User Manual
Table Of Contents
- Bitdefender Antivirus Plus
- Table of Contents
- Installation
- Getting started
- How to
- 8. Installation
- 8.1. How do I install Bitdefender on a second computer?
- 8.2. How can I reinstall Bitdefender?
- 8.3. Where can I download my Bitdefender product from?
- 8.4. How can I change the language of my Bitdefender product?
- 8.5. How do I use my Bitdefender subscription after a Windows upgrade?
- 8.6. How can I upgrade to the latest Bitdefender version?
- 9. Subscriptions
- 10. Bitdefender Central
- 11. Scanning with Bitdefender
- 11.1. How do I scan a file or a folder?
- 11.2. How do I scan my system?
- 11.3. How do I schedule a scan?
- 11.4. How do I create a custom scan task?
- 11.5. How do I except a folder from being scanned?
- 11.6. What to do when Bitdefender detected a clean file as infected?
- 11.7. How do I check what threats Bitdefender detected?
- 12. Privacy protection
- 13. Useful Information
- 13.1. How do I test my security solution?
- 13.2. How do I remove Bitdefender?
- 13.3. How do I remove Bitdefender VPN?
- 13.4. How do I automatically shut down the computer after the scan is over?
- 13.5. How do I configure Bitdefender to use a proxy internet connection?
- 13.6. Am I using a 32 bit or a 64 bit version of Windows?
- 13.7. How do I display hidden objects in Windows?
- 13.8. How do I remove other security solutions?
- 13.9. How do I restart in Safe Mode?
- 8. Installation
- Managing your security
- 14. Antivirus protection
- 15. Advanced Threat Defense
- 16. Online Threat Prevention
- 17. Vulnerability
- 18. Safe Files
- 19. Ransomware Remediation
- 20. Password Manager protection for your credentials
- 21. VPN
- 22. Safepay security for online transactions
- 23. Data Protection
- 24. USB Immunizer
- System optimization
- Troubleshooting
- 26. Solving common issues
- 26.1. My system appears to be slow
- 26.2. Scan doesn't start
- 26.3. I can no longer use an app
- 26.4. What to do when Bitdefender blocks a safe website or online app
- 26.5. What to do if Bitdefender detects a safe app as ransomware
- 26.6. How to update Bitdefender on a slow internet connection
- 26.7. Bitdefender services are not responding
- 26.8. The Autofill feature in my Wallet doesn't work
- 26.9. Bitdefender removal failed
- 26.10. My system doesn't boot up after installing Bitdefender
- 27. Removing threats from your system
- 27.1. Bitdefender Rescue Mode (Rescue Environment in Windows 10)
- 27.2. What to do when Bitdefender finds threats on your computer?
- 27.3. How do I clean a threat in an archive?
- 27.4. How do I clean a threat in an email archive?
- 27.5. What to do if I suspect a file as being dangerous?
- 27.6. What are the password-protected files in the scan log?
- 27.7. What are the skipped items in the scan log?
- 27.8. What are the over-compressed files in the scan log?
- 27.9. Why did Bitdefender automatically delete an infected file?
- 26. Solving common issues
- Contact us
- Glossary

personal computers have ports for connecting modems, printers, mice,
and other peripheral devices.
In TCP/IP and UDP networks, an endpoint to a logical connection. The
port number identifies what type of port it is. For example, port 80 is
used for HTTP traffic.
Ransomware
Ransomware is a malicious program that tries to make money from
users by locking their vulnerable systems. CryptoLocker, CryptoWall,
and TeslaWall, are only some variants that hunt personal systems of
users.
The infection can be spread by accessing spam emails, downloading
email attachments, or installing apps, without letting the user know
about what is happening on his system. Daily users and companies are
targeted by ransomware hackers.
Report file
A file that lists actions that have occurred. Bitdefender maintains a report
file listing the path scanned, the folders, the number of archives and files
scanned, how many infected and suspicious files were found.
Rootkit
A rootkit is a set of software tools which offer administrator-level access
to a system. The term was first used for the UNIX operating systems
and it referred to recompiled tools which provided intruders
administrative rights, allowing them to conceal their presence so as not
to be seen by the system administrators.
The main role of rootkits is to hide processes, files, logins and logs. They
may also intercept data from terminals, network connections or
peripherals, if they incorporate the appropriate software.
Rootkits are not malicious in nature. For example, systems and even
some apps hide critical files using rootkits. However, they are mostly
used to hide threats or to conceal the presence of an intruder into the
system. When combined with threats, rootkits pose a great threat to the
integrity and the security of a system. They can monitor traffic, create
backdoors into the system, alter files and logs and avoid detection.
Glossary 168
Bitdefender Antivirus Plus










