User Manual
Table Of Contents
- Bitdefender Antivirus Plus
- Table of Contents
- Installation
- Getting started
- How to
- 8. Installation
- 8.1. How do I install Bitdefender on a second computer?
- 8.2. How can I reinstall Bitdefender?
- 8.3. Where can I download my Bitdefender product from?
- 8.4. How can I change the language of my Bitdefender product?
- 8.5. How do I use my Bitdefender subscription after a Windows upgrade?
- 8.6. How can I upgrade to the latest Bitdefender version?
- 9. Subscriptions
- 10. Bitdefender Central
- 11. Scanning with Bitdefender
- 11.1. How do I scan a file or a folder?
- 11.2. How do I scan my system?
- 11.3. How do I schedule a scan?
- 11.4. How do I create a custom scan task?
- 11.5. How do I except a folder from being scanned?
- 11.6. What to do when Bitdefender detected a clean file as infected?
- 11.7. How do I check what threats Bitdefender detected?
- 12. Privacy protection
- 13. Useful Information
- 13.1. How do I test my security solution?
- 13.2. How do I remove Bitdefender?
- 13.3. How do I remove Bitdefender VPN?
- 13.4. How do I automatically shut down the computer after the scan is over?
- 13.5. How do I configure Bitdefender to use a proxy internet connection?
- 13.6. Am I using a 32 bit or a 64 bit version of Windows?
- 13.7. How do I display hidden objects in Windows?
- 13.8. How do I remove other security solutions?
- 13.9. How do I restart in Safe Mode?
- 8. Installation
- Managing your security
- 14. Antivirus protection
- 15. Advanced Threat Defense
- 16. Online Threat Prevention
- 17. Vulnerability
- 18. Safe Files
- 19. Ransomware Remediation
- 20. Password Manager protection for your credentials
- 21. VPN
- 22. Safepay security for online transactions
- 23. Data Protection
- 24. USB Immunizer
- System optimization
- Troubleshooting
- 26. Solving common issues
- 26.1. My system appears to be slow
- 26.2. Scan doesn't start
- 26.3. I can no longer use an app
- 26.4. What to do when Bitdefender blocks a safe website or online app
- 26.5. What to do if Bitdefender detects a safe app as ransomware
- 26.6. How to update Bitdefender on a slow internet connection
- 26.7. Bitdefender services are not responding
- 26.8. The Autofill feature in my Wallet doesn't work
- 26.9. Bitdefender removal failed
- 26.10. My system doesn't boot up after installing Bitdefender
- 27. Removing threats from your system
- 27.1. Bitdefender Rescue Mode (Rescue Environment in Windows 10)
- 27.2. What to do when Bitdefender finds threats on your computer?
- 27.3. How do I clean a threat in an archive?
- 27.4. How do I clean a threat in an email archive?
- 27.5. What to do if I suspect a file as being dangerous?
- 27.6. What are the password-protected files in the scan log?
- 27.7. What are the skipped items in the scan log?
- 27.8. What are the over-compressed files in the scan log?
- 27.9. Why did Bitdefender automatically delete an infected file?
- 26. Solving common issues
- Contact us
- Glossary

Events
An action or occurrence detected by a program. Events can be user
actions, such as clicking a mouse button or pressing a key, or system
occurrences, such as running out of memory.
False positive
Occurs when a scanner identifies a file as infected when in fact it is not.
Filename extension
The portion of a filename, following the final point, which indicates the
kind of data stored in the file.
Many operating systems use filename extensions, e.g. Unix, VMS, and
MS-DOS. They are usually from one to three letters (some sad old OSes
support no more than three). Examples include "c" for C source code,
"ps" for PostScript, "txt" for arbitrary text.
Heuristic
A rule-based method of identifying new threats. This method of scanning
does not rely on specific threat information database. The advantage of
the heuristic scan is that it is not fooled by a new variant of an existing
threat. However, it might occasionally report suspicious code in normal
programs, generating the so-called "false positive".
Honeypot
A decoy computer system set to attract hackers to study the way they
act and identify the heretical methods they use to collect system
information. Companies and corporations are more interested in
implementing and using honeypots to improve their overall state of
security.
IP
Internet Protocol - A routable protocol in the TCP/IP protocol suite that
is responsible for IP addressing, routing, and the fragmentation and
reassembly of IP packets.
Java applet
A Java program which is designed to run only on a webpage. To use an
applet on a webpage, you would specify the name of the applet and the
size (length and width, in pixels) that the applet can utilize. When the
webpage is accessed, the browser downloads the applet from a server
Glossary 165
Bitdefender Antivirus Plus










