or missing files from BitDefender servers BitDefender license owners benefit from free virus definition updates and free product upgrades BitDefender 9 Antispyware O 3 Description and features 24 7 Support Offered online by qualified support representatives and an online database with answers to Frequently Asked Questions Rescue Disk BitDefender 9 Antispyware is delivered on a bootable CD based on LinuxDefender which can be used to disinfect a system without booting it BitDefender modules Description and features O 4 4 BitDefender modules BitDefender 9 Antispyware contains the modules General Antispyware and Update 4 1 General module BitDefender comes fully configured for maximum security Essential status information about all the BitDefender modules is displayed in the General module Here you can register your product and you can set the overall be havior of BitDefender 4 2 Antispyware module BitDefender monitors dozens of potential hotspots in your system where spyware might act and also checks any changes made to your system and software Known spyware threats are also blocked in real time It is effective in blocking Trojan horses and other tools installed by hackers who try to compromise your privacy and send your personal information like credit card numbers from your computer to the hacker BitDefender can al
57. erms of this agreement If you do not agree to the terms of this agreement do not install or use BitDefender you may however return it to your place of purchase for a full refund within 30 days after your purchase Verification of your purchase may be required BitDefender is protected by copyright laws and international copyright treaties as well as other intellectual property laws and treaties BitDefender is licensed not sold GRANT OF LICENSE SOFTWIN hereby grants you and only you the following non exclusive license to use BitDefender APPLICATION SOFTWARE You may install and use one copy of BitDefender or any prior version for the same operating system on a single computer terminal The primary user of the computer on which BitDefender is installed may make one addi tional i e second copy for his or her exclusive use on a portable computer NETWORK USE You may also store or install a copy of BitDefender on a storage device such as a network server used only to install or run the BitDefender on your other computers over an internal network however you must purchase and dedicate a separate license for each separate computer terminal on which BitDefender is in stalled or run from the storage device A license for BitDefender may not be shared or used concurrently on different computers or computer terminals You should purchase a license pack if you require multiple licenses for use on multiple computers or computer terminals
58. f commands that can be executed without user interaction Electronic junk mail or junk newsgroup postings Generally known as any unsolicited e mail Any software that covertly gathers user information through the user s Internet connection without his or her knowledge usually for advertising purposes Spyware applications are typically bundled as a hidden component of freeware or shareware programs that can be downloaded from the Inter net however it should be noted that the majority of share ware and freeware applications do not come with spyware Once installed the spyware monitors user activity on the Internet and transmits that information in the background to someone else Spyware can also gather information about e mail addresses and even passwords and credit card num bers Spyware s similarity to a Trojan horse is the fact that users unwittingly install the product when they install something else A common way to become a victim of spyware is to download certain peer to peer file swapping products that are available today Aside from the questions of ethics and privacy spyware steals from the user by using the computer s memory re sources and also by eating bandwidth as it sends information back to the spyware s home base via the user s Internet connection Because spyware is using memory and system resources the applications running in the background can lead to system crashes or general system instability Sta
59. files Mail Database scans mail archives in order to detect mail viruses Archives scans inside archives Packed Files scans packed files Cookies scans cookie files against spyware Registry scans registry entries against spyware Memory scans memory against spyware Files scans files against spyware Select one or more objects to scan by simply selecting the corresponding checkboxes Click Back to go to the previous step or click Next to continue the wizard Antispyware module O Management console Step 4 9 Target Path Local Drives O Network Drives My Computer A dd 3 Floppy 4 eo Local Disk C ss Local Disk D s Local Disk E 2 DVD CD RW Drive F DVD Drive 6 S cistrate on terralusersiComercia Control Panel Y Es gt le YD E C Documents and Settings cistrateW Back Next Cancel Target Path Specify the path to the objects that will be scanned This screen is actually an exploring window that lets you select the partitions and folders to be scanned When the cursor is placed on a folder the complete path to the folder will appear in the field placed under this exploring window Note En Also in order to select the locations to be scanned you can use the fast selection options placed on the topside of the window Click the box with to open an option or the box with to close an option e Local
60. he only Aqua person using this il computer you should isla RAINER A a A protect your A Load Al Settings BitDefender settings i with a password Save All Settings Itis recommended El that you keep the Apply Default default settings More Help US bitdefender secure your every bit Management console settings Here you can set the overall behavior of BitDefender By default BitDefender is loaded at Windows startup and then runs minimized in the taskbar The following options are available e Enable password protection enables setting a password in order to protect the BitDefender Management Console configuration Note If you are not the only person using this computer it is recommended that you protect your BitDefender settings with a password If you select this option the next window will appear General module lt a DE Password Confirmation Type in the password in the Password field re type it in the Retype password field and click OK Password Eeen Retype password The password should be at least 8 characters long OK Cancel Enter password From now on if you want to change the BitDefender configuration options you will be asked to introduce the password Important D If you forgot the password you will have to repair the product in order to modify the BitDefen
61. i Restore to move files El out of Quarantine El back to their original place Quarantine doesn t have a size limit 7 KB More details Add il Delete Restore J Send J Settings amp bitdefender More Hein Quarantine BitDefender allows isolating the infected or suspicious files in a secure area named quarantine By isolating these files in the quarantine the risk of getting infected disappears and at the same time you have the possibility to send these files for further analysis to the BitDefender lab The component that ensures the administration of the isolated files is Quarantine This module was designed with a function for automatically sending the infected files to the BitDefender lab As you may notice the Quarantine section contains a list of all the files that have been isolated so far Every file has enclosed its name size isolating date and sub mission date If you want to see more information about the quarantined files click More info The Quarantine section contains some buttons for administrating these files Antispyware module M 07 e e Add adds files to guarantine Use this button to guarantine a file you suspect of being infected A window will open and you can select the file from its location on the disk This way the file is copied to guarantine If you want to move the file in the guarantine zone you must select the chec
62. ing technical support and bugfixing activities of the BitDefender support and development teams along with more general articles about virus prevention the management of BitDefender solutions and detailed explanations and many other articles 10 Getting help The BitDefender Knowledge Base is open to the public and freely searchable This welth of information is yet another way to provide BitDefender customers with the technical knowledge and insight they need All valid requests for information or bug reports coming from BitDefender clients eventually find their way into the BitDefender Knowledge Base as bugfix reports workaround cheatsheets or informational articles to supplement product helpfiles The BitDefender Knowledge Base is available any time at http kb bitdefender com 10 3 Contact information Efficient communication is the key to a successful business For the past 10 years SOFTWIN has established an indisputable reputation in exceeding the expectations of clients and partners by constantly striving for better communications Please do not hesitate to contact us regarding any issues or questions you might have 10 3 1 Web addresses Sales department lt sales bitdefender com gt Technical support lt support bitdefender com gt Documentation lt documentation bitdefender com gt Partner Program lt partners bitdefender com gt Marketing lt marketing bitdefender com gt Media Relations lt pr bitdefender com
63. ion data security solutions users in 80 countries world wide and more than 1 500 000 client calls handled annually for CRM services Description and features O J BitDefender 9 Antispyware 3 BitDefender 9 Antispyware 3 1 Antispyware Monitor and prevent potential spyware threats in real time before they can damage your system By making use off a comprehensive database of spyware signatures your computer will remain spyware free Real Time Antispyware BitDefender monitors dozens of potential hotspots in your system where spyware might act and also checks any changes made to your system and software Known spyware threats are also blocked in real time Spyware scanning and cleaning BitDefender can scan your system or part of it for known spyware threats The scan uses a constantly updated spyware signature database Active Content Control Proactively blocks any potentially malicious application such as ActiveX Java Applets or Java Scripts type codes Dial Control A configurable anti dialer prevents malicious applications from running up a huge telephone bill at your expense Cookie Control The firewall filters incoming and outgoing cookie type files keeping your identity and preferences confidential when you re browsing the Internet 3 2 Other Features Hourly Updates Your copy of BitDefender will be updated 24 times a day over the Internet directly or through a Proxy Server The product is able to r
64. is method of scanning does not rely on specific virus signatures The advantage of the heuristic scan is that it is not fooled by a new variant of an existing virus However it might occasion Java applet Macro virus Mail client Memory Non heuristic ally report suspicious code in normal programs generating the so called false positive Internet Protocol A routable protocol in the TCP IP protocol suite that is responsible for IP addressing routing and the fragmentation and reassembly of IP packets A Java program which is designed to run only on a web page To use an applet on a web page you would specify the name of the applet and the size length and width in pixels that the applet can utilize When the web page is ac cessed the browser downloads the applet from a server and runs it on the user s machine the client Applets differ from applications in that they are governed by a strict security protocol For example even though applets run on the client they cannot read or write data onto the client s machine Addition ally applets are further restricted so that they can only read and write data from the same domain that they are served from A type of computer virus that is encoded as a macro embed ded in a document Many applications such as Microsoft Word and Excel support powerful macro languages These applications allow you to embed a macro in a docu ment and have the macro execute each tim
65. isfy the protection requirements of today s computing environment delivering effective threat management for over 41 million home and corporate users in more than 100 countries Designed to provide full protection for corporate network and systems the BitDe fender solution range comprises beside antivirus protection antispam personal firewall and security management solutions BitDefender also specializes in providing assistance with designing and establishing content security policies for corporate networks BitDefender Professional was the third product of its kind in the world to receive ICSA certification for Windows XP and the first to be awarded for groundbreaking innovation by the European Commission and Academies BitDefender Antivirus is certified by all the major reviewers in the antivirus field ICSA Labs CheckMark CheckVir T V and Virus Bulletin BitDefender is headquartered in Bucharest Romania and has offices in Tettnang Germany Barcelona Spain and Florida US Website http www bitdefender com 1 Why BitDefender Proven Most reactive antivirus producer BitDefender fast reactivity in case of computer virus epidemic was confirmed beginning with the last outbreaks of CodeRed Nimda and Sircam as well as Badtrans B or other dangerous fast spreading malicious codes BitDefender was the first to provide antidotes against these codes and to make them freely available on the Internet for all affected people Now with
66. kbox corresponding to Delete from original location A guicker method to add suspicious files to the guarantine is to drag amp drop them in the guarantine list e Delete deletes the selected file from your computer e Restore returns the selected file to its original location e Send sends the selected files for further analysis to the BitDefender lab Important O You must specify some information before you may submit these files For that click Settings and complete the fields from the E mail settings section as de scribed below e Settings opens the advanced options for the quarantine zone The following window will appear BitDefender Quarantine Settings Quarantine settings C Limit the size of the quarantine folder Automatically send quarantine Send every 60 minute s Automatically delete sent files Drag amp Drop settings Copy file s O Move file s Prompt user Submission settings T Your address Cancel Default Quarantine Settings The quarantine options are grouped in two categories e Quarantine settings e Submission settings Antispyware module consoe DZ Note Quarantine settings Click the box with to open an option or the box with to close an option e Limit the size of quarantine folder maintains under control the size of the quarantine This option is enabled by default and its size is 12000
67. maxkdocsiBrazil_ManualThe_Render_Dialog_flesimage011 OK Files aid C Bdsmax docs Brazil_Manual The_Render_Dialog_files image01 2 OK Folders 25 C 3dsmax docs Brazil_Manual The_Render_Dialog_filestmage013j OK Archives o C dsmaxidocs Brazl_ManualiThe_Render_Dialog files maged 4 j OK Packed programs 0 C Gdsmaxidocs Brazl_ManuallThe_Render_Dialog _ filesimage015 OK C Sdsmaxidocs BrazilManuallThe_Rencler_Dialog_filesimage018 OK a C GdsmaxidocstBrazl_ManuallThe_Render_Dialog flesimage019 OK Infected objects 0 C Gdsmaxkocs Brazi_ManualiThe_Render_Dialog flestmage020 OK Tapai obj x Clidsmaxidocs Brazil Manualilhe Render Dialog flestmageSam OK mios i C lidsmaxidocs Brazi Manualilhe Render Dialog flesimageSam OK Crtidsmaxidocs Brazil Manualilhe Render Dialog filesimgTexdFit OK Tekivad 2 C Bdemax docs Brazil_Manual The_Rendet _Dialog_files LumaServ OK petete p C Gdsmex docs Brazil_Manual The_Render_Dialog_files LumaServ OK Copied 9 Clidsmaxidocs Brazil Manualilhe Render Dialog flesiLumaServ OK Moved 9 x Renamed 0 lt gt identified viruses 0 Show last scanned file Scanning 3 Pause Stop Spyware Scan While scanning BitDefender will show you its progress and alert you if any spywares are found Antispyware module M 07 om Select the checkbox corresponding to Show last scanned file and only th
68. module check the description of the Antispyware module p 17 7 1 On access scanning To access this section click Shield tab from the Antispyware module Antispyware module M O7 oe neal Shield Scan Scheduler System Info Quarantine Report F il Spyware Shield i E Antispyware cnet i BitDefender monitors General j i dozens of potential Shield settings i hotspots in your TT Enable Files control Advanced gt gt gt system where il spyware might act Antispyware Enable Dial control Advanced gt gt gt i and also checks any C E 1 Enable Script control Advanced gt gt gt changes made to i your system and i O Enable Cookies control Advanced gt gt gt il software Update Registry Control Advanced gt gt gt il Known spyware Show warning when spyware is found ll threats are blocked in n i real time and so are Shield statistics i cookies and dialer Total registry entries allowed 0 J scripts Total registry entries blocked 0 Last scanned file none Total detected files 0 E bitdefender More Help secure your every it Spyware Shield BitDefender monitors dozens of potential hotspots in your system where spyware might act and also checks any changes made to your system and software Known spyware threats are also blocked in real time In this section you can configure the Spyware Shield and you can
69. n order to scan your com puter for spywares e Contextual scanning right click on a file or a folder and select BitDefender Anti virus v9 e Drag amp Drop scanning drag and drop a file or a folder over the Scan Activity Bar e Scheduled scanning you can program BitDefender to scan your system for spywares periodically 7 2 1 Immediate scanning To scan your computer for viruses please follow the next steps Step 1 5 Close all open programs In order for BitDefender to make a complete scanning you need to shut down all open programs Especially your email client i e Outlook Outlook Express or Eudora is important to shut down Step 2 5 Make sure that BitDefender knows the latest spywares Before you let BitDefender scan your computer you should make sure that BitDefender is up to date with its spyware signatures since new spywares are found and identified every day You can verify when the last update was made in the upper side of the Update module Antispyware module M 07 Step 3 5 Choose scan targets In the management console enter the Antivirus module and click Scan tab By default the section contains an image of the system s partition structure Besides this some buttons and scan options can also be observed You can select from 2 scan types e Quick scan if you select this options only the registry entries cookies processes and some specific files will be scanned against spywares
70. nced by end users because systems are not available Hacking and unauthorized access that causes damage Some simultaneously developments and benefits can be accomplished by using the BitDefender security suite Increase network availability by stopping the spread of malicious code attacks i e Nimda Trojan horses DDoS e Protect remote users from attacks Reduce administrative costs and deploys rapidly with BitDefender Enterprise management capabilities e Stop the spreading of malware through e mail using a BitDefender e mail protec tion at the company s gateway Temporarily or permanently block unauthorized vulnerable and expensive application connections Description and features O E 2 2 Data Security Division Ever since the beginning SOFTWIN s Data Security Division approached data protec tion in a specific manner with the first intelligent update requiring no user interven tion the first remote antivirus management through WAP technology or the first Personal Firewall to be integrated within an antivirus engine to provide complete re sponse to today s complex security threats Born to provide full data security at all critical levels in today s business environment Data Security Division aims to ensure systems protection against computer viruses to do antivirus research to develop new technologies for monitoring all possible ways to infect a system and last but not least to educate the IT amp C public
71. nd increase the time needed for the scan process to finish Antispyware module a 07 Option Description Shut down the PC when Shut down the computer after the scan process has scan is completed finished Submit suspect files to You will be prompted to submit all suspect files to BitDefender Lab BitDefender lab after the scan process has finished Minimize scan window on Minimizes the scan window to system tray Double start to systray click the BitDefender icon to open it Click OK to save the changes or click Default to load the default settings Step 5 5 Scan for spywares With the scan options selected all you have to do is to effectively start the system scanning For that just click Scan This may take a while depending on the size of your hard disk drive BitDefender Virus Scan File Status Al C Sdsmaxidocs BrazilMenualiThe_Render_Dialog_fles GeneralO OK Scan time 00 00 23 C 3dsmaxidocs BrazilMenuallThe_Rencler_Dialog_files image001 OK estimated time lett 00 11 27 C BdsmaxidocsWBrazl_ManualiThe_Rencer_Dialog filesimage002 OK Scan speed files sec 3 C Gdsmaxkdocs Brazl_ManuallThe_Render_Dialog flestimage003 OK Co C 3dsmaxidocs BrazilMenuallThe_Render_Dialog_files image008j OK WEI Sdsmaxidocs BrazilMenualiThe_Render_Dialog_files image007 j OK C 3dsmaxidocs BrazilMenualiThe_Render_Dialog_filesimage009j OK Boot sectors 5 C Gds
72. nfigure the following options e Update location If you are connected to a local network that has BitDefender virus signatures placed locally you can change the location of the updates here By default this is http upgrade bitdefender com e Use proxy In case the company uses a proxy server check this option The fol lowing settings must be specified e Proxy sets type in the IP or the name of the proxy server and the port BitDe fender uses to connect to the proxy server Important O Syntax name port or ip port e Proxy user type in a user name recognized by the proxy Important D Syntax domain user e Proxy password type in the valid password for the previously specified user sr DE Update module 8 2 2 Automatic update options e Automatic check for updates BitDefender automatically checks our servers for available updates e Verify every x hours Sets how often BitDefender checks for updates The default time interval is 1hour e Silent update BitDefender automatically downloads and implements the update e Ask before download every time an update is available you will asked before download e Ask before install every time an update was downloaded you will asked before installing it Important D If you select Ask before download or Ask before install and you close amp exit the management console the automatic update will not be performed 8 2 3 Manual update type
73. ng an e mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft The e mail directs the user to visit a Web site where they are asked to update personal informa tion such as passwords and credit card social security and bank account numbers that the legitimate organization already has The Web site however is bogus and set up only to steal the user s information Polymorphic virus A virus that changes its form with each file it infects Since they have no consistent binary pattern such viruses are hard to identify Port An interface on a computer to which you can connect a device Personal computers have various types of ports In ternally there are several ports for connecting disk drives display screens and keyboards Externally personal com Report file Script Spam Spyware puters have ports for connecting modems printers mice and other peripheral devices In TCP IP and UDP networks an endpoint to a logical con nection The port number identifies what type of port it is For example port 80 is used for HTTP traffic A file that lists actions that have occurred BitDefender maintains a report file listing the path scanned the folders the number of archives and files scanned how many infected and suspicious files were found Another term for macro or batch file a script is a list o
74. or con tact information Preface Appearance Description Preface p xiii This is an internal link towards some location in side the document filename File and directories are printed using monospaced font option All the product options are printed using strong characters The code listing is printed with monospaced char sample code listing Store 1 2 Admonitions The admonitions are in text notes graphically marked bringing to your attention additional information related to the current paragraph Note En The note is just a short observation Although you can omit it the notes can provide valuable information such as specific feature or a link to some related topic Important A This requires your attention and is not recommended to skip over it Usually it provides non critical but significant information Warning Y This is critical information you should treat with increased caution Nothing bad will happen if you follow the indications You should read and understand it because it describes something extremely risky 2 The book structure The book consists of five parts containing the major topics Description and features Installation Management Console Getting help and Best practices Moreover a glossary is provided to clarify some technical terms Preface po Description and features A short introduction to BitDefender It explains who BitDefender is who SOFTWIN and Data Securi
75. ptions Antispyware module M 07 om Note e Specify the type of objects to be scanned archives e mail messages and so on and other options This is made through the selection of certain options from Scanning options category Click the box with to open an option or the box with to close an option The following detection options are available Option Description Scan boot sectors Scans the system s boot sector Scan files Scan all files Scans all files regardless of their type Scan program files Only the program files will be scanned This only means only the files with the following exten sions exe bat com dll ocx scr bin dat 386 vxd sys wdm cla class ovl ole exe hlp doc dot xls ppt wbk wiz pot ppa xla x1t vbs vbe mdb rtf htm hta html xml xtp php asp js shs chm 1nk pif prc url smm pdf msi ini csc cmd bas eml and nws Scan user defined Scans only the files with the extensions spe extensions cified by the user These extensions must be mn separated by Exclude user The files with the extensions specified by the defined extensions user will NOT be scanned These extensions www must be separated by Open packed pro Scans packed files grams Open archives Scans inside archives Open e mail Scans inside mail archives archives Use heuristic detection To use heuristic scanning of the files The aim of heuristic scanning is
76. puter modem im mediately warning the user and prompting him to choose whether to block or allow such operations What does Script Control do The Script Control monitors all websites that are trying to activate a script or other active content You will be in charge of which websites you trust and which you don t What does Cookie Control do The Cookie Control ensures your privacy when you use the Internet 1 3 Update Why is it necessary to update BitDefender Every time you perform an update new antispyware signatures will be added to the database How can update BitDefender By default BitDefender will automatically update every hour But you can also update manually or change the time interval for the automatic update in the Update module Glossary ActiveX Adware Archive Backdoor ActiveX is a model for writing programs so that other pro grams and the operating system can call them ActiveX technology is used with Microsoft Internet Explorer to make interactive Web pages that look and behave like computer programs rather than static pages With ActiveX users can ask or answer questions use push buttons and interact in other ways with the Web page ActiveX controls are often written using Visual Basic Active X is notable for a complete lack of security controls computer security experts discourage its use over the Inter net Adware is often combined with a host application that is provided
77. ram FilesMessengerimsmsgs exe File version 4 0 0 155 Product Version 4 0 0 155 Publisher Microsoft Corporation Description Messenger Client Remove GoTo Refresh amp bitdefender More Help secure your every bit System Information Here you can see and change key info settings The list contains all the items loaded when starting the system as well as the items loaded by different applications Three buttons are available Remove deletes the selected item e Go to opens a window where the selected item is placed the Registry for ex ample e Refresh re open the System Information section 7 4 Quarantine To access this section click Quarantine tab from the Antispyware module Antispyware module Management O 7 console Shield Scan Scheduler System Info Quarantine Report E Quarantine lt File name Name Suspect with Sent The Quarantine holds General My Favorite Theme the No No suspect files tor i analysis i while in Quarantine Antispyware i files cannot be f executed or read B H H H il By default suspect Update files are submitted for i analysis to i BitDefender Labs il However you can choose not to submit files for analysis i To copy a suspect file i tothe Quarantine click the Adol button or simply drag amp drop the file in the i Quarantine list Click
78. re your every bit OF THIS AGREEMENT lick Next to continue o Click on the icons in the tree below to change the way features wil be installed This License Aare ia n lena Ol accept the terms in the License Agreement Ensures that your computer and your internet connection is secure Oto not accept the tems in the License Agreement pr rom spyware and other treat This feature requires 6987KB on jour hard drive The subfeatures require 12MB on your hard drive Location C Program Fles Sotwin BitDefender3 Browse 4 kest Disk Usage cba JO net gt Cancel 13 BitDefender 9 Antispyware Setup Getting ready to install Installing Real Tine Virus Reporting The Real Time Virus Rd your country the spy Ready to Install The Setup Wizard is ready to begin the Cust bitdefender 18 BitDefender 9 Antispyware Setup www bitdefender comi Completing the BitDefender 9 Antispyware Setup Wizard Should you wish to dei after instaling by unc E updated from the section Genel to the Internet to updi Z Open readme fie lick Next to proceed of your installation set Cikk the Finish button to exit the Setup Wizard Z Place a shortcut o Click Install to begin ti Wizard Installation steps Click Next to continue or click Cancel if you want to quit installation Please read the License Agreement select accept the terms in the License Agreement and
79. rning the user and prompting him to choose whether to block or allow such operations Antispyware module ae 07 You can see the name of the application and the Firewall Alert phone number MS roju asi Check Remember this answer option and click Yes tesoretto exe or No and a rule will be created applied and listed Question in the rules table You will no longer be notified Process A A A A myX Desktop 1 0 1 c program fileswnyx when the application tries to dial the same phone desktopimyxdesktop exe num b er is trying to dial the following number t 2054444 O Remember this answer Yes No Dial Control alert Every rule that has been remembered can be accessed in the Dial section for further fine tuning Important D The rules are listed in order of their priority starting from the top meaning the first rule has the highest priority Drag amp drop rules in order to change their priority To delete a rule just select it and click Delete To modify a rule s attribute just double click its field To temporarily deactivate a rule without deleting it clear the corres ponding checkbox The rules can be input automatically through the alert window or manually click New rule and choose the parameters for the rule The configuration wizard will ap pear Configuration wizard The configuration wizard is a 2 steps procedure M 07 e Step 1
80. rtup items Any files placed in this folder will open when the computer starts For example a startup screen a sound file to be played when the computer first starts a reminder calendar or application programs can be startup items Normally an alias of a file is placed in this folder rather than the file itself System tray Introduced with Windows 95 the system tray is located in the Windows taskbar usually at the bottom next to the clock and contains miniature icons for easy access to system functions such as fax printer modem volume and more Double click or right click an icon to view and access the details and controls TCP IP Transmission Control Protocol Internet Protocol A set of networking protocols widely used on the Internet that provides communications across interconnected networks of computers with diverse hardware architectures and various operating systems TCP IP includes standards for how com puters communicate and conventions for connecting net works and routing traffic Trojan A destructive program that masquerades as a benign applic ation Unlike viruses Trojan horses do not replicate them selves but they can be just as destructive One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer The term comes from a story in Homer s lliad in which the Greeks give a giant wooden horse to their foes the Trojans o
81. s exe you must select the checkbox Remember this an swer Process information Company Microsoft Corporation Version 4 7 3001 Copyright Copyright c Microsoft Corporation 2004 Question This process is attempting to modify a registry entry in order to be executed at Windows startup Do you want to allow this O Remember this answer Registry Alert e If you want to see the registry entries list click Advanced gt gt gt corresponding to Registry Control Registry access control Note Your answers will be the basis of the rule list RN For each application a small expandable el Alon run at atari menu will be created it contains all the modifications to the registry To delete a registry entry just select it and click Delete To temporarily deactivate a re gistry entry without deleting it clear the checkbox corresponding to it Delete OK Cancel Registry access control M 07 e Note BitDefender will usually alert you when you install new programs that need to run after the next startup of your computer In most cases these programs are legitimate and can be trusted 7 2 On demand scanning Antispyware module To access this section click Scan tab from the Antispyware module BitDefender 9 AntiSpyware Shield Scan
82. scans schedule log logs i scheduled scans il activbar log is il created when you i drag 8 drop a file over the activity bar File zone Net zone Show JI Delete Refresh J Settings J Browse S bitdefender More Help secure your every bit Report The Report section contains a list of all the report files generated so far Every file has enclosed its name size and the date of the last modification When launching a scan process the user has the possibility to opt for creating a report file where he can see information about the scan process The user may open these reports from the management console BitDefender will keep track of its own activity on your computer The default report files are the following e Vscan log is created when you scan your system immediately e Schedule log is from the scheduled scans you may have set up e Activbar log is created when you scan by drag amp drop feature The Report section contains some buttons created for the administration of these report files The function of each button is explained further Antispyware module a 07 Note The report files are by default saved in the folder where BitDefender is installed If you have saved the report files in another directory use the Browse button to locate them e Show opens the selected report file e Delete deletes the sel
83. so scan your system or part of it for known spyware threats The scan uses a constantly updated spyware signature database 4 3 Update module New spywares are found and identified every day This is why it is very important to keep BitDefender up to date with the latest spyware signatures By default BitDe fender automatically checks for updates every hour BitDefender modules O 4 Description and features Updates come in the following ways e Updates for the antispyware engines new spyware signatures will be added to the database This update type is also known as Antispyware Update e Product upgrades when a new product version is released new features and scan techniques are introduced to the effect of improving the product s perform ance This update type is also known as Product Update Moreover from the user s intervention viewpoint we may take into account e Automatic update the antivirus automatically contacts the BitDefender server in order to check if an update was released If so BitDefender is updated auto matically The automatic update can also be done anytime you want by clicking Update now from the Update module Management console Management console Management console 5 Overview Management console 05 BitDefender 9 Antispyware was designed with a centralized management console which allows the configuration of the protection options for all BitDefender modules
84. stensibly as a peace offering But after the Trojans drag the horse inside their city walls Greek soldiers sneak out of the horse s hollow belly and open the city gates allowing their compatriots to pour in and capture Troy Update A new version of a software or hardware product designed to replace an older version of the same product In addition Virus Virus definition Worm the installation routines for updates often check to make sure that an older version is already installed on your computer if not you cannot install the update BitDefender has it s own update module that allows you to manually check for updates or let it automatically update the product A program or piece of code that is loaded onto your computer without your knowledge and runs against your will Most viruses can also replicate themselves All computer viruses are manmade A simple virus that can copy itself over and over again is relatively easy to produce Even such a simple virus is dangerous because it will quickly use all available memory and bring the system to a halt An even more dan gerous type of virus is one capable of transmitting itself across networks and bypassing security systems The binary pattern of a virus used by the antivirus program to detect and eliminate the virus A program that propagates itself over a network reproducing itself as it goes It cannot attach itself to other programs
85. t after 1 seconds Scan for riskware vex Back Finish Cancel Summary This is the last step of the wizard In this window you can view all the settings for the new scan event and you can make any changes by returning to the previous steps Back If you do not want to make any modifications click Finish The new event will appear in the Scheduler section 7 3 System Information To access this section click System Info tab from the Antispyware module Antispyware module M 07 Shield Scan Scheduler System Info Quarantine Report F TI H System S Run Items 9 information Current User Run 1 Here you can see General H i and change key Current User RunOnce 0 i settings related to Sp i system startup and Local Machine Run 4 H shutdown running i processes system Antispyware El Local Machine RunOnce 1 Local Machine RunOnceEx 0 RunServices 0 El files the Explorer and running services Update RunServicesOnce 0 These are critical H Boot Execute 1 i system settings and Start Up Items 2 i should not be Current User Start Up 0 i changed unless All Users Start Up 0 absolutely necessary Load items 5 INI items 2 o Il Object C Program FilesiMessengerimsmsgs exe background File msmsgs exe Path C Prog
86. t the validity of the remaining portions of this Agreement BitDefender and BitDefender logos are trademarks of SOFTWIN Microsoft Windows Excel Word the Windows logo Windows NT Windows 2000 are registered trade marks of Microsoft Corporation All other trademarks are the property of their respect ive owners Preface Preface This guide is intended to all users who have chosen BitDefender 9 Antispyware as a security solution for their personal computers The information presented in this book is suitable not only for computer literates it is accessible to everyone who is able to work under Windows This book will describe for you BitDefender 9 Antispyware the Company and the team who built it will guide you through the installation process will teach you how to configure it You will find out how to use BitDefender 9 Antispyware how to update test and customize it You will learn how to get best from BitDefender We wish you a pleasant and useful lecture 1 Conventions used in this book 1 1 Typographical conventions Several text styles are used in the book for an improved readability Their aspect and meaning are presented in the table below Appearance Description sample syntax Syntax samples are printed with monospaced characters http www bitdefender com The URL links is pointing to some external loca tion on http or ftp servers lt support bitdefender com gt E mail messages are inserted in the text f
87. technical support and other services To modify the default license key click Enter new key The following window will open General module lt a DE Type in the license key in the Serial field You are about to register the full version of BitDefender Please fill Click Register to finish the registration pro in your serial number You can find it on cess Product registration card CD ROM label If you don t hi number pl tact us at i i i T ie te tn If you mistype the license key you will be prompted to re enter it se CL Cancel Enter registration key If you type in a valid license key a success message box appears In the Registration section now you can see the expiring date of the new license key 6 3 Management console settings To access this section click Settings tab from the General module General module M 06 rs Status Registration Settings Events About SY O Enable password protection General settings Load BitDefender when Windows starts i The BitDefender Sorrir E Receive security notifications about the latest Send virus reports security concerns Show on screen notes The virus report Enable multiuser support indigeni t Enable activity bar il viruses found on your i PC to the BitDefender i Labs No personally Choose skin i identifiable information Default i sent O Grey If you are not t
88. tiSpyware Scan System Info Quarantine Report Scheduler Name Next Run type Target General Antispyware El Update New cure your eve i The Scheduler lets il you plan ahead and il schedule full j system drive scans in il the off hours when i you won t be using il your computer i we strongly E recommend that you i schedule a full system scan at least i once a week Press New to start i the Scheduler wizard i which will step you through the process i of creating new scan tasks i Tasks can be started i at any given time by selecting and i pressing Run now Scheduler More Help Scheduler Since the scanning will take some time and works best if you have closed all other programs it is best for you to schedule the scanning at a time when you are not using your computer and it is standing idly by This implies that the user must previ ously create a so called task job or scan event The Scheduler contains a wizard for creating new scan tasks This will assist you any time you need to do any operation with these scan events no matter if it s creating a new task or modifying an existing one The Scheduler section contains some buttons for administrating the scan tasks e New launches the wizard that will guide you through the creation of a new scan t
89. to identify new viruses based on certain patterns and algorithms be Antispyware module consoe SC 7 Option Description fore a virus definition is found False alarm messages can appear When such a file is de tected it is classified as suspicious In these cases we recommend you to send the file to the BitDefender lab to be analyzed Detect incomplete virus bodies Detects incomplete virus bodies Prompt for reboot If actions require reboot prompt users for im mediate reboot e Specify the action on infected or suspicious files Open Action options category in order to see all possible actions on these files Select the actions to take when an infected or a suspected file is detected You can specify different actions for infected and suspected files You can also select a second action if the first fails Action Description None No action will be taken on infected files These files will appear in the report file Prompt user for action When an infected file is detected a window will ap pear prompting the user to select the action on that file Depending on the importance of that file you can select to disinfect it isolate it in the quarantine zone or delete it Disinfect files Disinfects the infected file Delete files Deletes the infected files immediately without any warning Rename files Changes the extension of the infected files The new extension of the infected files will be vir By r
90. ty Division are BitDefender 9 Antispy ware its features and the product modules are presented to you Installation Step by step instructions for installing BitDefender on a workstation This is a comprehensive tutorial on installing BitDefender 9 Antispyware Starting with the prerequisites for a successfully installation you are guided through the whole installation process Finally the removing procedure is described in case you need to uninstall BitDefender Management console Description of basic administration and maintenance of BitDefender The chapters explain in detail all options of BitDefender 9 Antispyware how to register the product how to scan your computer and how to perform the updates Getting help Where to look and where to ask for help if something goes unex pected appears It includes a FAQ section too Best practices Follow the steps described in here in order to ensure a computer free from viruses Glossary The Glossary tries to explain some technical and uncommon terms you will find in the pages of this document Request for Comments We invite you to help us improve the book We have tested and verified all of the information to the best of our ability Please write to tell us about any flaws you find in this book or how you think it could be improved to help us provide you with the best documentation possible Let us know by sending an e mail to lt documentation bitdefender com gt Preface
91. u for permission whenever a website tries to activate a script or other active content Antispyware module ae 07 You can see the name of the resource Firewall Alert y Check Remember this answer option and click Yes room esta tretoatretox exe or No and a rule will be created applied and listed in the rules table You will no longer be notified Question when the same site tries to send you active con This program received active content ActiveX Java Applet Script from 10 11 0 1 through http service Do tent you want to allow this program to store it locally Remember this answer Yes No Script Control alert Every rule that has been remembered can be accessed in the Script section for further fine tuning Important D The rules are listed in order of their priority starting from the top meaning the first rule has the highest priority Drag amp drop rules in order to change their priority To delete a rule just select it and click Delete To modify a rule s attribute just double click its field To temporarily deactivate a rule without deleting it clear the corres ponding checkbox The rules can be input automatically through the alert window or manually click New rule and choose the parameters for the rule The configuration wizard will ap pear Configuration wizard The configuration wizard is a 1 step procedure Antispyware module M
92. view information regarding its activity Note In the bottom side of the section you can see the Spyware Shield statistics To prevent spyware from infecting your computer keep the Spyware Shield enabled Select Show warning when a spyware is found to be noticed through an alert window when a spyware is found For an infected file the alert window will contain the name of the spyware the path to it the action taken by BitDefender and a link to the Bit Defender site where you can find more information about it Antispyware module a 07 In case a suspicious file is detected you can launch a wizard from the alert window that will help you to send that file to the BitDefender Lab for further analysis You can type in your e mail address to receive information regarding this report The Spyware Shield protects your computer against spywares through 5 important protection controls Files Control Dial Control Script Control Cookies Control Registry Control 7 1 1 Files Control Click Advanced gt gt gt corresponding to Files Control to configure this protection Click the box with to open an option E Scan accessed tiles and P2P transters options A ad A O Scan al tes or the box with to close an option Scan program files only Scan user defined extensions Tropea You can observe that some scan options can inside archives Y Scan packed files although
93. ware in this section you can configure the Antispyware module e Update in this section you can configure the Update module On the right side of the management console you can see information regarding the section you are into The More Help option placed at the right bottom opens the Help file 5 1 System tray When the console is minimized an icon will appear in the system tray If you double click this icon the management console will open System tray Also by right clicking it a contextual menu li containing the following options will appear Close Options Help Update now Exit Contextual menu Show opens the management console Close minimizes the management console to system tray Options opens the Settings section of the management console Help opens the help file Update now performs an immediate update lt a 05 e Exit shuts down the application By selecting this option the icon from the system tray will disappear and in order to access the management console you will have to launch it again from the Windows Start menu Note e The icon will turn into black if you disable one or more of the BitDefender modules This way you will know if some modules are disabled without opening the management console e The icon will blink when an update is available 5 2 Scan activity bar The Scan activity bar is a graphic visualization of the scanning activity on
94. xes to the left to H i enable or disable the El modules Update i Greyed out modules H are disabled tems marked in red require your immediate attention BitDefender comes i fully configured for i maximum security Click the tabs to view more detailed El information or to i change settings manually US bitdefender Morena secure your every bit General information In this section you can review information regarding the product status To enable disable the main BitDefender features select clear the check boxes corres ponding to them y Warning Items marked in red require your immediate attention 6 1 1 Firewall The Antispyware monitors dozens of potential hotspots in your system where spyware might act and also checks any changes made to your system and software The figures shown represent the scanned objects during this session lt a DE General module Note 6 1 2 Automatic Update To be protected against Spyware keep the Antispyware enabled New spywares are found and identified every day This is why it is very important to keep BitDefender up to date with the latest spyware signatures It displays the date of the last update Note En To protect your critical data BitDefender can perform automatic updates Keep the Automatic update option enabled 6 2 Product registration To access this se
95. y for the content of those third party sites Trademarks Trademark names may appear in this book All registered and unregistered trade marks in this document are the sole property of their respective owners BitDefender 9 Antispyware amp bitdefender secure your every bit BitDefender 9 Antispyware BitDefender 9 Antispyware Table of Contents License and Warranty i ix Preface senor carr ami RR RE E a xiil 1 Conventions used inthisbook rr rerriea xiii 1 1 Typographical conventions LL xiii 1 2 AQMONIIONS 5 ran a a E a je p v in j ae ad xiv 2 THE DOOK StTUCTUTE si eaa a cai al dee as aca aa eds RR aay xiv 3 Request for COMMENTS LL XV PIOGUCE Instala tio prisi n arias 1 1 BitDefender 9 Antispyware installation 3 1 1 System requirements LL 3 1 2 Installation STEPS ie jcc hak ia ao ad By SRO alah E ALARE A EE E i Ose ue a 3 153 Upgrade arie sehen a Sid vee cau E AE a ai 6 1 4 Removing repairing or modifying BitDefender features 6 D eschinuan and TOQUES iscritta ai 9 2 Overview cai rare RR 11 2 1 Why BitDefender 355 2 4 a ARRE ATA RR RARE ELE RL 11 2 2 Data Security Division LL 13 SA LEA e ARE ER See 13 3 BitDefender 9 Antispyware eee 15 3 1 Antispyware iii Die eee a 15 3 23 Other Features sisi cla ii De aa 15 4 BitDefender modules eee eee 1
Download Pdf Manuals
Related Search
Related Contents
Sweex SA728 Philips RI1601 Sanyo VPC-X1200EX User's Manual X-Ray cabinet - Sirona Support RNAscope® 2.5 HD Detection Reagent – RED User Manual MANUEL D`INSTALLATION TestLink - User Manual - Testlink 1.9.14 [DEV] (Padawan) Samsung SMART CAMERA WB250F Käyttöopas USS-200/USS-201 CCD Camera User`s Manual Copyright © All rights reserved.
Failed to retrieve file