Home

Bitdefender Webcam 2008 User's Manual

image

Contents

1. Create an account later Account Creation do not have a BitDefender account In order to benefit from free BitDefender technical support and other free services you need to create an account Note ES If you want to create an account later select the corresponding option To create a BitDefender account select Create a new BitDefender account and provide the required information The data you provide here will remain confidential m E mail type in your e mail address m Password type in a password for your BitDefender account Registration 35 Note The password must be at least four characters long m Re type password type in again the previously specified password m First name type in your first name m Last name type in your last name m Country select the country you reside in Note Use the provided e mail address and password to log in to your account at http myaccount bitdefender com To successfully create an account you must first activate your e mail address Check your e mail address and follow the instructions in the e mail sent to you by the BitDefender registration service Click Next to continue l already have a BitDefender account BitDefender will automatically detect if you have previously registered a BitDefender account on your computer In this case all you have to dois to click Next If you already have an active account
2. 77 8 4 Quarantine Ar a rete oer ttp da a ae ede pa ae bt et 79 8 4 1 Managing Quarantined Files 80 8 4 2 Configuring Quarantine Settings it rc a 81 9 Privacy Control iio 83 9 1 Privacy Control Status ix eurn rar ta a a 83 9 11 Privacy Control vecina Ld ua eda tanei eae Diae a a dd ae ei 84 9 1 2 Antiphishirig ProtectioM sgeire sheaa ada dare ici a 85 9 2 Advanced Settings Identity Control 86 9 2 1 Creating Identity Rules 000 dame Re meme kdo 87 9 2 2 Defining EXCODplIOFiS 24 sucre tnd othe ts a 90 9 2 3 Ma aging Rules onere da um Rake 91 9 3 Advanced Settings Registry Control 92 9 4 Advanced Settings Cookie Control 94 9 41 Configuration Wizard oues Pee d neo toten durs donus 96 9 5 Advanced Settings Script Control 98 9 5 1 Configuration Wizard 2o e pe rete pepe nest 99 9 6 System Information x 4 9 esee a ded 100 9 7 Antiphishing Toolbar bee pd me prete ar eet 102 10 Update eere Er erem Pun iex a 104 10 1 Automatic Update 23262 acta teer onere tera eI aon 104 10 11 Requesting am Update acond 106 10 1 2 Disabling Automatic Update 106 10 2 Update Settings xe eret a yr eee pavet teet rn peret 107 10 21 Setting Update Locations cir
3. Once Periodically Atevery 7 i days Start Date 11 23 2007 v Start Time 7 01 09 PM Scheduler You can see the task schedule if any When scheduling a task you must choose one of the following options m Not Scheduled launches the task only when the user requests it m Once launches the scan only once at a certain moment Specify the start date and time in the Start Date Time fields m Periodically launches the scan periodically at certain time intervals hours days weeks months years starting with a specified date and time If you want the scan to be repeated at certain intervals select Periodically and type in the At every edit box the number of minutes hours days weeks months years indicating the frequency of this process You must also specify the start date and time in the Start Date Time fields Click OK to save the changes and close the window To run the task just click Scan Antivirus 63 8 2 5 Scanning Objects Before you initiate a scanning process you should make sure that BitDefender is up to date with its malware signatures Scanning your computer using an outdated signature database may prevent BitDefender from detecting new malware found since the last update To verify when the last update was performed click Update gt Update in the settings console Note e In order for BitDefender to make a complete scanning you need to shut down all
4. 4 4 44 444444484 35 6 3 Step 3 3 Register BitDefender Antivirus 2008 37 Advanced Security Administration 38 7 Settings Console 44uusscsusscssuusccsnnsccsnusecsunsessunse 39 7 1 Configuring General Settings 40 7 1 1 General Settings errs oreroraa e SER deber man omatee es 40 1 2 Virus Report Setlihgs os siepe e e 42 1 3 Manage Settings o petrbehunEES a 42 SAFE NIDIIIL Rm 43 6 1 On access Scanning x oed acute a gn ea dae sd 43 8 1 1 Configuring Protection Level 44 8 1 2 Customizing Protection Level 45 8 1 3 Disabling Real time Protection 49 86 2 On demand Scanning vecina EE n E ann Mate te ed SEA 49 8 2 1 Scan TASKS ioc e E PERRA PRECEDENTE Rada PES 50 82 2 Using Shortcut Menu paru rl daa e OU RE PERPE 52 8 2 3 Creating Scan Tasks 2 0 2 iodo ba didi lee ua decade zai mines 53 8 2 4 Configuring Scan Tasks cec ud ed xx oe ter debo dn teste 53 82 5 Scanning Objects dose ED id LAE nd ED A 64 8 2 6 Viewing Scan LOgS es pecu aded eee Paene EA ds 71 8 3 Objects Excluded from Scanning 72 8 3 1 Excluding Paths from Scanning ciao Roane eects nme nens 74 8 3 2 Excluding Extensions from Scanning
5. 4 Always apply this action for this program If you know this program we recommend you to allow the attempt Registry Alert Note You can deny this modification by clicking No or you can allow it by clicking Yes If you want BitDefender to remember your answer check Always apply this action to this program In this way a rule will be created and the same action will be applied whenever this program tries to modify a registry entry in order to be executed at Windows start up BitDefender will usually alert you when you install new programs that need to run after the next startup of your computer In most cases these programs are legitimate and can be trusted Every rule that has been remembered can be accessed in the Registry section for further fine tuning To access this section open the Advanced Privacy Control Settings window and click the Registry tab Note To open the Advanced Privacy Control Settings window click Privacy Control gt Status in the settings console and click Advanced Settings Privacy Control 93 9 4 Advanced Identity Control Settings Identity Registry Enable Registry control Total attempts blocked 1 a i Application Name Action Application ActiveSync Connect Permit C Program Files Microsoft ActiveSynctwcesc QuickTime Task Permit C Program Files QuickTime QTTask exe amp Yahoo Messenger Permit C Program FilestYahoo MessengeriYahooM
6. E mail Electronic mail A service that sends messages on computers via local or global networks Events An action or occurrence detected by a program Events can be user actions such as clicking a mouse button or pressing a key or system occurrences such as running out of memory False positive Occurs when a scanner identifies a file as infected when in fact it is not Filename extension The portion of a filename following the final point which indicates the kind of data stored in the file Many operating systems use filename extensions e g Unix VMS and MS DOS They are usually from one to three letters some sad old OSes support no more than three Examples include c for C source code ps for PostScript txt for arbitrary text Heuristic A rule based method of identifying new viruses This method of scanning does not rely on specific virus signatures The advantage of the heuristic scan is that itis not fooled by a new variant of an existing virus However it might occasionally report suspicious code in normal programs generating the so called false positive IP Internet Protocol A routable protocol in the TCP IP protocol suite that is responsible for IP addressing routing and the fragmentation and reassembly of IP packets Java applet A Java program which is designed to run only on a web page To use an applet on a web page you would specify the name of the applet and the size length and width in
7. BitDefender Rescue CD 112 11 Overview BitDefender Antivirus 2008 comes with a bootable CD BitDefender Rescue CD capable to scan and disinfect all existing hard drives before your operating system starts You should use BitDefender Rescue CD any time your operating system is not working properly because of virus infections That usually happens when you don t use an antivirus product The update of the virus signatures is made automatically without user intervention each time you start the BitDefender Rescue CD BitDefender Rescue CD is a BitDefender re mastered Knoppix distribution which integrates the latest BitDefender for Linux security solution into the GNU Linux Knoppix Live CD offering a desktop antivirus which can scan and disinfect existing hard drives including Windows NTFS partitions At the same time BitDefender Rescue CD can be used to restore your valuable data when you cannot boot Windows Note BitDefender Rescue CD can be downloaded from this location http download bitdefender com rescue cd 11 1 System Requirements Before booting BitDefender Rescue CD you must first verify if your system meets the following requirements Processor type x86 compatible minimum 166 MHz but do not expect a great performance in this case An i686 generation processor at 800MHz would make a better choice Memory Minimum 512 MB of RAM Memory 1 GB recommended CD ROM BitDefender Rescue CD runs from a CD ROM
8. The configuration wizard is a 1 step procedure Privacy Control 99 Step 1 1 Select Address and Action BitDefender Script Control Wizard 9 6 Select Address and Action Enter domain www bitdefender com Select action Permit O Deny Select the specific domain s that you want to allow or block scripting for Generally you should use this wizard to specify the domains you want to Permit scripting from It is recommended that you block scripts from all domains you don t explicitly trust Select Address and Action You can set the parameters m Domain address type in the domain on which the rule should apply m Action select the action of the rule Action Description Permit The scripts on that domain will execute Deny The scripts on that domain will not execute Click Finish Click OK to save the changes and close the window System Information BitDefender allows you to view from a single location all system settings and the applications registered to run at startup In this way you can monitor the activity of the system and of the applications installed on it as well as identify possible system infections To obtain system information click Privacy Control gt System Info in the settings console The following window will appear Privacy Control 100 BitDefender Antivirus 2008 Antivirus Status System Info Current System Settings s le Pr
9. 5 Right click the desired directory and select Copy The following window will appear BitDefender Rescue CD Howto 121 tTRPDOQAQAL media sdb1 Saving Data 6 Type media sdb1 into the corresponding textbox and click Copy BitDefender Rescue CD Howto 122 Getting Help 123 13 Support As a valued provider BitDefender strives to provide its customers with an unparalleled level of fast and accurate support The Support Center which you can contact at the address provided below continually keeps up with the latest threats This is where all of your questions are answered in a timely manner With BitDefender dedication to saving customers time and money by providing the most advanced products at the fairest prices has always been a top priority Moreover we believe that a successful business is based on good communication and commitment to excellence in customer support You are welcome to ask for support at support bitdefender com at any time For a prompt response please include in your email as many details as you can about your BitDefender your system and describe the problem you have encountered as accurately as possible 13 1 BitDefender Knowledge Base The BitDefender Knowledge Base is an online repository of information about the BitDefender products It stores in an easily accessible format reports on the results of the ongoing technical support and bugfixing activities of the Bi
10. ANTIVIRUS 4 User s guide Copyright 2008 BitDefender BitDefender Antivirus 2008 User s guide Published 2008 04 10 CopyrightO 2008 BitDefender Legal Notice All rights reserved No part of this book may be reproduced or transmitted in any form or by any means electronic or mechanical including photocopying recording or by any information storage and retrieval system without written permission from an authorized representative of BitDefender The inclusion of brief quotations in reviews may be possible only with the mention of the quoted source The content can not be modified in any way Warning and Disclaimer This product and its documentation are protected by copyright The information in this document is provided on an as is basis without warranty Although every precaution has been taken in the preparation of this document the authors will not have any liability to any person or entity with respect to any loss or damage caused or alleged to be caused directly or indirectly by the information contained in this work This book contains links to third party Websites that are not under the control of BitDefender therefore BitDefender is not responsible for the content of any linked site If you access a third party website listed in this document you will do so at your own risk BitDefender provides these links only as a convenience and the inclusion of the link does not imply that BitDefender endorses or accepts any
11. In the bottom side of the section you can see the Real time protection statistics about files and e mail messages scanned Click C More statistics if you wantto see a more explained window regarding these statistics To start a quick system scan click Scan Now 8 1 1 Configuring Protection Level You can choose the protection level that better fits your security needs Drag the slider along the scale to set the appropriate protection level There are 3 protection levels Antivirus 44 Permissive Covers basic security needs The resource consumption level is very low Programs and incoming mail messages are only scanned for viruses Besides the classical signature based scan the heuristic analysis is also used The actions taken on infected files are the following clean file deny access Default Offers standard security The resource consumption level is low All files and incoming amp outgoing mail messages are scanned for viruses and spyware Besides the classical signature based scan the heuristic analysis is also used The actions taken on infected files are the following clean file deny access Aggressive Offers high security The resource consumption level is moderate All files incoming amp outgoing mail messages and web traffic are scanned for viruses and spyware Besides the classical signature based scan the heuristic analysis is also used The actions taken on infected files are the following clean file den
12. Mutt Mutt is a powerful text based MIME mail client For more information please refer to the Mutt homepage Mozilla Firefox Mozilla Firefox is a well known web browser For more information please refer to the Mozilla Firefox homepage Elinks Elinks is a text mode web browser For more information please refer to the Elinks homepage Overview 116 BitDefender Antivirus 2008 12 BitDefender Rescue CD Howto This chapter contains information on how to start and stop the BitDefender Rescue CD scan your computer for malware as well as save data from your compromised Windows PC to a removable device However by using the software applications that come with the CD you can do many tasks the description of which goes far beyond the scope of this user s guide 12 1 Start BitDefender Rescue CD To start the CD set up the BIOS of your computer to boot off the CD put the CD in the drive and reboot the computer Make sure that your computer can boot from CD Wait until the next screen shows up and follow the on screen instructions to start BitDefender Rescue CD bidetender BitDefender Rescue CD based on Knoppix www bitdefender com Press Enter to start or wait 30 seconds to boot from hard drive F2 Detailed options BitDefender Rescue CD v2 0 http wuuw bitdefender com boot Boot Splash Screen At the boot time the update of the virus signatures is made automatically This may take a while Wh
13. please refer to BitDefender Scanner p 66 2 CD RW Drive F E S Framework on Marketing Agency agenc E S vdanciu on hafs users 2 e Control Panel ce 3 Mobile Device 8 Nokia Phone Browser a5 me Mohuml Dlarar ii 1 Manual Scanning BitDefender Scanner When you initiate an on demand scanning process the BitDefender Scanner will appear Follow the three step guided procedure to complete the scanning process Step 1 3 Scanning BitDefender will start scanning the selected objects Antivirus 66 BitDefender Scanner Antivirus Scan Step 1 of 3 Scan Status wee gt HKEY_LOCAL_MACHINE SYSTEM CURRENTCONTROLSET SERVICES EVENTLOG APPLICATIONAUTOCE WIHLOGON EXE Elapsed Time 00 00 05 Files sec 13 Scan Statistics Scanned Items 68 M Infected tems 0 Hidden Files 0 os Suspect ltems 0 Hidden Processes 0 Cancel Scanning You can see the scan status and statistics scanning speed elapsed time number of scanned infected suspicious hidden objects and other Note The scanning process may take a while depending on the complexity of the scan To temporarily stop the scanning process just click Pause You will have to click Resume to resume scanning You can stop scanning anytime you want by clicking Stop amp Yes You will go directly to the last step of the wizard Wait for BitDefender to finish scanning Antivirus 67 Step
14. For more information please refer to the GtkRecover homepage Overview 114 ChkRootKit ChkRootKit is a tool that helps you scan your computer for rootkits For more information please refer to the ChkRootKit homepage Nessus Network Scanner Nessus is a remote security scanner for Linux Solaris FreeBSD and Mac OS X For more information please refer to the Nessus homepage Iptraf Iptraf is an IP Network Monitoring Software For more information please refer to the Iptraf homepage Iftop Iftop displays bandwidth usage on an interface For more information please refer to the Iftop homepage MTR MTR is a network diagnostic tool For more information please refer to the MTR homepage PPPStatus PPPStatus displays statistics about the incoming and outgoing TCP IP traffic For more information please refer to the PPPStatus homepage Wavemon Wavemon is a monitoring application for wireless network devices For more information please refer to the Wavemon homepage USBView USBView displays information about devices connected to the USB bus For more information please refer to the USBView homepage Pppconfig Pppconfig helps automatically setting up a dial up ppp connection DSL PPPoe DSL PPPoe configures a PPPoE ADSL connection 1810rotate 1810rotate toggles the video output on i810 hardware using i810switch 1 For more information please refer to the 1810rotate homepage Overview 115
15. 2008 If you wish to evaluate the product please check Continue evaluating the product and click Next If you want to register the product please check Register the product and fill in your license key To purchase a BitDefender license please visit our online store at Click here 9 Continue evaluating this product O Register the product If you do not know where your license key is please see Q Product registration card CD ROM label Online purchase e mail Registration If you do not have a BitDefender license click the provided link to go to the BitDefender online store and purchase a license key To register BitDefender Antivirus 2008 select Register the product and type the license key in the Enter new key field If the trial period has not expired and you want to continue evaluating the product select Continue evaluating the product Registration 34 Click Next to continue 6 2 Step 2 3 Create a BitDefender Account BitDefender Total Security 2008 Registration Wizard Step 2 of 3 Register the Product Create a BitDefender account or sign in to an existing one to have access to technical support safely store your license key and retrieve it later and to benefit from special offers and promotions 9 Sign into an existing BitDefender Account E mail mscarlat bitdetender com Password pr Forgot your password Create a new BitDefender Account
16. Agreement select accept the terms in the License Agreement and click Next If you do not agree with these terms click Cancel The installation process will be abandoned and you will exit setup By default BitDefender Antivirus 2008 will be installed in C Program Files BitDefender BitDefender 2008 If you want to change the installation path click Browse and select the folder in which you would like BitDefender Antivirus 2008 to be installed Click Next Select options regarding the installation process Some of them will be selected by default m Open readme file to open the readme file at the end of the installation m Place a shortcut on the desktop to place a shortcut to BitDefender Antivirus 2008 on your desktop at the end of the installation m Eject CD when installation is complete to have the CD ejected at the end of the installation this option appears when you install the product from the CD m Turn off Windows Defender to turn off Windows Defender this option appears only on Windows Vista Click Install in order to begin the installation of the product Important During the installation process a wizard will appear The wizard helps you register your BitDefender Antivirus 2008 create a BitDefender account and set BitDefender to perform important security tasks Complete the wizard guided process in order to go to the next step Click Finish You will be asked to restart your system so that the setup
17. BitDefender Antivirus 2008 Registration Wizard Step 6 of 6 Finish Thank you for using BitDefender Antivirus 2008 Please refer to the Register button in the main window of the product for information on your BitDefender Account and the expiring date of the current license key During the last 30 days of your BitDefender license the number of days left until expiration will be displayed in the upper left corner of the main window To purchase a new BitDefender key please refer to the Buy button available in the same window BitDefender Antivirus 2008 has been configured To launch the product double click the BitDefender red icon in the systray menu The main window displays the overall protection status and critical issues that require your attention For advanced options click Settings in the same window The following tasks have been successfully completed The BitDefender Engines have been updated The quick system scan has been performed The full system scan has been scheduled to run every day at 2 AM Finish This is the final step of the configuration wizard Click Finish to complete the wizard and continue with the installation process 1 4 Upgrade The upgrade procedure can be done in one of the following ways m Install without removing the previous version for v8 or higher Internet Security excluded Double click the setup file and follow the wizard described in the nstallation Steps p 3 sec
18. Fix All Issues Current Issues Monitor Item Description Current Status Ho Identity Rule added Ho Identity Rule added Real time protection P2P and file Scan Files On access Identity Control Enabled Automatic Update Enabled Update older than one day status Updated today Antiphishing Enabled Clear the Monitor checkbox to ignore the issue Click the Fix link to fix the issue Waren Fi AlNow Security Issues You can see a list of security issues and a short description of their status To fix only a particular issue click the corresponding Fix button It will be solved either on the spot or after you follow the steps of a wizard If you decide to fix them all click the Fix All Now button and follow the corresponding wizard If you need additional help click the More Help button placed at the bottom of the window A contextual help page is displayed providing you with detailed information about these issues and how to fix them Important e For every issue there is a check box enabled by default If you do not want a specific issue to be taken into account when calculating the security risk clear the corresponding check box Please use this option with caution as it is very easy to increase the security risk your computer is exposed to To fix the issues later click Close Security Status 21 3 1 Antivirus Status Button If the antivirus status button is green there is nothing to worry about Other
19. G over the BitDefender icon Getting Started 16 2 2 2 3 If there are critical issues affecting the security of your system an exclamation mark is displayed over the BitDefender icon You can hover the mouse over the icon to see the number of issues affecting the system s security Scan Activity Bar The Scan activity bar is a graphic visualization of the scanning activity on your system The green bars the File Zone show the number of scanned files per second on a scale from 0 to 50 Note The Scan activity bar will notify you when real time protection is disabled by displaying a red cross over the File Zone Activity Bar You can use the Scan activity bar to scan objects Just drag the objects that you want to be scanned and drop them over it For more information please refer to Drag amp Drop Scanning p 65 When you no longer want to see the graphic visualization just right click it and select Hide BitDefender Manual Scan If you want to quickly scan a certain folder you can use the BitDefender Manual Scan To access the BitDefender Manual Scan use the Windows Start menu by following the path Start Programs BitDefender 2008 BitDefender Manual Scan The following window will appear Getting Started 17 All you have to do is browse the folders select the folder you want to be scanned and click OK The BitDefender Scanner will appear and guide you through the scanning proces
20. but BitDefender does not detect it select Sign in to an existing BitDefender Account and provide the e mail address and the password of your account O Note If you provide an incorrect password you will be prompted to re type it when you click Next Click Ok to enter the password again or Cancel to exit the wizard If you have forgotten your password click Forgot your password and follow the instructions Click Next to continue Registration 36 BitDefender Total Security 2008 Registration Wizard Step 3 of 3 Finish Thank you for using BitDefender Antivirus 2008 Please refer to the Register button in the main window of the product for information on your BitDefender Account and the expiring date of the current license key During the last 30 days of your BitDefender license the number of days left until expiration will be displayed in the upper left corner of the main window To purchase a new BitDefender key please refer to the Buy button available in the same window Y Open my BitDefender Account Internet connection required Summary Select Open my BitDefender Account to enter your BitDefender account Internet connection is required Click Finish to close the window Registration 37 Advanced Security Administration 7 Settings Console BitDefender Antivirus 2008 comes with a centralized settings console which allows advanced configuration and administration of BitDefender To acc
21. field Click Finish 9 2 2 Defining Exceptions There are cases when you need to define exceptions to specific identity rules Let s consider the case when you create a rule that prevents your credit card number from being sent over HTTP web Whenever your credit card number is submitted on a website from your user account the respective page is blocked If you want for example to buy footwear from an online shop which you know to be secure you will have to specify an exception to the respective rule To open the window where you can manage exceptions click Exceptions Privacy Control 90 Exceptions Allowed Web e mail address Exception type www bitdefender com HTTP Exceptions To add an exception follow these steps 1 Click Add to add a new entry in the table 2 Double click Specify allowed address and provide the web address or the mail address that you want to add as exception 3 Double click Choose type and choose from the menu the option corresponding to the type of address previously provided m If you have specified a web address select HTTP m f you have specified an e mail address select SMTP To remove an exception from the list select it and click Remove Click OK to save the changes 9 2 3 Managing Rules You can see the rules listed in the table To delete a rule just select it and click the amp Delete button To temporarily deactivate a rule witho
22. files from on demand scanning Antivirus 72 BitDefender allows excluding objects from on access or on demand scanning or from both This feature is intended to decrease scanning times and to avoid interference with your work Two types of objects can be excluded from scanning m Paths the file or the folder including all the objects it contains indicated by a specified path will be excluded from scanning m Extensions all files having a specific extension will be excluded from scanning Note The objects excluded from on access scanning will not be scanned no matter if they are accessed by you or by an application To see and manage the objects excluded from scanning click Antivirus Exceptions in the settings console The following window will appear BitDefender Antivirus 2008 ey Antivirus Shield Scan Exceptions Ou Y Antivirus scan exceptions are enabled 9 7 Privacy Control S B B f Objects not to be scanned On access On demand Update Y Files and folders c documents and settingsivdanciu idesktopieicar_test Yes No Extensions avi Audio Video Interleaved animation file git Graphics Interchange Format bitmap graphics mpeg Exceptions Antivirus 73 You can see the objects files folders extensions that are excluded from scanning For each object you can see if it is excluded from on access on demand scanning or both
23. general matters Their respective addresses and contacts are listed below BitDefender LLC 6301 NW 5th Way Suite 3500 Fort Lauderdale Florida 33309 Web http www bitdefender com Technical support m E mail support bitdefender com m Phone Support 126 1 888 868 1873 Registered Users Only accessible in United States only 1 954 776 6262 Registered Users Only Customer Service m E mail customerservice bitdefender com m Phone 1 888 868 1873 Registered Users Only accessible in United States only 1 954 776 6262 Registered Users Only Germany BitDefender GmbH Headquarter Western Europe Karlsdorferstrasse 56 88069 Tettnang Germany Tel 49 7542 9444 60 Fax 49 7542 9444 99 Email info bitdefender com Sales sales bitdefender com Web http www bitdefender com Technical Support support bitdefender com UK and Ireland One Victoria Square Birmingham B1 1BD Tel 44 207 153 9959 Fax 44 845 130 5069 Email info bitdefender com Sales sales bitdefender com Web http www bitdefender co uk Technical support support bitdefender com Spain Constelaci n Negocial S L C Balmes 195 2a planta 08006 Barcelona Support 127 Soporte t cnico soporte bitdefender es com Ventas comercial bitdefender es com Phone 34 932189615 Fax 34 932179128 Sitio web del producto http www bitdefender es com Romania BITDEFENDER 5th Fabrica de Glucoza St Bucharest Tech
24. links English http www bitdefender com site Main contact 1 German http www bitdefender de site Main contact 1 French http www bitdefender fr site Main contact 1 Romanian http www bitdefender ro site Main contact 1 Spanish http www bitdefender es site Main contact 1 Support 125 13 3 Contact Information Efficient communication is the key to a successful business During the past 10 years BITDEFENDER has established an unquestionable reputation by constantly striving for better communication so as to exceed the expectations of our clients and partners Should you have any questions do not hesitate to contact us 13 3 1 Web Addresses Sales department sales bitdefender com Technical support support bitdefender com Documentation documentation bitdefender com Partner Program partners bitdefender com Marketing marketing bitdefender com Media Relations pr bitdefender com Job Opportunities jobs bitdefender com Virus Submissions virus_submission bitdefender com Spam Submissions spam_submission bitdefender com Report Abuse abuse bitdefender com Product web site http www bitdefender com Product ftp archives ftp ftp bitdefender com pub Local distributors http www bitdefender com partner_list BitDefender Knowledge Base http kb bitdefender com 13 3 2 Branch Offices The BitDefender offices are ready to respond to any inquiries regarding their areas of operation both in commercial and in
25. log objects No action will be taken on suspicious files These files will appear in the report file 58 Delete files Deletes suspicious files immediately without any warning Move files to Quarantine Moves suspicious files into the quarantine Note Files are detected as suspicious by the heuristic analysis We recommend you to send these files to the BitDefender Lab Select the action to be taken on the hidden objects rootkits detected The following options are available None log objects No action will be taken on hidden files These files will appear in the report file Move files to Quarantine Moves hidden files into the quarantine Make visible Reveals hidden files so that you can see them Note C3 If you choose to ignore the detected files or if the chosen action fails you will have to choose an action in the scanning wizard m To be prompted to submit all suspect files to the BitDefender lab after the scan process has finished check Submit suspect files to BitDefender Lab in the Other options category If you click Default you will load the default settings Click OK to save the changes and close the window Setting Scan Target To set the scan target of a specific user scan task right click the task and select Change Scan Target The following window will appear Antivirus 59 New Task Properties Scan Path Scheduler 3 3 Floppy 4 Local Drives sp Local Disk C ET Networ
26. mc 5 Uncomment the following line HttpProxy just delete the sign and specify the domain username password and server port of the proxy server For example the respective line must look like this ND HttpProxy myuser mypassword proxy company com 8080 6 Press F2 to save the current file confirm saving and then press F10 to close it 7 Type the command bdscan update 12 5 How do save my data Let s assume that you cannot start your Windows PC due to some unknown issues At the same time you desperately need to access some important data from your computer This is where BitDefender Rescue CD comes in handy To save your data from the computer to a removable device such as an USB memory stick just follow these steps BitDefender Rescue CD Howto 120 1 Put the BitDefender Rescue CD in the CD drive the memory stick into the USB drive and then restart the computer 2 Wait until BitDefender Rescue CD finishes booting The following window will appear Desktop Screen 3 Double click the partition where the data you want to save is located e g sda3 Note When working with BitDefender Rescue CD you will deal with Linux type partition names So sda1 will probably correspond to the C Windows type partition sda3 to F and sdb1 to the memory stick 4 Browse your folders and open the desired directory For instance MyData which contains Movies Music and E books sub directories
27. one by one or the Fix all now button Gray indicates a non configured component m The Quick Tasks area helps you keep your system safe and protect your data Furthermore the BitDefender Security Center contains several useful shortcuts Buy Opens a page where you can buy the product from My Account Opens your BitDefender account page Register Opens the registration wizard Help Opens the help file Support Opens the BitDefender support web page Settings Opens the advanced settings console History Opens a window with BitDefender history 8 events BitDefender Icon in the System Tray To manage the entire product more quickly you can also use the BitDefender Icon in the System Tray If you double click this icon the BitDefender Security Center will open Also by right clicking the icon a contextual menu Show Help will allow you to quickly manage the BitDefender product About Fix all issues m Show opens the BitDefender Security Center Tum RENE ME Help opens the help file He m About opens the BitDefender web page Ext m Fix all issues helps you remove security vulnerabilities m Turn on off Game Mode turns Game Mode on off BitDefender Icon m Open advanced settings gives access to advanced settings console m Update now starts an immediate update A new window will appear where you can see the update status m Exit shuts down the application Whenever Game Mode is on you can see the letter
28. open programs Especially your email client i e Outlook Outlook Express or Eudora is important to shut down Scanning Methods BitDefender provides four types of on demand scanning m Immediate scanning run a scan task from the system user tasks m Contextual scanning right click a file or a folder and select BitDefender Antivirus 2008 m Drag amp Drop scanning drag and drop a file or a folder over the Scan Activity Bar m Manual scanning use BitDefender Manual Scan to directly select the files or folders to be scanned Immediate Scanning To scan your computer or part of it you can run the default scan tasks or your own scan tasks This is called immediate scanning To run a scan task use one of the following methods m double click the desired scan task in the list m click the G Scan now button corresponding to the task m select the task and then click Run Task The BitDefender Scanner will appear and the scanning will be initiated For more information please refer to BitDefender Scanner p 66 Contextual Scanning To scan a file or a folder without configuring a new scan task you can use the contextual menu This is called contextual scanning Antivirus 64 Right click the file or folder you want to be scanned and Opi select BitDefender Antivirus 2008 D Explore Search The BitDefender Scanner will appear and the scanning Enqueue in Foobar2000 Play in foobar2000 will be initiated For more in
29. pixels that the applet can utilize When the web page is accessed the browser downloads the applet from a server and runs iton the user s machine the client Applets differ from applications in that they are governed by a strict security protocol For example even though applets run on the client they cannot read or write data onto the client s machine Additionally applets are further restricted so that they can only read and write data from the same domain that they are served from Glossary 131 Macro virus A type of computer virus that is encoded as a macro embedded in a document Many applications such as Microsoft Word and Excel support powerful macro languages These applications allow you to embed a macro in a document and have the macro execute each time the document is opened Mail client An e mail client is an application that enables you to send and receive e mail Memory Internal storage areas in the computer The term memory identifies data storage that comes in the form of chips and the word storage is used for memory that exists on tapes or disks Every computer comes with a certain amount of physical memory usually referred to as main memory or RAM Non heuristic This method of scanning relies on specific virus signatures The advantage of the non heuristic scan is that it is not fooled by what might seem to be a virus and does not generate false alarms Packed programs A file in a compression forma
30. product to register BitDefender Antivirus 2008 Type the license key in the Enter new key field To continue evaluating the product select Continue evaluating the product Click Next BitDefender Antivirus 2008 Installation 1 3 2 Step 2 6 Create a BitDefender Account BitDefender Antivirus 2008 Registration Wizard Step 2 of 6 Register the Product Information about an existing BitDefender account was found on this PC The BitDefender account gives you access to technical support and special offers and promotions Click Next to proceed with the registration process using this account Sign into an existing BitDefender Account 8 Create a new BitDefender Account E mail i_am_vasco yahoo com Password Retype password First name Danciu Last name Cosmin Country Romenia Create an account later A confirmation e mail will be sent to the address entered above If the e mail o address is not confirmed the account will not be created Account Creation do not have a BitDefender account In order to benefit from free BitDefender technical support and other free services you need to create an account Note ES If you want to create an account later select the corresponding option To create a BitDefender account select Create a new BitDefender account and provide the required information The data you provide here will remain conf
31. protected with a password extract the files it contains and scan them separately The easiest way to scan them is to right click them and select BitDefender Antivirus 2008 from the menu m f the password protected item is an installer make sure that real time protection is enabled before you execute the installer If the installer is infected BitDefender will detect and isolate the infection If you do not want these objects to be detected again by BitDefender you must add them as exceptions to the scanning process To add scan exceptions click Settings to open the settings console and then go to Antivirus gt Exceptions For more information please refer to Objects Excluded from Scanning BitDefender Detected Suspect Files Suspect files are files detected by the heuristic analysis as potentially infected with malware the signature of which has not been released yet If suspect files were detected during the scan you will be requested to submit them to the BitDefender Lab Click OK to send these files to the BitDefender Lab for further analysis Quick Tasks 31 5 History The History link at the bottom of the BitDefender Security Center window opens another window with the BitDefender history amp events This window offers you an overview of the security related events For instance you can easily check if the update was successfully performed if malware was found on your computer if your backup tasks run without error e
32. responsibility for the content of the third party site Trademarks Trademark names may appear in this book All registered and unregistered trademarks in this document are the sole property of their respective owners and are respectfully acknowledged Cbitdefender Table of Contents License and Warranty seesss vii Preface viii a xi 1 Conventions Used in This BOOK cosacos e wack dare ER pice xi 1 1 Typographical Conventions xi 1 2 Admohltlolis cx prota xii 2 The Book Structure 256 22cm BS ES bobo er Oops xii 3 Request for Comrmlonhts ensi negara MERI ead eee Ao nee xiii PASIAN AVION acc 1 1 BitDefender Antivirus 2008 Installation 2 11 System Requirements coi ortega CIR ERI p RE DEAS 2 1 2 Installation Steps 3 46 02 ab sean rd eee ira 3 1 3 Initial Setup Wizard soria o 5 1 3 1 Step 1 6 Register BitDefender Antivirus 2008 5 1 3 2 Step 2 6 Create a BitDefender Account 6 1 3 3 Step 3 6 Learn about Real Time Virus Reporting RTVR 8 1 3 4 Step 4 6 Select the Tasks to Be Run 444444 nse t cent eee nace 9 1 3 5 Step 5 6 Wait for the Tasks to Complete 10 1 3 6 Step 6 6 VIEW SUMMAN sis 3 xe tto aO mie o oi 11 MALPICA tus a EA AA A BEP 11 1 5 Repairing or Remo
33. settings console The following window will appear BitDefender Antivirus 2008 1 3 Antivirus V Privacy Control A E Update umi Settings Update Location Settings Primary update location settings http Jupgrade bitdefender com IL Use proxy Alternate update location settings http upgrade bitdefender com 7 Use proxy Automatic update settings Time interval 1 Confirm update 9 Silent update Prompt before downloading updates Prompt before installing updates Manual Update Settings 9 Silent update Prompt before downloading updates Advanced settings 7 Wait for reboot instead of prompting V Dont update if scan is in progress V Dont update if Game Mode is on Update Settings The update settings are grouped into 4 categories Update Location Settings Automatic Update Settings Manual Update Settings and Advanced Settings Each category will be described separately 10 2 1 Setting Update Locations To set the update locations use the options from the Update Location Settings category Update Note Configure these settings only if you are connected to a local network that stores BitDefender malware signatures locally or if you connect to the Internet through a proxy server For more reliable and faster updates you can configure two update locations a Primary update location and an Alternate updat
34. system When combined with malware rootkits pose a great threat to the integrity and the security ofa system They can monitor traffic create backdoors into the system alter files and logs and avoid detection Script Another term for macro or batch file a script is a list of commands that can be executed without user interaction Glossary 133 Spam Electronic junk mail or junk newsgroup postings Generally known as any unsolicited e mail Spyware Any software that covertly gathers user information through the user s Internet connection without his or her knowledge usually for advertising purposes Spyware applications are typically bundled as a hidden component of freeware or shareware programs that can be downloaded from the Internet however it should be noted that the majority of shareware and freeware applications do not come with spyware Once installed the spyware monitors user activity on the Internet and transmits that information in the background to someone else Spyware can also gather information about e mail addresses and even passwords and credit card numbers Spyware s similarity to a Trojan horse is the fact that users unwittingly install the product when they install something else A common way to become a victim of spyware is to download certain peer to peer file swapping products that are available today Aside from the questions of ethics and privacy spyware steals from the user by using the computer s me
35. therefore a CD ROM and a BIOS capable to boot from it is required Internet connection Although BitDefender Rescue CD will run with no Internet connection the update procedures will require an active HTTP link even through some proxy server Therefore for an up to date protection the Internet connection is a MUST Overview 113 Graphical resolution Standard SVGA compatible graphics card 11 2 Included Software BitDefender Rescue CD includes the following software packages Xedit This is a text file editor Vim This is a powerful text file editor containing syntax highlighting a GUI and much more For more information please refer to the Vim homepage Xcalc This is a calculator RoxFiler RoxFiler is a fast and powerful graphical file manager For more information please refer to the RoxFiler homepage MidnightCommander GNU Midnight Commander mc is a text mode file manager For more information please refer to the MC homepage Pstree Pstree displays running processes Top Top displays Linux tasks Xkill Xkill kills a client by its X resources Partition Image Partition Image helps you save partitions in the EXT2 Reiserfs NTFS HPFS FAT16 and FAT32 file system formats to an image file This program can be useful for backup purposes For more information please refer to the Partimage homepage GtkRecover GtkRecover is a GTK version of the console program recover It helps you recover a file
36. they can be just as destructive One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer The term comes from a story in Homer s lliad in which the Greeks give a giant wooden horse to their foes the Trojans ostensibly as a peace offering But after the Trojans drag the horse inside their city walls Greek soldiers sneak out of the horse s hollow belly and open the city gates allowing their compatriots to pour in and capture Troy Update A new version of a software or hardware product designed to replace an older version of the same product In addition the installation routines for updates often check to make sure that an older version is already installed on your computer if not you cannot install the update BitDefender has it s own update module that allows you to manually check for updates or let it automatically update the product Virus A program or piece of code that is loaded onto your computer without your knowledge and runs against your will Most viruses can also replicate themselves All computer viruses are manmade A simple virus that can copy itself over and over again is relatively easy to produce Even such a simple virus is dangerous because it will quickly use all available memory and bring the system to a halt An even more dangerous type of virus is one capable of transmitting itself across networks and bypassing se
37. www daciaclub ro through http service Do you want to allow this program to store it locally Remember this answer e e Script Alert Every rule that has been remembered can be accessed in the Script section for further fine tuning To access this section open the Advanced Privacy Control Settings window and click the Script tab Privacy Control 98 Note To open the Advanced Privacy Control Settings window click Privacy Control gt Status in the settings console and click Advanced Settings Advanced Identity Control Settings identity I Registry Enable script control Total attempts blocked 0 Domain www bitdefender com Script Control You can see the rules created so far listed in the table Important The rules are listed in order of their priority starting from the top meaning the first rule has the highest priority Drag amp drop rules in order to change their priority To delete a rule just select it and click the amp Delete button To modify a parametre of a rule just double click its field and make the desired modification To temporarily deactivate a rule without deleting it clear the corresponding checkbox The rules can be input automatically through the alert window or manually click the amp Add button and choose the parameters for the rule The configuration wizard will appear 9 5 1 Configuration Wizard
38. 2 3 Select Actions When the scanning is completed a new window will appear where you can see the scan results BitDefender Scanner Antivirus Scan Step 2 of 3 Results Summary 4 threat s that affected 1 objects require s your attention Take No Action M EICAR Test File not a virus Tissue left Take No Action b Humber of issues solved 0 Actions You can see the number of issues affecting your system The infected objects are displayed in groups based on the malware they are infected with Click the link corresponding to a threat to find out more information about the infected objects You can choose an overall action to be taken for each group of issues or you can select separate actions for each issue The following options can appear on the menu Take No Action No action will be taken on the detected files Antivirus 68 Disinfect Disinfects infected files Delete Deletes detected files Unhide Makes hidden objects visible Click Continue to apply the specified actions Step 3 3 View Results When BitDefender finishes fixing the issues the scan results will appear in a new window BitDefender Scanner Antivirus Scan Step 3 of 3 Results Summary Number of Resolved Items 0 Number of Unresolved Items 1 Number of Ignored Items 0 Number of Failed Items 4 1 file could not be cleaned so your system is not virus free More details on www bitdefender com Summa
39. 386 vxd sys wdm cla class ovl ole exe hlp doc dot xls ppt wbk wiz pot ppa xla xlt vbs vbe mdb rtf htm hta html xml xtp php asp js shs chm 1nk pif pre url smm pdf msi ini csc cmd bas eml and nws Antivirus 57 Option Description Scan user defined Only the files with the extensions specified by extensions Open packed programs Open archives Open e mail archives Scan boot sectors Scan memory Scan registry Scan cookies the user will be scanned These extensions must be separated by Scans packed files Scans inside archives Scans inside mail archives Scans the system s boot sector Scans the memory for viruses and other malware Scans registry entries Scans cookie files m Specify the actions to be taken on the infected suspicious or hidden files detected in the Action options category You can specify a different action for each category e Select the action to be taken on the infected files detected The following options Antivirus are available None log objects Disinfect files Delete files No action will be taken on infected files These files will appear in the report file Disinfects infected files Deletes infected files immediately without any warning Move files to Quarantine Moves infected files into the quarantine e Select the action to be taken on the suspicious files detected The following options are available None
40. Level You can easily configure the scan settings by choosing the scan level Drag the slider along the scale to set the appropriate scan level There are 3 scan levels Low Offers reasonable detection efficiency The resource consumption level is low Programs only are scanned for viruses Besides the classical signature based scan the heuristic analysis is also used Medium Offers good detection efficiency The resource consumption level is moderate Antivirus 54 All files are scanned for viruses and spyware Besides the classical signature based scan the heuristic analysis is also used High Offers high detection efficiency The resource consumption level is high All files and archives are scanned for viruses and spyware Besides the classical signature based scan the heuristic analysis is also used A series of general options for the scanning process are also available Option Description Run the task with Low Decreases the priority of the scan process You will allow priority other programs to run faster and increase the time needed for the scan process to finish Minimize scan window on Minimizes the scan window to the system tray start to systray Double click the BitDefender icon to open it Click OK to save the changes and close the window To run the task just click Scan Customizing Scan Level Advanced users might want to take advantage of the scan settings BitDefender offers The scanner can be set
41. Note The exceptions specified here will NOT apply for contextual scanning To remove an entry from the table select it and click the amp Delete button To edit an entry from the table select it and click the amp Edit button A new window will appear where you can change the extension or the path to be excluded and the type of scanning you want them to be excluded from as needed Make the necessary changes and click OK Note You can also right click an object and use the options on the shortcut menu to edit or delete it You can click Discard to revert the changes made to the rule table provided that you have not saved them by clicking Apply 8 3 1 Excluding Paths from Scanning To exclude paths from scanning click the amp Add button You will be guided through the process of excluding paths from scanning by the configuration wizard that will appear Antivirus 74 Step 1 3 Select Object Type BitDefender Exclusions Wizard BitDefender Wizard Please choose the type of object not to be scanned 9 Choose a path not to be scanned Choose an extension not to be scanned o Choose the type of object not to he scanned Object Type Select the option of excluding a path from scanning Click Next Step 2 3 Specify Excluded Paths BitDefender Exclusions Wizard BitDefender Wizard Please choose the paths that are not to be scanned CIE Selected paths c documents and setting
42. OFTWARE You may install and use BitDefender on as many computers as necessary with the limitation imposed by the total number of licensed users You may make one additional copy for back up purpose DESKTOP USER LICENSE This license applies to BitDefender software that can be installed on a single computer and which does not provide network services Each primary user may install this software on a single computer and may make one additional copy for backup on a different device The number of primary users allowed is the number of the users of the license TERM OF LICENSE The license granted hereunder shall commence on the purchasing date of BitDefender and shall expire at the end of the period for which the license is purchased License and Warranty vii EXPIRATION The product will cease to perform its functions immediately upon expiration of the license UPGRADES If BitDefender is labeled as an upgrade you must be properly licensed to use a product identified by BITDEFENDER as being eligible for the upgrade in order to use BitDefender A BitDefender labeled as an upgrade replaces and or supplements the product that formed the basis for your eligibility for the upgrade You may use the resulting upgraded product only in accordance with the terms of this License Agreement If BitDefender is an upgrade of a component of a package of software programs that you licensed as a single product BitDefender may be used and transferred only as
43. ONTINUE YES OR BY INSTALLING OR USING THE SOFTWARE IN ANY WAY YOU ARE INDICATING YOUR COMPLETE UNDERSTANDING AND ACCEPTANCE OF THE TERMS OF THIS AGREEMENT These Terms cover BitDefender Solutions and Services for for home users licensed to you including related documentation and any update and upgrade of the applications delivered to you under the purchased license or any related service agreement as defined in the documentation and any copy of these items This License Agreement is a legal agreement between you either an individual or a legal person and BITDEFENDER for use of BITDEFENDER s software product identified above which includes computer software and services and may include associated media printed materials and online or electronic documentation hereafter designated as BitDefender all of which are protected by international copyright laws and international treaties By installing copying or using BitDefender you agree to be bound by the terms of this agreement If you do not agree to the terms of this agreement do not install or use BitDefender BitDefender License BitDefender is protected by copyright laws and international copyright treaties as well as other intellectual property laws and treaties BitDefender is licensed not sold GRANT OF LICENSE BITDEFENDER hereby grants you and only you the following non exclusive limited non transferable and royalty bearing license to use BitDefender APPLICATION S
44. able Scanning enables antiphishing scanning Ask before adding to whitelist prompts you before adding a web site to the White List Add to White List adds the current web site to the White List Note Adding a site to the White List means that BitDefender will not scan the site for phishing attempts anymore We recommend you to add to the White List only sites that you fully trust View White List opens the White List You can see the list of all the web sites that are not checked by the BitDefender antiphishing engines If you want to remove a site from the White List so that you can be notified about any existing phishing threat on that page click the Remove button next to it You can add the sites that you fully trust to the White List so that they will not be scanned by the antiphishing engines anymore To add a site to the White List provide its address in the corresponding field and click Add Help opens the help file About opens a window where you can see information about BitDefender and where to look for help in case something unexpected appears Privacy Control 103 10 Update New malware is found and identified every day This is why it is very important to keep BitDefender up to date with the latest malware signatures If you are connected to the Internet through broadband or DSL BitDefender takes care of this itself By default it checks for updates when you turn on your computer and every ho
45. ble m Type the extension that you want to be excluded from scanning in the edit field and click Add The extensions will appear in the table as you add them You can add as many extensions as you want To remove an entry from the table select it and click the amp Delete button Click Next Antivirus 78 Step 3 3 Select Scanning Type 8 4 BitDefender Exclusions Wizard BitDefender Wizard Choose when to apply the selected exceptions click on the right column Selected objects When to apply avi Audio Video Interleaved animation file On demand git Graphics Interchange Format bitmap graphics Both mpeg Both O Choose when to apply the selected exceptions Scanning Type You can see a table containing the extensions to be excluded from scanning and the type of scanning they are excluded from By default the selected extensions are excluded from both on access and on demand scanning To change when to apply the exception click on the right column and select the desired option from the list Click Finish Click Apply to save the changes Quarantine Area BitDefender allows isolating the infected or suspicious files in a secure area named quarantine By isolating these files in the quarantine the risk of getting infected disappears and at the same time you have the possibility to send these files for further analysis to the BitDefender lab To see and manage
46. curity Center to check the system security status take preventive measures or fully configure the product at any time To access the BitDefender Security Center use the Windows Start menu by following the path Start Programs BitDefender 2008 BitDefender Antivirus 2008 or quicker double click the BitDefender icon in the system tray BitDefender Security Center BitDefender Antivirus 2008 Trial Expires in 30 days Buy My Account Register Help Support Status P F J E w 4 One issue affects the security of your system gt Protected Protected Requires Protected Quick Tasks Security P Update How Deep System Scan Scan My Documents Full System Scan N Settings History BitDefender Security Center The BitDefender Security Center contains two areas m The Status area contains information about and helps you fix the security vulnerabilities of your computer You can easily see how many issues might affect your computer By clicking the corresponding red Fix All Issues button your computer s vulnerabilities will be solved on the spot or you will be guided to easily fix them At the same time four status buttons corresponding to four security categories are available Green status buttons indicate that there is no risk Yellow Getting Started 15 2 1 or Red buttons indicate medium or high security risks To fix them click the yellow red button and then the Fix buttons
47. curity systems Virus definition The binary pattern of a virus used by the antivirus program to detect and eliminate the virus Worm Glossary A program that propagates itself over a network reproducing itself as it goes It cannot attach itself to other programs 135
48. d you will be prompted before installing it Note You will be prompted before updates are installed even if you exit the Security Center 10 2 3 Configuring Manual Update To specify how the manual update update by user request should be performed select one of the following options in the Manual Update Settings category m Silent update the manual update will be performed automatically in the background without user intervention m Prompt before downloading updates every time an update is available you will be prompted before downloading it Note You will be prompted before updates are downloaded even if you exit the Security Center 10 2 4 Configuring Advanced Settings To prevent the BitDefender update process from interfering with your work configure the options in the Advanced Settings category m Wait for reboot instead of prompting If an update requires a reboot the product will keep working with the old files until the system is rebooting The user will not be prompted for rebooting therefore the BitDefender update process will not interfere with the user s work m Don t update if scan is in progress BitDefender will not update if a scan process is running This way the BitDefender update process will not interfere with the scan tasks Note 65 If BitDefender is updated while a scan is in progress the scan process will be aborted Update 109 m Don t update if game mode is on BitDefender will no
49. dden objects and other Note The scanning process may take a while depending on the complexity of the scan To temporarily stop the scanning process just click Pause You will have to click Resume to resume scanning You can stop scanning anytime you want by clicking Stop amp Yes You will go directly to the last step of the wizard Wait for BitDefender to finish scanning Quick Tasks 28 Step 2 3 Select Actions When the scanning is completed a new window will appear where you can see the scan results BitDefender Scanner Antivirus Scan Step 2 of 3 Results Summary 4 threat s that affected 1 objects require s your attention Take No Action v EICAR Test File not a virus 1 issue left Take No Action ow Number of issues solved 0 Actions You can see the number of issues affecting your system The infected objects are displayed in groups based on the malware they are infected with Click the link corresponding to a threat to find out more information about the infected objects You can choose an overall action to be taken for each group of issues or you can select separate actions for each issue The following options can appear on the menu Take No Action No action will be taken on the detected files Quick Tasks 29 Disinfect Disinfects infected files Delete Deletes detected files Unhide Makes hidden objects visible Click Continue to apply the specified actions S
50. demand scanning is based on scan tasks Scan tasks specify the scanning options and the objects to be scanned You can scan the computer whenever you want by running the default tasks or your own scan tasks user defined tasks You can also schedule them to run on a regular basis or when the system is idle so as not to interfere with your work 8 2 1 Scan Tasks BitDefender comes with several tasks created by default which cover common security issues You can also create your own customized scan tasks Each task has a Properties window that allows you to configure the task and to see the scan results For more information please refer to Configuring Scan Tasks p 53 There are three categories of scan tasks Antivirus 50 m System tasks contains the list of default system tasks The following tasks are available Default Task Description Deep System Scan Scans the entire system In the default configuration it scans for all types of malware threatening your system s security such as viruses spyware adware rootkits and others Full System Scan Scans the entire system except for archives In the default configuration it scans for all types of malware threatening your system s security such as viruses spyware adware rootkits and others Quick System Scan Scans the Windows Program Files and All Users folders In the default configuration it scans for all types of malware except for rootkits but it does
51. disable real time protection for 5 15 or 30 minutes for an hour permanently or until the system restart Warning Y This is a critical security issue We recommend you to disable real time protection for as little time as possible If real time protection is disabled you will not be protected against malware threats On demand Scanning The main objective for BitDefender is to keep your computer clean of viruses This is first and foremost done by keeping new viruses out of your computer and by scanning your e mail messages and any new files downloaded or copied to your system There is a risk that a virus is already lodged in your system before you even install BitDefender This is why it s a very good idea to scan your computer for resident viruses after you ve installed BitDefender And it s definitely a good idea to frequently scan your computer for viruses To configure and initiate on demand scanning click Antivirus gt Scan in the settings console The following window will appear Antivirus 49 BitDefender Antivirus 2008 qf Antivirus Shield se Exceptions System Tasks 9 Pu CA Privacy Control Deen System Scan CI Last run Never 2 TPA Full System Scan 7 Last run Never Quick System Scan 39 Last run 11 28 2007 5 57 18 PM User Tasks uy out c Last run Never C Desktop c Last run 11 28 2007 6 13 28 PM Misc Tasks Contextual Scan Scan Tasks On
52. e Registry Control You can see the rules created so far listed in the table To delete a rule just select it and click the amp Delete button To temporarily disable a rule without deleting it clear the corresponding check box To change the action of a rule double click the action field and select the appropriate option from the menu Click OK to close the window Advanced Settings Cookie Control Cookies are a very common occurrence on the Internet They are small files stored on your computer Websites create these cookies in order to keep track of specific information about you Cookies are generally made to make your life easier For example they can help the website remember your name and preferences so that you don t have to enter them on every visit But cookies can also be used to compromise your privacy by tracking your surfing patterns Privacy Control 94 This is where Cookie Control helps When enabled Cookie Control will ask for your permission whenever a new website tries to set a cookie BitDefender Cookie Alert You can see the name of the application that is trying to send the cookie file O po Check Remember this answer option and click Path c program files mozilla firefox A 7 ND mo Yes or No and a rule will be created applied and listed in the rules table You will no longer be EI Era EE CERES notified the next time when you connect to the en us fx
53. e e You can observe that some scan options although the sign appears cannot be opened The reason is that these options weren t selected yet You will observe that if you select them they can be opened m Scan accessed files and P2P transfers options scans the accessed files and the communications through Instant Messaging Software applications ICQ NetMeeting Yahoo Messenger MSN Messenger Further on select the type of the files you want to be scanned CE NENNEN Scan Scanallfiles All the accessed files will be scanned accessed regardless their type files Scan program files Only the program files will be scanned This only means only the files with the following extensions exe bat com dll ocx Antivirus 46 Antivirus COM scr bin dat 386 vxd sys wdm Cla class ovl ole exe hlp doc dot x1s ppt wok wiz pot ppa xla x1t vbs vbe mdb rtf htm hta html xml xtp php d8p 5 wshs chm lnk prf pre 2url smm pdf msi ini csc cmd bas eml and nws Scan user defined Only the files with the extensions specified by extensions Scan for riskware Scan boot Scan inside archives Scan packed files First action Deny access and continue Clean file Delete file Move file quarantine the user will be scanned These extensions must be separated by Scans for riskware Detected files will be treated as infected Th
54. e ek eei 107 10 2 2 Configuring Automatic Update 108 10 2 3 Configuring Manual Update 109 10 2 4 Configuring Advanced Settings 109 10 2 5 Managing Proxies dcir da A a ieee 110 BitDefender Rescue CD 112 11 Overview Gia A AR 113 11 1 System Requirements oia ad 113 11 2 Included Software 2228484888 ma nece centenis cene aa 114 12 BitDefender Rescue CD Howto 117 12 1 Start BitDefender Rescue CD ccoo de cs 117 12 2 Stop BitDefender Rescue CD 118 12 3 How do perform an antivirus scan 119 12 4 How do update BitDefender over a proxy 120 12 5 How do save my data secos sens ri nes ER RE 120 Getting H lp 123 13 Support is eee ici rr A a se 124 13 1 BitDefender Knowledge Base 124 13 2 Asking for Helps esos ct 125 13 2 1 Go to Web Self Service os iria o 125 13 2 2 Open SUpport cket accident 125 13 9 Gontact MOMMAOM s catia eor DOO o obs 126 13 31 Web AQUEL 126 13 39 22 Branch OffiCes oc RE Lem non EHE OR POS db MEE 126 A GrP 129 vi License and Warranty IF YOU DO NOT AGREE TO THESE TERMS AND CONDITIONS DO NOT INSTALL THE SOFTWARE BY SELECTING ACCEPT OK C
55. e location By default these locations are the same http upgrade bitdefender com To modify one of the update locations provide the URL of the local mirror in the URL field corresponding to the location you want to change Note We recommend you to set as primary update location the local mirror and to leave the alternate update location unchanged as a fail safe plan in case the local mirror becomes unavailable In case the company uses a proxy server to connect to the Internet check Use proxy and then click Manage proxies to configure the proxy settings Note For more information please refer to Managing Proxies p 110 10 2 2 Configuring Automatic Update To configure the update process performed automatically by BitDefender use the options in the Automatic Update Settings category You can specify the number of hours between two consecutive checks for updates in the Time interval field By default the update time interval is set to 1 hour To specify how the automatic update process should be performed select one of the following options m Silent update BitDefender automatically downloads and implements the update m Prompt before downloading updates every time an update is available you will be prompted before downloading it Note You will be prompted before updates are downloaded even if you exit the Security Center 108 m Prompt before installing updates every time an update was downloade
56. e software that includes adware components might stop working if this option is enabled Select Skip dialers and applications from scan if you want to exclude these kind of files from scanning Scans the system s boot sector The accessed archives will be scanned With this option on the computer will slow down All packed files will be scanned Select from the drop down menu the first action to take on infected and suspicious files In case an infected file is detected the access to this will be denied Disinfects infected files Deletes infected files immediately without any warning to Moves infected files into the quarantine 47 COM Second action Deny access and continue Delete file Move file to quarantine Do not scan files greater than x Kb Do not scan network shares The following options are available Select from the drop down menu the second action to take on infected files in case the first action fails In case an infected file is detected the access to this will be denied Deletes infected files immediately without any warning Moves infected files into the quarantine Type in the maximum size of the files to be scanned If the size is O Kb all files will be scanned regardless their size If this option is enabled BitDefender will not scan the network shares allowing for a faster network access We recommend you to enable this option only if the network yo
57. en the boot process has finished you will see the next desktop You may now start using BitDefender Rescue CD BitDefender Rescue CD Howto 117 The Desktop 12 2 Stop BitDefender Rescue CD You can safely shut down your computer by selecting Exit from the BitDefender Rescue CD contextual menu right click to open Bitbefender 1 it or by issuing the halt command in a terminal EEA d and Recover Security Net adain il Choose EXIT When BitDefender Rescue CD has successfully closed all programs it will show a screen like the following image You may remove the CD in order to boot from your hard drive Now it s ok to turn off your computer or to reboot it BitDefender Rescue CD Howto 118 BitDefender Antivirus 2008 INIT Sending processes the KILL signal init aufsd aufsd aufsd aufsd 1d Chald addon acpi hald addon keyb tirgd logsave inetd i kpsmoused ksuspe init f aufsd aufsd knoppix halt even kthread atas rootfs umounted KNOPPIX halted Wait for this message when shutting down 12 3 How do perform an antivirus scan A wizard will appear when the boot process has finished and allow you to full scan your computer All you have to dois click the Start button Note e If your screen resolution isn t high enough you will be asked to start scanning in text mode Follow the three step guided procedure to complete the scanning process 1 You ca
58. er it is recommended that you protect your BitDefender settings with a password If you select this option the following window will appear Set Password Protection EY Type the password in the Password field re type it in the Retype password field and Password click OK TE Once you have set the password you will The password shouldbe at least 8 characters long be asked for it whenever you want to change the BitDefender settings The other system administrators if any will also have to provide this password in order to change the BitDefender settings Enter password Important If you forgot the password you will have to repair the product in order to modify the BitDefender configuration m Show BitDefender News security related notifications shows from time to time security notifications regarding virus outbreaks sent by the BitDefender server m Show pop ups on screen notes shows pop up windows regarding the product status m Load BitDefender at Windows startup automatically launches BitDefender at system startup We recommend you to keep this option selected m Enable the Scan Activity bar on screen graph of product activity displays the Scan Activity bar whenever you log on to Windows Clear this check box if you do not want the Scan Activity bar to be displayed anymore Note This option can be configured only for the current Windows user account m Enable Hotkey for Game Mode a
59. es are described as small files containing information about individual computers that can be analyzed and used by advertisers to track your online interests and tastes In this realm cookie technology is still being developed and the intention is to target ads directly to what you ve said your interests are It s a double edge sword for many people because on one hand it s efficient and pertinent as you only see ads about what you re interested in On the other hand it involves actually tracking and following where you go and what you click Understandably so there is a debate over privacy and many people feel offended by the notion that they are viewed as a SKU number you know the bar code on the back of packages that gets scanned at the grocery check out line While this viewpoint may be extreme in some cases it is accurate Disk drive It s a machine that reads data from and writes data onto a disk A hard disk drive reads and writes hard disks A floppy drive accesses floppy disks Disk drives can be either internal housed within a computer or external housed in a separate box that connects to the computer Download Glossary To copy data usually an entire file from a main source to a peripheral device The term is often used to describe the process of copying a file from an online service to one s own computer Downloading can also refer to copying a file from a network file server to a computer on the network 130
60. ese steps 1 Click the update status button 2 Click either the Fix buttons to fix them one by one or the Fix All Now button to fix them all at once 3 If one issue is not fixed on the spot follow the wizard to fix it Security Status 24 4 Quick Tasks Under the four status buttons there is the Quick Tasks area 4 1 Security BitDefender comes with a Security module that helps you keep your BitDefender up to date and your computer virus free To enter the Security module click the Security tab The following buttons are available m Update Now starts an immediate update m Scan My Documents starts a quick scan of your documents and settings m Deep System Scan starts a full scan of your computer archives included m Full System Scan starts a full scan of your computer archives excluded 4 1 1 Updating BitDefender New malware is found and identified every day This is why it is very important to keep BitDefender up to date with the latest malware signatures By default BitDefender checks for updates when you turn on your computer and every hour after that However if you want to update BitDefender just click Update Now The update process will be initiated and the following window will appear immediately Quick Tasks 25 BitDefender Antivirus 2008 Update Status Checking for updates File z Updating BitDefender In this window you can see the status of the update p
61. ess the settings console click the Settings link located at the bottom of the Security Center BitDefender Antivirus 2008 IA Shield Scan Exceptions Quarantine Y Real time protection is enabled Protection Level Last system scan never Scan Now 1 Aggressive Default Permissive Statistics Last scanned file Traffic 0 mp 1205 DEFAULT Standard security low use of resources Scan all files includes network scan Scan incoming and outgoing e mail messages Scan for viruses and spyware Do not scan Web HTTP traffic Actions on infected files Disinfect Move Scan using B HAVE heuristic analysis Custom Level Default Level M E More statistics D tbd_11 magestscreenshots avlantispyware system png Settings Console The settings console is organized into modules Antivirus Privacy Control and Update This allows you to easily manage BitDefender based on the type of security issue addressed On the left side of the settings console you can see the module selector m Antivirus in this section you can configure the Antivirus module m Privacy Control in this section you can configure the Privacy Control module m Update in this section you can configure the Update module Settings Console 39 At the bottom of the settings console there is a More Help button that opens a contextual help page Click this button to find out more informati
62. feeds mozilla com Do you want to allow this same site program to send the cookie 4 Remember this answer e e Cookie Alert This will help you to choose which websites you trust and which you don t Note e Because of the great number of cookies used on the Internet today Cookie Control can be quite bothersome to begin with At first it will ask a lot of questions about sites trying to place cookies on your computer As soon as you add your regular sites to the rule list surfing will become as easy as before Every rule that has been remembered can be accessed in the Cookie section for further fine tuning To access this section open the Advanced Privacy Control Settings window and click the Cookie tab Note To open the Advanced Privacy Control Settings window click Privacy Control gt Status in the settings console and click E Advanced Settings Privacy Control 95 Advanced Identity Control Settings Identity Registry Cookie 7 Enable cookies control Total attempts blocked O Direction Domain Outgoing Any Cookie Control You can see the rules created so far listed in the table Important The rules are listed in order of their priority starting from the top meaning the first rule has the highest priority Drag amp drop rules in order to change their priority To delete a rule just select it and click the Delete but
63. ffective in blocking Trojan horses and other tools installed by hackers who try to compromise your privacy and send your personal information like credit card numbers from your computer to the hacker BitDefender also scans the web sites you visit and alerts you if any phishing threat is detected The Privacy Control section of this user guide contains the following topics m Privacy Control Status m Advanced Settings Identity Control m Advanced Settings Registry Control m Advanced Settings Cookie Control m Advanced Settings Script Control m System Information m Antiphishing Toolbar 9 1 Privacy Control Status To configure the Privacy Control and to view information regarding its activity click Privacy Control gt Status in the settings console The following window will appear Privacy Control 83 BitDefender Antivirus 2008 Antivirus s System Info V Privacy Control is enabled Tw aaa very Control Identity Control is not configured E advanced Settings f Protection Level Update d Aggressive AGGRESSIVE E Identity control is enabled Registry control is enabled Default Cookie control is enabled d Script control is enabled Permissive Custom Level Default Level Identity Control Statistics Private information blocked 0 Registry blocked Cookies blocked Scripts blocked 7 web Antiphishing is enabled pem Den Privacy Control Statu
64. formation please refer to Add to Winamp s Bookmark list Enqueue in Winamp BitDefender Scanner p 66 Play in Winamp GEtDefender Antivirus 2008 You can modify the scan options and see the report Send To files by accessing the Properties window of the Cut Contextual Menu Scan task Copy Create Shortcut Delete Rename Properties Contextual Scan Drag amp Drop Scanning Drag the file or folder you want to be scanned and drop it over the Scan Activity Bar as shown below Drop File The BitDefender Scanner will appear and the scanning will be initiated For more information please refer to BitDefender Scanner p 66 Antivirus 65 Manual Scanning Manual scanning consists in directly selecting the object to be scanned using the BitDefender Manual Scan option from the BitDefender program group in the Start Menu Note Manual scanning is very useful as it can be performed when Windows works in Safe Mode too To select the object to be scanned by BitDefender in the Windows Start menu follow the path Start Programs BitDefender 2008 BitDefender Manual Scan The following window will appear Browse for Folder E Choose the object that you want to be scanned and Please select the scan target click OK m The BitDefender Scanner will appear and the loppy A Ss Local Disk C scanning will be initiated For more information s Local Disk D 3 amp p de co Local ik E
65. g commands are available on the shortcut menu m Scan Now runs the selected task initiating an immediate scan m Change Scan Target opens the Properties window Scan Path tab where you can change the scan target of the selected task Note 63 In the case of system tasks this System Tasks Deep System Scan C Last run Never Full System Scan CI Last run Never Quick Systern Scan User Tasks Last run 11 23 2007 2 58 15 PM C My Documents Last run Never C Desktop Last run 11 23 2007 3 09 Misc Tasks Contextual Scan Scan Now Change Scan Target Schedule Task View Scan Logs Duplicate Delete Properties 668 Shortcut Menu option is replaced by Show Task Paths as you can only see their scan target m Schedule Task opens the Properties window Scheduler tab where you can schedule the selected task m View Scan Logs opens the Properties window Scan Logs tab where you can see the reports generated after the selected task was run m Duplicate duplicates the selected task Note This is useful when creating new tasks as you can modify the settings of the task duplicate m Delete deletes the selected task Antivirus 52 Note Not available for system tasks You cannot remove a system task m Properties opens the Properties window Overview tab where you can change the settings of the selected task Note Due to the particular nature of
66. he Antivirus section of this user guide contains the following topics m On access Scanning m On demand Scanning m Objects Excluded from Scanning m Quarantine On access Scanning On access scanning also known as real time protection keeps your computer safe from all kinds of malware threats by scanning all accessed files e mail messages and the communications through Instant Messaging Software applications ICQ NetMeeting Yahoo Messenger MSN Messenger To configure and monitor real time protection click Antivirus gt Shield in the settings console The following window will appear Antivirus 43 BitDefender Antivirus 2008 Ay Antivirus Shield Scan Exceptions Quarantine V Real time protection is enabled Privacy Control Last system scan never Scan How Protection Level 1 Aggressive DEFAULT Standard security low use of resources i Scan all files includes network scan B Scan incoming and outgoing e mail messages Default Scan for viruses and spyware B Do not scan Web HTTP traffic E Actions on infected files Disinfect Move Permissive Scan using B HAVE heuristic analysis Custom Level L Default Level M Statistics Last scanned file B More statistics D bd_11 magesiscreenshots aviantispyware_system png Traffic uate 9 L mb 1205 Real time Protection Important e To prevent viruses from infecting your computer keep Real time protection enabled
67. he corresponding system requirements are met m Operating platform Windows 2000 SP4 XP SP2 32b amp 64b Vista 32b amp 64b Internet Explorer 6 0 or higher Windows 2000 m 800 MHz processor or higher m Minimum 256 MB of RAM Memory 512 MB recommended m Minimum 60 MB available hard disk space Windows XP m 800 MHz processor or higher m Minimum 256 MB of RAM Memory 1 GB recommended m Minimum 60 MB available hard disk space Windows Vista m 800 MHz processor or higher m Minimum 512 MB of RAM Memory 1 GB recommended m Minimum 60 MB available hard disk space BitDefender Antivirus 2008 Installation 2 BitDefender Antivirus 2008 can be downloaded for evaluation from the BitDefender website http www bitdefender com 1 2 Installation Steps Locate the setup file and double click it This will launch a wizard which will guide you through the setup process Before launching the setup wizard BitDefender will check for newer versions of the installation package If a newer version is available you will be prompted to download it Click Yes to download the newer version or No to continue installing the version then available in the setup file 18 BitDefender Antivirus 2008 Setup Welcome to Ej m iS BitDefender Antivirus 2008 Setuj Antivirus 20 a 13 BitDefender Antivirus 2008 License Agreement BitDefender Antivirus 20 which includes rs ide Corr BtDefender secures al the postie y pots n yo Privac
68. idential m E mail type in your e mail address m Password type in a password for your BitDefender account BitDefender Antivirus 2008 Installation 6 Note The password must be at least four characters long m Re type password type in again the previously specified password m First name type in your first name m Last name type in your last name m Country select the country you reside in Note Use the provided e mail address and password to log in to your account at http myaccount bitdefender com To successfully create an account you must first activate your e mail address Check your e mail address and follow the instructions in the e mail sent to you by the BitDefender registration service Click Next to continue l already have a BitDefender account BitDefender Antivirus 2008 Installation BitDefender will automatically detect if you have previously registered a BitDefender account on your computer In this case all you have to do is to click Next If you already have an active account but BitDefender does not detect it select Sign in to an existing BitDefender Account and provide the e mail address and the password of your account e Note If you provide an incorrect password you will be prompted to re type it when you click Next Click Ok to enter the password again or Cancel to exit the wizard If you have forgotten your password click Forgot your password and follow the instructions Clic
69. identify Port An interface on a computer to which you can connect a device Personal computers have various types of ports Internally there are several ports for connecting disk drives display screens and keyboards Externally personal computers have ports for connecting modems printers mice and other peripheral devices In TCP IP and UDP networks an endpoint to a logical connection The port number identifies what type of port itis For example port 80 is used for HTTP traffic Report file A file that lists actions that have occurred BitDefender maintains a report file listing the path scanned the folders the number of archives and files scanned how many infected and suspicious files were found Rootkit A rootkit is a set of software tools which offer administrator level access to a system The term was first used for the UNIX operating systems and it referred to recompiled tools which provided intruders administrative rights allowing them to conceal their presence so as not to be seen by the system administrators The main role of rootkits is to hide processes files logins and logs They may also intercept data from terminals network connections or peripherals if they incorporate the appropriate software Rootkits are not malicious in nature For example systems and even some applications hide critical files using rootkits However they are mostly used to hide malware or to conceal the presence of an intruder into the
70. ing without limitation direct or indirect damages arising out of the use performance or delivery of BitDefender even if BITDEFENDER has been advised of the existence or possibility of such damages SOME STATES DO NOT ALLOW THE LIMITATION OR EXCLUSION OF LIABILITY FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES SO THE ABOVE LIMITATION OR EXCLUSION MAY NOT APPLY TO YOU IN NO CASE SHALL BITDEFENDER S LIABILITY EXCEED THE PURCHASE PRICE PAID BY YOU FOR BITDEFENDER The disclaimers and limitations set forth above will apply regardless of whether you accept to use evaluate or test BitDefender IMPORTANT NOTICE TO USERS THIS SOFTWARE IS NOT FAULT TOLERANT AND IS NOT DESIGNED OR INTENDED FOR USE IN ANY HAZARDOUS ENVIRONMENT REQUIRING FAIL SAFE PERFORMANCE OR OPERATION THIS SOFTWARE IS NOT FOR USE IN THE OPERATION OF AIRCRAFT NAVIGATION NUCLEAR FACILITIES OR COMMUNICATION SYSTEMS WEAPONS SYSTEMS DIRECT OR INDIRECT LIFE SUPPORT SYSTEMS AIR TRAFFIC CONTROL OR ANY APPLICATION OR INSTALLATION WHERE FAILURE COULD RESULT IN DEATH SEVERE PHYSICAL INJURY OR PROPERTY DAMAGE GENERAL This Agreement will be governed by the laws of Romania and by international copyright regulations and treaties The exclusive jurisdiction and venue to adjudicate any dispute arising out of these License Terms shall be of the courts of Romania Prices costs and fees for use of BitDefender are subject to change without prior notice to you In the event of invalidity of any
71. ings section you will be asked to confirm the update or the update will be made automatically Important O It may be necessary to restart the computer when you have completed the update We recommend doing it as soon as possible Note e If you are connected to the Internet through a dial up connection then it is recommended to regularly update BitDefender by user request 10 1 2 Disabling Automatic Update If you want to disable automatic update a warning window will appear Disable protection o This option will disable Automatic Update protection Disable Automatic Update for the next Disable Automatic Update You must confirm your choice by selecting from the menu how long you want the automatic update to be disabled You can disable the automatic update for 5 15 or 30 minutes for an hour permanently or until the system restart Warning This is a critical security issue We recommend you to disable automatic update for as little time as possible If BitDefender is not updated regularly it will not be able to protect you against the latest threats Update 106 10 2 Update Settings The updates can be performed from the local network over the Internet directly or through a proxy server By default BitDefender will check for updates every hour over the Internet and install the available updates without alerting you To configure the update settings and manage proxies click Update gt Settings in the
72. ishing threats A White List of web sites that will not be scanned by BitDefender can be configured You can easily and efficiently manage antiphishing protection and the White List using the BitDefender Antiphishing toolbar integrated into Internet Explorer The antiphishing toolbar represented by the BitDefender icon is located on the topside of Internet Explorer Click it in order to open the toolbar menu Note e If you cannot see the toolbar open the View menu point to Toolbars and check BitDefender Toolbar Antivirus software BitDefender The future of security now Windows Internet Explorer GO Env btdefender com zex EJE File Edit View Favorites Tools Help O ws Disable Settings L software BitDefender The future of secur fuc E de e Page G Tools Add to White List My BitDefender Contact Us Forum W Cart View White List lefender Help All Countries Regions Search Go About Company Defense Center Downloads Solutions Support Partners Antiphishing Toolbar The following commands are available on the toolbar menu m Enable Disable enables disables the BitDefender Antiphishing toolbar Note e If you choose to disable the antiphishing toolbar you will no longer be protected against phishing attempts m Settings opens a window where you can specify the antiphishing toolbar s settings Privacy Control 102 The following options are available En
73. ivacy Control 9 Run Items 9 5 Start Up Items 2 TD Update Current User Start Up 0 S All Users Start Up 1 Load Items 5 INI Items 2 Known DLLs 21 File Associations 8 1 Scripts 2 Services 2 Internet Explorer 3 3 Windows Fxnlnrer 3i m gt Object C Documents and SettingsiAll UsersiStart MenulPrograms StartuplAdobe Acrobat Speed Launcher Ink File SC_Acrobat exe Path C WINDOWS installer C76B 486 1033 0000 7760 000000000002 SC_Acrobat exe C WINDOWS nstaller 4C768 486 1033 0000 7760 000000000002 SC_Acrobat exe System Information The list contains all the items loaded when starting the system as well as the items loaded by different applications Three buttons are available m Remove deletes the selected item You must click Yes to confirm your choice Note E If you do not want to be prompted again to confirm your choice during the current session check Don t ask me again this session m Go to opens a window where the selected item is placed the Registry for example m Refresh re opens the System Info section Privacy Control 101 Note Depending on the selected item one or both of the Remove or Go to buttons may not appear 9 7 Antiphishing Toolbar BitDefender protects you against phishing attempts when you are surfing the Internet lt scans the accessed web sites and alerts you if there are any ph
74. k Drives ES r 7 Removable Drives ocal Disk E Don Drive F ANECA HA framework on Marketing Agency agency Q Sf vdanciu on hafstusers Z C Documents and Settings wdanciuWDesktop Scan Target You can see the list of local network and removable drives as well as the files or folders added previously if any All checked items will be scanned when running the task The section contains the following buttons m Add Items s opens a browsing window where you can select the file s folder s that you want to be scanned Note You can also use drag and drop to add files folders to the list m Remove Item s removes the file s folder s previously selected from the list of objects to be scanned Note Only the file s folder s that were added afterwards can be deleted but not those that were automatically seen by BitDefender Antivirus 60 Besides the buttons explained above there are also some options that allow the fast selection of the scan locations m Local Drives to scan the local drives m Network Drives to scan all network drives m Removable Drives to scan removable drives CD ROM floppy disk unit m All Entries to scan all drives no matter if they are local in the network or removable Note 63 If you want to scan your entire computer select the checkbox corresponding to All Entries C
75. k Next to continue BitDefender Antivirus 2008 Registration Wizard Step 3 of 6 Settings The Real Time Virus Reporting and the Outbreak Detection modules report the name of your country the virus names the numbers of viruses found and files scanned and the information about the running processes to BitDefender labs The report contains no identifiable personal information The worldwide Virus Map which you can see at http www bitdefender com is compiled using this data Should you wish to de activate these modules you can do so after installing by unchecking the options Send virus reports and Enable BitDefender Outbreak Detection from the section Settings Advanced RTVR Information Click Next to continue or Cancel to exit the wizard BitDefender Antivirus 2008 Installation 8 1 3 4 Step 4 6 Select the Tasks to Be Run BitDefender Antivirus 2008 Registration Wizard Step 4 of 6 Select Tasks We recommend to update BitDefender and run a system scan before you continue This will ensure that your system is protected right from the beginning V Update the BitDefender engines may require reboot Y Run a quick system scan may require reboot Y Schedule a full system scan every day at 2 AM Task Selection Set BitDefender Antivirus 2008 to perform important tasks for the security of your system The following options are available m Update the BitDefe
76. les every Y Delete duplicates Check for duplicates every Automatically submit files Submit files every minute s Quarantine Settings Using the quarantine settings you can set BitDefender to automatically perform the following actions Delete old files To automatically delete old quarantined files check the corresponding option You must specify the number of days after which the quarantined files should be deleted and frequency with which BitDefender should check for old files Note By default BitDefender will check for old files every day and delete files older than 10 days Delete duplicates To automatically delete duplicate quarantined files check the corresponding option You must specify the number of days between two consecutive checks for duplicates Note By default BitDefender will check for duplicate quarantined files every day Antivirus 81 Automatically submit files To automatically submit quarantined files check the corresponding option You must specify the frequency with which to submit files Note By default BitDefender will automatically submit quarantined files every 60 minutes Click OK to save the changes and close the window Antivirus 82 9 Privacy Control BitDefender monitors dozens of potential hotspots in your system where spyware might act and also checks any changes made to your system and software lt is e
77. lick OK to save the changes and close the window To run the task just click Scan Viewing the Scan Target of System Tasks You can not modify the scan target of the scan tasks from the System Tasks category You can only see their scan target To view the scan target of a specific system scan task right click the task and select Show Task Paths For Full System Scan for example the following window will appear Antivirus 61 Full System Scan Properties Scan Path Scheduler The following paths will be scanned by this task ss Local Disk C ss Local Disk D ss Local Disk E Scan Target of Full System Scan Full System Scan and Deep System Scan will scan all local drives while Quick System Scan will only scan the Windows and Program Files folders Click OK to close the window To run the task just click Scan Scheduling Scan Tasks With complex tasks the scanning process will take some time and it will work best if you close all other programs That is why it is best for you to schedule such tasks when you are not using your computer and it has gone into the idle mode To see the schedule of a specific task or to modify it right click the task and select Schedule Task The following window will appear Antivirus 62 New Task Properties Overview ScanPath Scheduler ScanLoos Properties Scheduled every 7 days next scan 11 23 2007 7 01 09 PM Schedule Not scheduled
78. llows using a combination of keyboard keys hotkey to enable disable Game Mode The default hotkey is A1t G To modify the hotkey do the following 1 Check the modifier keys you want to use from the following Control key Ctr1 Shift key Shift or Alternate key Alt 2 In the edit field type the letter corresponding to the regular key you want to use Settings Console 41 7 1 2 Virus Report Settings m Send virus reports sends to the BitDefender Labs reports regarding viruses identified in your computer It helps us keep track of virus outbreaks The reports will contain no confidential data such as your name IP address or others and will not be used for commercial purposes The information supplied will contain only the virus name and will be used solely to create statistic reports m Enable BitDefender Outbreak Detection sends to the BitDefender Labs reports regarding potential virus outbreaks The reports will contain no confidential data such as your name IP address or others and will not be used for commercial purposes The information supplied will contain only the potential virus and will be used solely to detect new viruses 7 1 3 Manage Settings Use the amp Save All Settings Load All Settings buttons to save load the settings you have made for BitDefender to a desired location This way you can use the same settings after you reinstall or repair your BitDefender product Important e Only u
79. mat Backdoor A hole in the security of a system deliberately left in place by designers or maintainers The motivation for such holes is not always sinister some operating systems for example come out of the box with privileged accounts intended for use by field service technicians or the vendor s maintenance programmers Boot sector A sector at the beginning of each disk that identifies the disk s architecture sector size cluster size and so on For startup disks the boot sector also contains a program that loads the operating system Boot virus A virus that infects the boot sector of a fixed or floppy disk An attempt to boot from a diskette infected with a boot sector virus will cause the virus to become Glossary 129 active in memory Every time you boot your system from that point on you will have the virus active in memory Browser Short for Web browser a software application used to locate and display Web pages The two most popular browsers are Netscape Navigator and Microsoft Internet Explorer Both of these are graphical browsers which means that they can display graphics as well as text In addition most modern browsers can present multimedia information including sound and video though they require plug ins for some formats Command line In a command line interface the user types commands in the space provided directly on the screen using command language Cookie Within the Internet industry cooki
80. modules so as to efficiently protect your computer against all kind of malware threats viruses spyware rootkits and so on BitDefender Rescue CD Description of the BitDefender Rescue CD It helps understand and use the features offered by this bootable CD Getting Help Where to look and where to ask for help if something unexpected appears Preface xii Glossary The Glossary tries to explain some technical and uncommon terms you will find in the pages of this document 3 Request for Comments We invite you to help us improve the book We have tested and verified all of the information to the best of our ability Please write to tell us about any flaws you find in this book or how you think it could be improved to help us provide you with the best documentation possible Let us know by sending an e mail to documentation bitdefender com Important Please write all of your documentation related e mails in English so that we can process them efficiently Preface xii Installation 1 BitDefender Antivirus 2008 Installation The BitDefender Antivirus 2008 Installation section of this user guide contains the following topics m System Requirements m Installation Steps m Initial Setup Wizard m Upgrade m Repairing or Removing BitDefender 1 1 System Requirements For proper functioning of the product before installation make sure that one of the following operating systems runs on your computer and that t
81. mory resources and also by eating bandwidth as it sends information back to the spyware s home base via the user s Internet connection Because spyware is using memory and system resources the applications running in the background can lead to system crashes or general system instability Startup items Any files placed in this folder will open when the computer starts For example a startup screen a sound file to be played when the computer first starts a reminder calendar or application programs can be startup items Normally an alias of a file is placed in this folder rather than the file itself System tray Introduced with Windows 95 the system tray is located in the Windows taskbar usually at the bottom next to the clock and contains miniature icons for easy access to system functions such as fax printer modem volume and more Double click or right click an icon to view and access the details and controls TCP IP Glossary Transmission Control Protocol Internet Protocol A set of networking protocols widely used on the Internet that provides communications across interconnected networks of computers with diverse hardware architectures and various operating systems TCP IP includes standards for how computers communicate and conventions for connecting networks and routing traffic 134 Trojan A destructive program that masquerades as a benign application Unlike viruses Trojan horses do not replicate themselves but
82. n see the scan status and statistics scanning speed elapsed time number of scanned infected suspicious hidden objects and other Note The scanning process may take a while depending on the complexity of the scan 2 You can see the number of issues affecting your system The issues are displayed in groups Click the box to open a group or the box to close a group You can choose an overall action to be taken for each group of issues or you can select separate actions for each issue BitDefender Rescue CD Howto 119 3 You can see the results summary If you want to scan certain directory only do as follow Browse your folders right click a file or directory and select Send to Then choose BitDefender Scanner Or you can issue the next command as root from a terminal The BitDefender Antivirus Scanner will start with the selected file or folder as default location to scan bdscan path to scan 12 4 How do update BitDefender over a proxy If there is a proxy server between your computer and the Internet some configurations were to be done in order to update the virus signatures To update BitDefender over a proxy just follow these steps Right click the Desktop The BitDefender Rescue CD contextual menu will appear Select Terminal as root Type the command cd ramdisk BitDefender scanner etc Type the command mcedit bdscan conf to edit this file by using GNU Midnight Commander
83. nder engines may require reboot during the next step an update of the BitDefender engines will be performed in order to protect your computer against the latest threats m Run a quick system scan may require reboot during the next step a quick system scan will be run so as to allow BitDefender to make sure that your files from the Windows and Program Files folders are not infected Run a full system scan every day at 2 AM runs a full system scan every day at 2 AM Important We recommend that you have these options enabled before moving on to the next step in order to ensure the security of your system BitDefender Antivirus 2008 Installation 9 If you select only the last option or no option at all you will skip the next step Click Next to continue or Cancel to exit the wizard 1 3 5 Step 5 6 Wait for the Tasks to Complete BitDefender Antivirus 2008 Registration Wizard Step 5 of 6 Update Status The product has been successfully updated File upgrepl exe 100 Total update 100 10951 Kb oo Scan Status A full system scan has been scheduled to run every day at 2 AM The Quick system scan has been started Task Status Wait for the task s to complete You can see the status of the task s selected in the previous step Click Next to continue or Cancel to exit the wizard BitDefender Antivirus 2008 Installation 1 3 6 Step 6 6 View Summary
84. ng the appropriate options from the Scan Level category The following options are available Option Description Scan for viruses Scans for known viruses Antivirus 56 Option Description BitDefender detects incomplete virus bodies too thus removing any possible threat that could affect your system s security Scan for adware Scans for adware threats Detected files will be treated as infected The software that includes adware components might stop working if this option is enabled Scan for spyware Scans for known spyware threats Detected files will be treated as infected Scan for application Scans applications exe and d11 files Scan for dialers Scans for applications dialing high cost numbers Detected files will be treated as infected The software that includes dialer components might stop working if this option is enabled Scan for rootkits Scans for hidden objects files and processes generally known as rootkits m Specify the type of objects to be scanned archives e mail messages and so on and other options This is made through the selection of certain options from Virus scanning options category The following options are available COM Scan files Scan all files All accessed files will be scanned regardless of their type Scan program files Only the program files will be scanned This only means only the files with the following extensions exe bat com dll ocx scr bin dat
85. nical support support bitdefender com Sales sales bitdefender com Phone 40 21 4085600 Fax 40 21 2330763 Product web site http www bitdefender com Support 128 Glossary ActiveX ActiveX is a model for writing programs so that other programs and the operating system can call them ActiveX technology is used with Microsoft Internet Explorer to make interactive Web pages that look and behave like computer programs rather than static pages With ActiveX users can ask or answer questions use push buttons and interact in other ways with the Web page ActiveX controls are often written using Visual Basic Active X is notable for a complete lack of security controls computer security experts discourage its use over the Internet Adware Adware is often combined with a host application that is provided at no charge as long as the user agrees to accept the adware Because adware applications are usually installed after the user has agreed to a licensing agreement that states the purpose of the application no offense is committed However pop up advertisements can become an annoyance and in some cases degrade system performance Also the information that some of these applications collect may cause privacy concerns for users who were not fully aware of the terms in the license agreement Archive A disk tape or directory that contains files that have been backed up A file that contains one or more files in a compressed for
86. not scan memory the registry or cookies Note Since the Deep System Scan and Full System Scan tasks analyze the entire system the scanning may take a while Therefore we recommend you to run these tasks on low priority or better when your system is idle m User tasks contains the user defined tasks A task called My Documents is provided Use this task to scan important current user folders My Documents Desktop and StartUp This will ensure the safety of your documents a safe workspace and clean applications running at startup m Misc tasks contains a list of miscellaneous scan tasks These scan tasks refer to alternative scanning types that cannot be run from this window You can only modify their settings or view the scan reports Three buttons are available to the right of each task m Schedule indicates that the selected task is scheduled for later Click this button to open the Properties window Scheduler tab where you can see the task schedule and modify it m E Delete removes the selected task Antivirus 51 Note Not available for system tasks You cannot remove a system task E Scan Now runs the selected task initiating an immediate scan To the left of each task you can see the Properties button that allows you to configure the task and view the scan logs 8 2 2 Using Shortcut Menu A shortcut menu is available for each task Right click the selected task to open it The followin
87. objects to be detected again by BitDefender you must add them as exceptions to the scanning process To add scan exceptions click Settings to open the settings console and then go to Antivirus Exceptions For more information please refer to Objects Excluded from Scanning BitDefender Detected Suspect Files Suspect files are files detected by the heuristic analysis as potentially infected with malware the signature of which has not been released yet If suspect files were detected during the scan you will be requested to submit them to the BitDefender Lab Click OK to send these files to the BitDefender Lab for further analysis Antivirus 70 8 2 6 Viewing Scan Logs To see the scan results after a task has run right click the task and select View Scan Logs The following window will appear Desktop Properties Overview Scan Path Scheduler Scan Logs Status Date amp Time Summary Scan Finished 11 23 2007 3 12 01 PM Some threats were not fixed duri Scan Logs Here you can see the report files generated each time the task was executed For each file you are provided with information on the status of the logged scanning process the date and time when the scanning was performed and a summary of the scanning results Two buttons are available m Delete log to delete the selected scan log m Show log to view the selected scan log The scan log will open in your default web browser N
88. on about the section you are into whenever you need additional help If you need additional help click the More Help button placed at the bottom of the window A contextual help page is displayed providing you with detailed information about the section you are into 7 1 Configuring General Settings To configure general settings for BitDefender Antivirus 2008 and to manage its settings click Advanced A new window will appear BitDefender Settings General Settings 7 Enable password protection for product settings Show BitDefender News security related notifications Show pop ups on screen notes Load BitDefender at Windows startup Enable the Scan Activity bar on screen graph of product activity Y Enable Hotkey for GameMode O en E sht E at o Virus Report Settin V Send virus reports V Enable BitDefender Outbreak Detection Manage Settings Settings last saved never Load All Settings save All Settings Es Restore Default Settings General Settings Here you can set the overall behavior of BitDefender By default BitDefender is loaded at Windows startup and then runs minimized in the taskbar 7 1 1 General Settings m Enable password protection for product settings enables setting a password in order to protect the BitDefender configuration Settings Console 40 Note E If you are not the only person with administrative rights using this comput
89. onding fields Current user proxy settings from default browser proxy settings of the current user extracted from the default browser If the proxy server requires a username and a password you must specify them in the corresponding fields Note E The supported web browsers are Internet Explorer Mozilla Firefox and Opera If you use another browser by default BitDefender will not be able to obtain the proxy settings of the current user m Your own set of proxy settings proxy settings that you can configure if you are logged in as an administrator The following settings must be specified Address type in the IP of the proxy server Port type in the port BitDefender uses to connect to the proxy server Username type in a user name recognized by the proxy Password type in the valid password of the previously specified user When trying to connect to the Internet each set of proxy settings is tried at a time until BitDefender manages to connect First the set containing your own proxy settings will be used to connect to the Internet If it does not work the proxy settings detected at installation time will be tried next Finally if those do not work either the proxy settings of the current user will be taken from the default browser and used to connect to the Internet Click OK to save the changes and close the window Click Apply to save the changes or click Default to load the default settings 111
90. ote Also to view or delete a file right click the file and select the corresponding option from the shortcut menu Antivirus 71 Click OK to save the changes and close the window To run the task just click Scan Scan Log Example The following figure represents an example of a scan log Z BitDefender Log File File Edit View Favorites Tools Help gt ix AG seach eros O A E E LJ B er 3 e C Documents and Settings vdanciu Application DatalBitdefenderlDesktoplProfiles Logsluser 000111196266513 1 02 xml Product BitDefender Antivirus 2008 Version BitDefender UlScanner v 11 Log date Log path 18 15 13 28 11 2007 C Documents and SettingsivdanciulApplication Data BitDefender Desktop Profiles _Logs user_0001 1196266513_1_02 xml Scan Paths Path0000 C Documents and Settings wdanciu Desktop Scan Options Scan for viruses Scan for adware Scan for spyware Scan for applications Scan for dialers Scan for rootkits Target selection options Scan registry keys Yes Van Conan nankino Scan Log Example The scan log contains detailed information about the logged scanning process such as scanning options the scanning target the threats found and the actions taken on these threats 8 3 Objects Excluded from Scanning There are cases when you may need to exclude certain files from scanning For example you may want to exclude an EICAR test file from on access scanning or avi
91. part of that single product package and may not be separated for use by more than the total number of licensed users The terms and conditions of this license replace and supersede any previous agreements that may have existed between you and BITDEFENDER regarding the original product or the resulting upgraded product COPYRIGHT All rights titles and interest in and to BitDefender and all copyright rights in and to BitDefender including but not limited to any images photographs logos animations video audio music text and applets incorporated into BitDefender the accompanying printed materials and any copies of BitDefender are owned by BITDEFENDER BitDefender is protected by copyright laws and international treaty provisions Therefore you must treat BitDefender like any other copyrighted material You may not copy the printed materials accompanying BitDefender You must produce and include all copyright notices in their original form for all copies created irrespective of the media or form in which BitDefender exists You may not sub license rent sell lease or share the BitDefender license You may not reverse engineer recompile disassemble create derivative works modify translate or make any attempt to discover the source code for BitDefender LIMITED WARRANTY BITDEFENDER warrants that the media on which BitDefender is distributed is free from defects for a period of thirty days from the date of delivery of BitDefender to yo
92. provision of this Agreement the invalidity shall not affect the validity of the remaining portions of this Agreement License and Warranty ix BitDefender and BitDefender logos are trademarks of BITDEFENDER All other trademarks used in the product or in associated materials are the property of their respective owners The license will terminate immediately without notice if you are in breach of any of its terms and conditions You shall not be entitled to a refund from BITDEFENDER or any resellers of BitDefender as a result of termination The terms and conditions conceming confidentiality and restrictions on use shall remain in force even after any termination BITDEFENDER may revise these Terms at any time and the revised terms shall automatically apply to the corresponding versions of the Software distributed with the revised terms If any part of these Terms is found void and unenforceable it will not affect the validity of rest of the Terms which shall remain valid and enforceable In case of controversy or inconsistency between translations of these Terms to other languages the English version issued by BITDEFENDER shall prevail Contact BITDEFENDER at 5 Fabrica de Glucoza street 72322 Sector 2 Bucharest Romania or at Tel No 40 21 2330780 or Fax 40 21 2330763 e mail address office bitdefender com License and Warranty x Preface This guide is intended to all users who have chosen BitDefender Antivirus 2008 as a
93. quarantined files and to configure the quarantine settings click Antivirus gt Quarantine in the settings console Antivirus 79 BitDefender Antivirus 2008 gg Antivirus Shield Scan Exceptions Quarantine Quarantine Folder 9 V Privacy Control e f Virus name Original File Update 7 Quarantine 8 4 1 Managing Quarantined Files As you may notice the Quarantine section contains a list of all the files that have been isolated so far Every file has enclosed its name the name of the detected virus the path to its original location and the submission date Note When the virus is in quarantine it can t do any harm because they cannot be executed or read To delete a selected file from quarantine click the amp Remove button If you want to restore a selected file to its original location click Restore You can send any selected file from the quarantine to the BitDefender Lab by clicking Send Antivirus 80 Contextual Menu A contextual menu is available allowing you to manage quarantined files easily The same options as those mentioned previously are available You can also select Refresh to refresh the Quarantine section 8 4 2 Configuring Quarantine Settings To configure the quarantine settings click Settings A new window will appear BitDefender Quarantine Quarantine Settings V Delete old files Delete files older than Check for old fi
94. r attention additional information related to the current paragraph Note 63 The note is just a short observation Although you can omit it the notes can provide valuable information such as specific feature or a link to some related topic Important This requires your attention and is not recommended to skip over it Usually it provides non critical but significant information Warning Y This is critical information you should treat with increased caution Nothing bad will happen if you follow the indications You should read and understand it because it describes something extremely risky 2 The Book Structure The book consists of several parts containing major topics Moreover a glossary is provided to clarify some technical terms Installation Step by step instructions for installing BitDefender on a workstation This is a comprehensive tutorial on installing BitDefender Antivirus 2008 Starting with the prerequisites for a successfully installation you are guided through the whole installation process Finally the removing procedure is described in case you need to uninstall BitDefender Basic Administration Description of basic administration and maintenance of BitDefender Advanced Security Administration A detailed presentation of the security capabilities provided by BitDefender The chapters explain in detail all options of the advanced settings console You are taught how to configure and use all BitDefender
95. r documents a safe workspace and clean applications running at startup Scans the entire system In the default configuration it scans for all types of malware threatening your system s security such as viruses spyware adware rootkits and others Scans the entire system except for archives In the default configuration it scans for all types of malware threatening your system s security such as viruses spyware adware rootkits and others Note E Since the Deep System Scan and Full System Scan tasks analyze the entire system the scanning may take a while Therefore we recommend you to run these tasks on low priority or better when your system is idle When you initiate an on demand scanning process whether a quick or a full scan the BitDefender Scanner will appear Follow the three step guided procedure to complete the scanning process Step 1 3 Scanning BitDefender will start scanning the selected objects Quick Tasks 27 BitDefender Scanner Antivirus Scan Step 1 of 3 Scan Status wee gt HKEY_LOCAL_MACHINE SYSTEM CURRENTCONTROLSET SERVICES EVENTLOG APPLICATIONAUTOCE WIHLOGON EXE Elapsed Time 00 00 05 Files sec 13 Scan Statistics Scanned Items 68 M Infected tems 0 Hidden Files 0 os Suspect ltems 0 Hidden Processes 0 Cancel Scanning You can see the scan status and statistics scanning speed elapsed time number of scanned infected suspicious hi
96. rocess The update process is performed on the fly meaning that the files to be updated are replaced progressively In this way the update process will not affect product operation and at the same time all vulnerabilities will be excluded If you want to close this window just click Close However this will not stop the update process Note ES If you are connected to the Internet through a dial up connection then it is recommended to regularly update BitDefender by user request Restart the computer if required In case of a major update you will be asked to restart your computer If you do not want to be prompted anymore when an update requires a reboot check Wait for reboot instead of prompting In this way the next time when an update requires a reboot the product will keep working with the old files until you reboot the system voluntarily Click Reboot to immediately reboot your system Quick Tasks 26 If you want to reboot your system later just click OK We recommend that you reboot your system as soon as possible 4 1 2 Scanning with BitDefender To scan your computer for malware run a particular scan task by clicking the corresponding button The following table presents the available scan tasks along with their description Scan My Documents Deep System Scan Full System Scan Use this task to scan important current user folders My Documents Desktop and StartUp This will ensure the safety of you
97. ry You can see the results summary The report file is automatically saved in the Logs section from the Properties window of the respective task Antivirus 69 Important If required please restart your system in order to complete the cleaning process O Click Exit to close the results window BitDefender Could Not Solve Some Issues In most cases BitDefender successfully disinfects the infected files it detects or it isolates the infection However there are issues that cannot be solved In these cases we recommend you to contact the BitDefender Support Team at www bitdefender com Our support representatives will help you solve the issues you are experiencing BitDefender Detected Password protected ltems The password protected category includes two types of items archives and installers They do not present a real threat to the security of the system unless they contain infected files and only if executed To make sure that these items are clean m f the password protected item is an archive you protected with a password extract the files it contains and scan them separately The easiest way to scan them is to right click them and select BitDefender Antivirus 2008 from the menu m f the password protected item is an installer make sure that real time protection is enabled before you execute the installer If the installer is infected BitDefender will detect and isolate the infection If you do not want these
98. s Browse for Folder te JE 3 Floppy A E See Local Disk C E s Local Disk D s Local Disk E 2 CD RW Drive F amp Sf Framework on Marketing Agency agenc S vdanciu on hafs users 2 z Control Panel Mobile Device Nokia Phone Browser v ji u Cx Ce BitDefender Manual Scan 2 4 Game Mode The new Game Mode temporarily modifies protection settings so as to minimize their impact on system performance When you turn on the Game Mode the following settings are applied m All BitDefender alerts and pop ups are disabled m The BitDefender real time protection level is set to Permissive Whenever Game Mode is on you can see the letter G over the BitDefender icon 2 4 1 Using Game Mode If you want to turn Game Mode on use one of the following methods m Right click the BitDefender icon in the system tray and select Turn on Game Mode m Press A1t G the default hotkey Important Do not forget to turn Game Mode off when you finish To do this use the same methods you did when you turned it on Getting Started 18 2 4 2 Changing Game Mode Hotkey If you want to change the hotkey follow these steps 1 Click Settings in the BitDefender Security Center to open the settings console Note You can also right click the BitDefender icon in the system tray and select Open advanced settings 2 Click Advanced 3 Under the Enable HotKey for Game Mode option set
99. s 9 1 1 Privacy Control Important e To prevent data theft and protect your privacy keep the Privacy Control enabled The Privacy Control protects your computer using 5 important protection controls m identity Control protects your confidential data by filtering all outgoing HTTP and SMTP traffic according to the rules you create in the Identity section Note At the bottom of the section you can see the Identity Control statistics m Registry Control asks for your permission whenever a program tries to modify a registry entry in order to be executed at Windows start up Privacy Control 84 m Cookie Control asks for your permission whenever a new website tries to set a cookie m Script Control asks for your permission whenever a website tries to activate a script or other active content To configure the settings for these controls click amp Advanced Settings Configuring Protection Level You can choose the protection level that better fits your security needs Drag the slider along the scale to set the appropriate protection level There are 3 protection levels Protection level Description Permissive Only Registry control is enabled Default Registry control and Identity Control are enabled Aggressive Registry control Identity Control and Script Control are enabled You can customize the protection level by clicking Custom level In the window that will appear select the protection controls you wan
100. security solution for their personal computers The information presented in this book is suitable not only for computer literates it is accessible to everyone who is able to work under Windows This book will describe for you BitDefender Antivirus 2008 the Company and the team who built it will guide you through the installation process will teach you how to configure it You will find out how to use BitDefender Antivirus 2008 how to update test and customize it You will learn how to get best from BitDefender We wish you a pleasant and useful lecture 1 Conventions Used in This Book 1 1 Typographical Conventions Several text styles are used in the book for an improved readability Their aspect and meaning are presented in the table below Appearance Description sample syntax Syntax samples are printed with monospaced characters http www bitdefender com The URL link is pointing to some external location on http or ftp servers support bitdefender com E mail addresses are inserted in the text for contact information Preface p xi This is an internal link towards some location inside the document filename File and directories are printed using monospaced font option Allthe product options are printed using strong characters The code listing is printed with monospaced sample code listin 2 E characters Xi 1 2 Admonitions The admonitions are in text notes graphically marked bringing to you
101. sers with administrative rights can save and load settings To load the default settings click C Restore Default Settings Settings Console 42 8 Antivirus 8 1 BitDefender protects your computer from all kinds of malware viruses Trojans spyware rootkits and so on Besides the classical scanning based on malware signatures BitDefender will also perform a heuristic analysis on the scanned files The aim of heuristic scanning is to identify new viruses based on certain patterns and algorithms before a virus definition is found False alarm messages can appear When such a file is detected it is classified as suspicious In these cases we recommend you to send the file to the BitDefender lab to be analyzed The protection BitDefender offers is divided into two categories m On access scanning prevents new malware threats from entering your system This is also called real time protection files are scanned as you use them on access BitDefender will for example scan a word document for known threats when you open it and an e mail message when you receive one m On demand scanning allows detecting and removing malware already residing in your system This is the classic scan initiated by the user you choose what drive folder or file BitDefender should scan and BitDefender scans it on demand The scan tasks allow you to create customized scanning routines and they can be scheduled to run on a regular basis T
102. sh Antivirus 76 Click Apply to save the changes 8 3 2 Excluding Extensions from Scanning To exclude extensions from scanning click the amp Add button You will be guided through the process of excluding extensions from scanning by the configuration wizard that will appear Step 1 3 Select Object Type BitDefender Exclusions Wizard BitDefender Wizard Please choose the type of object not to be scanned Choose a path not to be scanned 8 Choose an extension not to be scanned LE Choose the type of object not to be scanned Object Type Select the option of excluding an extension from scanning Click Next Antivirus 77 Step 2 3 Specify Excluded Extensions BitDefender Exclusions Wizard BitDefender Wizard Y Please choose the type of extension that is not to be scanned Ada mpeg Selected extensions avi Audio Video Interleaved animation file gif Graphics Interchange Format bitmap graphics o Add one or more extensions to the excluded items list Ie HE e Excluded Extensions To specify the extensions to be excluded from scanning use either of the following methods m Select from the menu the extension that you want to be excluded from scanning and then click Add Note The menu contains a list of all the extensions registered on your system When you select an extension you can see its description if availa
103. steps 1 Click the antiphising status button 2 Click either the Fix buttons to fix them one by one or the Fix All Now button to fix them all at once 3 Ifone issue is not fixed on the spot follow the wizard to fix it 3 3 Identity Control Status Button If the identity control status button is green there is nothing to worry about Otherwise if the button is red or gray there is a high security risk your computer is exposed to The table below will provide you with information about what elements are taken into account when calculating the security risk The privacy protection is set and ON Green The privacy protection is set and OFF Red The privacy protection is not set Gray To fix the issues follow these steps 1 Click the Identity Control status button 2 Click either the Fix buttons to fix them one by one or the Fix All Now button to fix them all at once 3 If one issue is not fixed on the spot follow the wizard to fix it 3 4 Update Status Button If the update status button is green there is nothing to worry about Otherwise if the button is red there is a high security risk your computer is exposed to The table below will provide you with information about what elements are taken into account when calculating the security risk Automatic update is enabled Green Automatic update is disabled Red Security Status 23 Issue Color The last update is one day old Red To fix the issues follow th
104. stvdanciutdesktopteicar testi Choose one or more paths not to be scanned Click Browse to choose a file or folder Excluded Paths To specify the paths to be excluded from scanning use either of the following methods Antivirus 75 m Click Browse select the file or folder that you want to be excluded from scanning and then click Add m Type the path that you want to be excluded from scanning in the edit field and click Add Note C3 If the provided path does not exist an error message will appear Click OK and check the path for validity The paths will appear in the table as you add them You can add as many paths as you want To remove an entry from the table select it and click the Delete button Click Next Step 3 3 Select Scanning Type BitDefender Exclusions Wizard BitDefender Wizard Choose when to apply the selected exceptions click on the right column Selected objects When to apply c documents and settingswdanciutdesktop eicar test On access o Choose when to apply the selected exceptions Scanning Type You can see a table containing the paths to be excluded from scanning and the type of scanning they are excluded from By default the selected paths are excluded from both on access and on demand scanning To change when to apply the exception click on the right column and select the desired option from the list Click Fini
105. t Many operating systems and applications contain commands that enable you to pack a file so that it takes up less memory For example suppose you have a text file containing ten consecutive space characters Normally this would require ten bytes of storage However a program that packs files would replace the space characters by a special space series character followed by the number of spaces being replaced In this case the ten spaces would require only two bytes This is just one packing technique there are many more Path The exact directions to a file on a computer These directions are usually described by means of the hierarchical filing system from the top down The route between any two points such as the communications channel between two computers Phishing The act of sending an e mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft The e mail directs the user to visit a Web site where they are asked to update personal information such as Glossary 132 passwords and credit card social security and bank account numbers that the legitimate organization already has The Web site however is bogus and set up only to steal the user s information Polymorphic virus A virus that changes its form with each file it infects Since they have no consistent binary pattern such viruses are hard to
106. t to enable and click OK Click Default Level to position the slider at the default level 9 1 2 Antiphishing Protection Phishing is a criminal activity on the Internet that uses social engineering techniques in order to trick people into giving away private information Most of the times phishing attempts come down to sending mass e mail messages which falsely claim to come from an established legitimate enterprise These spoofed messages are sent in the hope that at least a few of the receivers that match the profile of the phishing target will be persuaded to divulge private information A phishing message usually presents an issue related to your online account It tries to convince you to click a link provided within the message to access a supposedly legitimate web site in fact a forged one where private information is requested You may be asked for example to confirm account information such as username and password and to provide your bank account or social security number Sometimes Privacy Control 85 to be more convincing the message may pretend that your account has already been or is threatened to be suspended if you do not use the link provided Phishing also makes use of spyware such as Trojan keyloggers to steal account information directly from your computer The main phishing targets are customers of online payment services such as eBay and PayPal as well as banks that offer online services Recently
107. t update if the game mode is turned on In this way you can minimize the product s influence on system performance during games 10 2 5 Managing Proxies If your company uses a proxy server to connect to the Internet you must specify the proxy settings in order for BitDefender to update itself Otherwise it will use the proxy settings of the administrator that installed the product or of the current user s default browser if any Note The proxy settings can be configured only by users with administrative rights on the computer or by power users users who know the password to the product settings To manage the proxy settings click Manage proxies The Proxy Manager window will appear Proxy Manager Proxy Settings Administrator proxy settings detected at install time Current user proxy settings from default browser Specify your own proxy settings Address 192 168 0 1 Username Password Username Password john doe Proxy Manager There are three sets of proxy settings Update 110 Update m Administrator proxy settings detected at install time proxy settings detected on the administrator s account during installation and which can be configured only if you are logged on to that account If the proxy server requires a username and a password you must specify them in the corresp
108. tDefender support and development teams along with more general articles about virus prevention the management of BitDefender solutions with detailed explanations and many other articles The BitDefender Knowledge Base is open to the public and freely searchable The extensive information it contains is yet another means of providing BitDefender customers with the technical knowledge and insight they need All valid requests for information or bug reports coming from BitDefender clients eventually find their way into the BitDefender Knowledge Base as bugfix reports workaround cheatsheets or informational articles to supplement product helpfiles The BitDefender Knowledge Base is available any time at http kb bitdefender com Support 124 13 2 Asking for Help 13 2 1 Go to Web Self Service Got a question Our security experts are available to help you 24 7 via phone email or chat at no additional cost Please follow the links below English http www bitdefender com site KnowledgeBase browseProducts 2194 German http www bitdefender com de KnowledgeBase browseProducts 2194 French http www bitdefender com fr KnowledgeBase browseProducts 2194 Romanian http www bitdefender com ro KnowledgeBase browseProducts 2194 Spanish http www bitdefender com es KnowledgeBase browseProducts 2194 13 2 2 Open a support ticket If you want to open a support ticket and receive help via email just follow one of these
109. tc BitDefender History BitDefender History amp Events module D Antivirus Update events Description Action taken Date and time Downloaded Files Update files 11 28 2007 5 56 59 e y M Privacy Control y gt gt d Update Success Engine amp Signatures 11 28 2007 5 56 59 e Update Events In order to help you filter the BitDefender history amp events the following categories are provided on the left side m Antivirus m Privacy Control m Update A list of events is available for each category Each event comes with the following information a short description the action BitDefender took on it when it happened History 32 History and the date and time when it occurred If you want to find out more information about a particular event in the list double click that event Click Clear Log if you want to remove old logs or Refresh to make sure the latest logs are displayed 33 6 Registration BitDefender Antivirus 2008 comes with 30 day trial period If you want to register BitDefender Antivirus 2008 to change the license key or to create a BitDefender account click the Register link located at the top of the BitDefender Security Center window The registration wizard will appear 6 1 Step 1 3 Register BitDefender Antivirus 2008 BitDefender Antivirus 2008 Registration Wizard Step 1 of 3 Registration This is atrial version of BitDefender Antivirus
110. tep 3 3 View Results When BitDefender finishes fixing the issues the scan results will appear in a new window BitDefender Scanner Antivirus Scan Step 3 of 3 Results Summary Number of Resolved Items 0 Number of Unresolved Items 1 Number of Ignored Items 0 Number of Failed Items 4 1 file could not be cleaned so your system is not virus free More details on www bitdefender com Summary You can see the results summary The report file is automatically saved in the Logs section from the Properties window of the respective task Quick Tasks 30 Important If required please restart your system in order to complete the cleaning process O Click Exit to close the results window BitDefender Could Not Solve Some Issues In most cases BitDefender successfully disinfects the infected files it detects or it isolates the infection However there are issues that cannot be solved In these cases we recommend you to contact the BitDefender Support Team at www bitdefender com Our support representatives will help you solve the issues you are experiencing BitDefender Detected Password protected Items The password protected category includes two types of items archives and installers They do not present a real threat to the security of the system unless they contain infected files and only if executed To make sure that these items are clean m f the password protected item is an archive you
111. the Misc Tasks category only the Properties and View Scan Logs options are available in this case 8 2 3 Creating Scan Tasks To create a scan task use one of the following methods m Duplicate an existing task rename it and make the necessary changes in the Properties window m Click New Task to create a new task and configure it 8 2 4 Configuring Scan Tasks Each scan task has its own Properties window where you can configure the scan options set the scan target schedule the task or see the reports To open this window click the Open button located on the right of the task or right click the task and then click Open Note For more information on viewing logs and the Logs tab please refer to Viewing Scan Logs p 71 Configuring Scan Settings To configure the scanning options of a specific scan task right click it and select Properties The following window will appear Antivirus 53 New Task Properties Overview Scan Path Scheduler Scan Logs Task Properties Task name Desktop Last run never Scheduled Not scheduled Scan Level t High MEDIUM Standard moderate resource i consumption H Scan all files Medium Scan for viruses and spyware Low I Run the task with low priority 7 Minimize scan window to Sys Tray Overview Here you can see information about the task name last run and schedule status and set the scan settings Choosing Scan
112. the desired hotkey m Choose the modifier keys you want to use by checking one the following Control key Ct x1 Shift key Shift or Alternate key Alt m In the edit field type the letter corresponding to the regular key you want to use For example if you want to use the Ctr1 A1t D hotkey you must check only Ctrl and Alt and type D Note Removing the checkmark next to Enable HotKey for Game Mode will disable the hotkey Getting Started 19 3 Security Status The security status displays a systematically organized and easily manageable list of security vulnerabilities on your computer BitDefender Antivirus 2008 will let you know whenever a problem can affect your computer s security There are four security status buttons m ANTIVIRUS m ANTIPHISING m IDENTITY CONTROL m UPDATE At the same time on the left you can see the number of issues affecting the security of your system and a red Fix All Issues button The four status buttons can be displayed in green yellow red or grey depending on the current level of protection m Green indicates a low security risk for your computer m Yellow indicates a medium security risk for your computer m Red indicates a high security risk for your computer m Grey indicates a non configured component Fixing security problems requires no effort and it can be done by a single click on the Fix All Issues button A new window will appear Security Status 20 Fix Issues
113. the mistaken blocking of messages and web pages All of the data you enter is encrypted For extra safety do not enter all ofthe data you wish to protect Click Next Privacy Control 88 Step 2 3 Select Traffic Bitdefender Privacy Control Wizard BitDefender Wizard Scan Http Scan Smtp Match whole words 7 Match case Web pages which request your info will not be displayed and the information they request will not be sent Outgoing e mails which contain your private information from being sent Select Traffic Select the type of traffic you want BitDefender to scan The following options are available m Scan HTTP scans the HTTP web traffic and blocks the outgoing data that matches the rule data m Scan SMTP scans the SMTP mail traffic and blocks the outgoing e mail messages that contain the rule data You can choose to apply the rule only if the rule data matches whole words or if the rule data and the detected string case match Click Next Privacy Control 89 Step 3 3 Describe Rule Bitdefender Privacy Control Wizard BitDefender Wizard Rule Description Credit card number for Sao Paolo bank account Enter a description for this rule The description should help you or other administrators identify whet information you blocked with more ease Describe Rule Enter a short description of the rule in the edit
114. tion If you choose to remove BitDefender a new window will appear e Important By removing BitDefender you will no longer be protected against malware threats such as viruses and spyware If you want Windows Defender to be enabled after uninstalling BitDefender select the corresponding check box This option is available only on Windows Vista Click Remove to start the removal of BitDefender Antivirus 2008 from your computer BitDefender Antivirus 2008 Installation 12 During the removal process you will be prompted to give us your feedback Please click OK to take an online survey consisting of no more than five short questions Ifyou do not want to take the survey just click Cancel Once the removal process is completed a new window will appear Click Finish Note After the removal process is over we recommend that you delete the BitDefender folder from Program Files An error occurred while removing BitDefender If an error has occurred while removing BitDefender the removal process will be aborted and a new window will appear Click Run UninstallTool to make sure that BitDefender has been completely removed The uninstall tool will remove all the files and registry keys that were not removed during the automatic removal process BitDefender Antivirus 2008 Installation 13 Basic Administration 2 Getting Started Once you have installed BitDefender your computer is protected You can open the BitDefender Se
115. tion Important e During the installation process an error message caused bytheFilespy service will appear Click OK to continue the installation BitDefender Antivirus 2008 Installation 11 m Uninstall your previous version and install the new one for all BitDefender versions First you must remove your previous version then restart the computer and install the new one as described in the Installation Steps p 3 section Important D If you upgrade from BitDefender v8 or higher we recommend you save the BitDefender A settings the Friends list and the Spammers list After the upgrade process is over you may load them 1 5 Repairing or Removing BitDefender If you want to repair or remove BitDefender Antivirus 2008 follow the path from the Windows start menu Start Programs BitDefender 2008 Repair or Remove You will be requested to confirm your choice by clicking Next A new window will appear where you can select m Repair to re install all program components installed by the previous setup If you choose to repair BitDefender a new window will appear Click Repair to start the repairing process Restart the computer when prompted and afterwards click Install to reinstall BitDefender Antivirus 2008 Once the installation process is completed a new window will appear Click Finish m Remove to remove all installed components Note We recommend that you choose Remove for a clean re installa
116. to scan only specific file extensions to search for specific malware threats or to skip archives This may greatly reduce scanning times and improve your computer s responsiveness during a scan Click Custom to set your own scan options A new window will appear Antivirus 55 BitDefender Virus and Spyware Scan Settings v Scan for viruses Y Scan for adware Y Scan for spyware Y Scan for application Y Scan tor dialers Scan for rootkits Virus scanning options Scan files Y Open packed programs Open archives Y Open email archives Y Scan boot sectors Y Scan memory v v Scan registry Scan cookies Action options Action to take when an infected file is found El Action lt Disintect files Action to take when a suspect file is found El Action Take No Action Action to take when a hidden file is found El Action Take No Action Other options Y Submit suspect files to BitDefender Lab Default Level Scan Settings The scan options are organized as an expandable menu very similar to those used for exploration in Windows Click the box with to open an option or the box with to close an option The scan options are grouped into four categories m Scan Level m Virus scanning options m Action options m Other options m Specify the type of malware you want BitDefender to scan for by selecti
117. tomatic update is enabled Last checked 11 28 2007 5 55 55 PM Last updated 11 28 2007 5 56 59 PM E update How Antivirus Signature Properties Virus Signatures 956950 Engine Version 746005 l show virus List Download Status File L Total update Automatic Update Here you can see when the last check for updates and the last update were performed as well as information about the last update performed if successful or the errors that occurred Also information about the current engine version and the number of signatures is displayed You can get the malware signatures of your BitDefender by clicking El Show Virus List A HTML file that contains all the available signatures will be created and opened in a web browser You can search through the database for a specific malware signature or click BitDefender Virus List to go to the online BitDefender signature database If you open this section during an update you can see the download status Important e To be protected against the latest threats keep the Automatic Update enabled 105 10 1 1 Requesting an Update The automatic update can be done anytime you want by clicking amp Update Now This update is also known as Update by user request The Update module will connect to the BitDefender update server and will verify if any update is available If an update was detected depending on the options set in the Manual Update Sett
118. ton To modify a parametre of a rule just double click its field and make the desired modification To temporarily deactivate a rule without deleting it clear the corresponding checkbox The rules can be input automatically through the alert window or manually click the amp Add button and choose the parameters for the rule The configuration wizard will appear 9 4 1 Configuration Wizard The configuration wizard is a 1 step procedure Privacy Control 96 Step 1 1 Select Address Action and Direction BitDefender Cookies Control Wizard Select Address Action and Direction Enter domain Any Enter domain Select action Permit Deny Select direction Outgoing Incoming Both oO Select the websites and domains that you accept or reject cookies from Cookies are used to track surfing behavior and other information Note that some sites will not function properly without cookies Select Address Action and Direction You can set the parameters m Domain address type in the domain on which the rule should apply Action select the action of the rule Action Description Permit The cookies on that domain will execute Deny The cookies on that domain will not execute m Direction select the traffic direction Type Description Outgoing The rule applies only for the cookies that are sent out back to the connected site Incoming The rule applies onl
119. u Your sole remedy for a breach of this warranty will be that BITDEFENDER at its option may replace the defective media upon receipt of the damaged media or refund the money you paid for BitDefender BITDEFENDER does not warrant that BitDefender will be uninterrupted or error free or that the errors will be corrected BITDEFENDER does not warrant that BitDefender will meet your requirements EXCEPT AS EXPRESSLY SET FORTH IN THIS AGREEMENT BITDEFENDER DISCLAIMS ALL OTHER WARRANTIES EXPRESS OR IMPLIED WITH RESPECT TO THE PRODUCTS ENHANCEMENTS MAINTENANCE OR SUPPORT RELATED THERETO OR ANY OTHER MATERIALS TANGIBLE OR INTANGIBLE OR SERVICES SUPPLIED BY HIM BITDEFENDER HEREBY EXPRESSLY DISCLAIMS License and Warranty viii ANY IMPLIED WARRANTIES AND CONDITIONS INCLUDING WITHOUT LIMITATION THE IMPLIED WARRANTIES OF MERCHANTABILITY FITNESS FOR A PARTICULAR PURPOSE TITLE NON INTERFERENCE ACCURACY OF DATA ACCURACY OF INFORMATIONAL CONTENT SYSTEM INTEGRATION AND NON INFRINGEMENT OF THIRD PARTY RIGHTS BY FILTERING DISABLING OR REMOVING SUCH THIRD PARTY S SOFTWARE SPYWARE ADWARE COOKIES EMAILS DOCUMENTS ADVERTISEMENTS OR THE LIKE WHETHER ARISING BY STATUTE LAW COURSE OF DEALING CUSTOM AND PRACTICE OR TRADE USAGE DISCLAIMER OF DAMAGES Anyone using testing or evaluating BitDefender bears all risk to the quality and performance of BitDefender In no event shall BITDEFENDER be liable for any damages of any kind includ
120. u are part of is protected by an antivirus solution m Scan e mail traffic scans the e mail traffic COM Description a Scan incoming mails Scan outgoing mails Scans all incoming e mail messages Scans all outgoing e mail messages m Scan http traffic scans the http traffic m Show warning when a virus is found opens an alert window when a virus is found in a file or in an e mail message For an infected file the alert window will contain the name of the virus the path to it the action taken by BitDefender and a link to the BitDefender site where you can find more information about it For an infected e mail the alert window will contain also information about the sender and the receiver 48 In case a suspicious file is detected you can launch a wizard from the alert window that will help you to send that file to the BitDefender Lab for further analysis You can type in your e mail address to receive information regarding this report Click OK to save the changes and close the window 8 1 3 Disabling Real time Protection 8 2 If you want to disable real time protection a warning window will appear Disable protection o This option will disable Antivirus real time protection Disable Antivirus protection for the next 5 minutes Disable Real time Protection You must confirm your choice by selecting from the menu how long you want the real time protection to be disabled You can
121. ur after that If an update was detected depending on the options set in the Automatic Update Settings section you will be asked to confirm the update or the update will be made automatically The update process is performed on the fly meaning that the files to be updated are replaced progressively In this way the update process will not affect product operation and at the same time any vulnerability will be excluded Updates come in the following ways m Updates for the antivirus engines as new threats appear the files containing virus signatures must be updated to ensure permanent up to date protection against them This update type is also known as Virus Definitions Update m Updates for the antispyware engines new spyware signatures will be added to the database This update type is also known as Antispyware Update m Product upgrades when a new product version is released new features and scan techniques are introduced to the effect of improving the product s performance This update type is also known as Product Update The Update section of this user guide contains the following topics m Automatic Update m Update Settings 10 1 Automatic Update Update To see update related information and perform automatic updates click Update gt Update in the settings console The following window will appear 104 Update BitDefender Antivirus 2008 Antivirus at 7 Privacy Control e e Update V Au
122. users of social networking websites have also been targeted by phishing in order to obtain personal identification data used for identity theft To be protected against phishing attempts when you are surfing the Internet keep Antiphishing enabled In this way BitDefender will scan each web site before you access it and it will alert you of the existence of any phishing threat A White List of web sites that will not be scanned by BitDefender can be configured In order to easily manage antiphishing protection and the White List use the BitDefender Antiphishing toolbar integrated into Internet Explorer For more information please refer to Antiphishing Toolbar p 102 9 2 Advanced Settings Identity Control Keeping confidential data safe is an important issue that bothers us all Data theft has kept pace with the development of Internet communications and it makes use of new methods of fooling people into giving away private information Identity Control helps you keep confidential data safe It scans the HTTP or SMTP traffic or both for certain strings that you have defined If a match is found the respective web page or e mail is blocked Multiuser support is provided so that no other user of the system can see the rules you have configured The privacy rules can be configured in the Identity section To access this section open the Advanced Privacy Control Settings window and click the Identity tab Note To open the Ad
123. ut deleting it clear the corresponding checkbox To edit a rule select it and click the amp Edit button or double click it A new window will appear Privacy Control 91 Edit Rule Rule Name Rule Type Rule data Y Scan http V Scan Smtp credit card number credit card Match whole words Match case Rule Description Credit card number for Sao Paolo bank account Edit Rule Here you can change the name description and parameters of the rule type data and traffic Click OK to save the changes Click OK to save the changes and close the window 9 3 Advanced Settings Registry Control A very important part of the Windows operating system is called the Registry This is where Windows keeps its settings installed programs user information and so on The Registry is also used to define which programs should be launched automatically when Windows is started Viruses often use this in order to be automatically launched when the user restarts his computer Registry Control keeps an eye on the Windows Registry this is again useful for detecting Trojan horses It will alert you whenever a program will try to modify a registry entry in order to be executed at Windows start up Privacy Control 92 BitDefender Registry Alert winampa exe LI is trying to modify Windows Registry Registry key C Program FilesWinamptwinampa exe
124. vanced Privacy Control Settings window click Privacy Control gt Status in the settings console and click Advanced Settings Privacy Control 86 Advanced Identity Control Settings Identity E resistry cookie Y Enable Identity protection Total blocked attempts O BGC Rule Name Rule Type Http Smtp vvhole words Match case Description credit card n creditc yes yes yes no Credit card number f Identity Control 9 2 1 Creating Identity Rules The rules must be input manually click the amp Add button and choose the parameters for the rule The configuration wizard will appear The configuration wizard comprises a 3 step procedure Privacy Control 87 Step 1 3 Set Rule Type and Data Bitdefender Privacy Control Wizard BitDefender Wizard Rule Name credit card number Rue Type rone Rule Data 3243 3445 2323 All data you enter is encrypted For extra safety do not enter the whole of the data you wish to protect Set Rule Type and Data Enter the name of the rule in the edit field You must set the following parameters m Rule Type choose the rule type address name credit card PIN SSN etc m Rule Data type in the rule data Note ES If you enter less than three characters you will be prompted to validate the data We recommend you to enter at least three characters in order to avoid
125. ving BitDefender 12 Basic Administration 14 2 Getting Started ooomoccoocirccinariccra rca cer ea nn teas 15 2 1 BitDefender Icon in the System Tray 16 2 2 SCAN ACUVIY Ba ci E E E Dies 17 2 9 BitDefender Manual Scams nece rone er E S E de od Era 17 24 Game ModE ii aoa a A E E E EE 18 24 1 Using Game Mode 230322 oko rr Dur E pe RERDE A RePebeR ET EEEE 18 2 4 2 Changing Game Mode Hotkey 19 3 Security Status eecesseceesee x x ru xx RE 20 Sele AntiVirus Status BUOM enneg dame pae b na eoe ge Pa oS RU RE ERE 22 3 2 Antiphising Status Button 22 3 3 Identity Control Status Button 23 3 4 Update Status BUON cocos repere pe emt mt erp E RE 23 4 QUICK TASKS iii Re EERR PER RPEEENTDMREDMME ERN C UNE KM 25 4 1 SECUN s so dite haa veudaaneeSaataanaanet haysalaagendaateayeides de 25 4 4 1 Updating BitDefender endroit oi 25 4 1 2 Scanning with BitDefender 27 D HIStOEV 2552255 nc dines ces danses courses 32 6 Registration s susscsiuussssuuscssuuscesuurccspusccsuurce uns 34 6 1 Step 1 3 Register BitDefender Antivirus 2008 34 6 2 Step 2 3 Create a BitDefender Account
126. wise if the button is yellow red or gray there is a medium or high security risk your computer is exposed to The color of the status buttons can change not only when you configure the settings that might affect your computer s security but when you forget to do important tasks For example if your last system scan is old the security status button will be yellow If it is very old it will be red The table below will provide you with information about what elements are taken into account when calculating the security risk Issue Color The last system scan is old Yellow The last system scan is very old Red The real time protection is disabled Red The antivirus protection level is set to permissive Yellow To fix the issues follow these steps 1 Click the antivirus status button 2 Click either the Fix buttons to fix them one by one or the Fix All Now button to fix them all at once 3 Ifone issue is not fixed on the spot follow the wizard to fix it 3 2 Antiphising Status Button If the antiphising status button is green there is nothing to worry about Otherwise if the button is red there is a high security risk your computer is exposed to The table below will provide you with information about what elements are taken into account when calculating the security risk The antiphising protection is enabled Green The antiphising protection is disabled Red Security Status 22 To fix the issues follow these
127. wizard can complete the installation process We recommend doing so as soon as possible If you have accepted the default settings for the installation path you can see in Program Files a new folder named BitDefender which contains the subfolder BitDefender 2008 BitDefender Antivirus 2008 Installation 4 1 3 Initial Setup Wizard During the installation process a wizard will appear The wizard helps you register your BitDefender Antivirus 2008 create a BitDefender account and set BitDefender to perform important security tasks Completing this wizard is not mandatory however we recommend you do so in order to save time and ensure your system is safe even before BitDefender Antivirus 2008 is installed 1 3 1 Step 1 6 Register BitDefender Antivirus 2008 BitDefender Antivirus 2008 Registration Wizard Step 1 of6 Registration This is a trial version of BitDefender Antivirus 2008 If you wish to evaluate the product please check Continue evaluating the product and click Next If you want to register the product please check Register the product and fill in your license key To purchase a BitDefender license please visit our online store at Click here 8 Continue evaluating this product O Register the product If you do not know where your license key is please see O Product registration card CD ROM label Online purchase e mail Registration Choose Register the
128. y access To apply the default real time protection settings click Default Level 8 1 2 Customizing Protection Level Advanced users might want to take advantage of the scan settings BitDefender offers The scanner can be set to scan only specific file extensions to search for specific malware threats or to skip archives This may greatly reduce scanning times and improve your computer s responsiveness during a scan You can customize the Real time protection by clicking Custom level The following window will appear Antivirus 45 BitDefender Real time Protection Settings Scan accessed files Scan boot Scan inside archives Scan packed files Action to take when an infected file is found El First action lt Disintect file gt El Second action lt Move file to quarantine Action to take when a suspect file is found El First action Deny access and continue gt El Second action Deny access and continue Do not scan files greater than 5000 Kb Do not scan network shares Scan e mail traffic Y Scan incoming emails Y Scan outgoing emails Scan http traffic Show warning when a virus is found Shield Settings The scan options are organized as an expandable menu very similar to those used for exploration in Windows Click the box with to open an option or the box with to close an option Not
129. y Protection ledio in Update If you already have an antivirus program installed be CickNext to continue or BeDefender Having two diferent programs PTANCE OF THE TERNS Chck Next to proceed withthe installation Cick Cancel and Service ading V 1 accept the terms in the License Agreement 1 BitDefender Antivirus 2008 Setup Choose setup location Chek Browse to choose a new location forthe instala Antivirus 2008 Based on your choice BitDefender wil end determine IF there is enough space on the designar Completing the BitDefender Antivirus 2008 Setup Wizard Location C Program Fies BtDefender EtDefendel Click Next to proceed with the installation Click Cancel O Click the Finish button to ext the Setup Wizard Installation Steps Follow these steps to install BitDefender Antivirus 2008 1 Click Next to continue or click Cancel if you want to quit installation BitDefender Antivirus 2008 Installation 3 2 Click Next BitDefender Antivirus 2008 alerts you if you have other antivirus products installed on your computer Click Remove to uninstall the corresponding product If you want to continue without removing the detected products click Next Warning Y It is highly recommended that you uninstall any other antivirus products detected before installing BitDefender Running two or more antivirus products at the same time on a computer usually renders the system unusable Please read the License
130. y for the cookies that are received from the connected site Both The rule applies in both directions Click Finish Privacy Control 97 Note You can accept cookies but never return them by setting the action to Deny and the direction to Outgoing Click OK to save the changes and close the window 9 5 Advanced Settings Script Control Scripts and other codes such as ActiveX controls and Java applets which are used to create interactive web pages can be programmed to have harmful effects ActiveX elements for example can gain total access to your data and they can read data from your computer delete information capture passwords and intercept messages while you re online You should only accept active content from sites you fully know and trust BitDefender lets you choose to run these elements or to block their execution With Script Control you will be in charge of which websites you trust and which you don t BitDefender will ask you for permission whenever a website tries to activate a script or other active content BitDefender Script Alert You can see the name of the resource Check Remember this answer option and click O Yes or No and a rule will be created applied and Path c program files mozilla firefox A Ww ce listed in the rules table You will no longer be notified when the same site tries to send you active Question content This program received active content ActiveX Java Applet Script from

Download Pdf Manuals

image

Related Search

Related Contents

Manual de instrucciones  第6回定時株主総会 招集ご通知 (PDF: 1729KB)  T24 Technical Manual  User Manual  SDCC Compiler User Guide  ST 290 ST 290  Acco SmartTouch  

Copyright © All rights reserved.
Failed to retrieve file