User Manual
Table Of Contents
- Bitdefender Antivirus Plus
- Table of Contents
- Installation
- Getting started
- How to
- 8. Installation
- 8.1. How do I install Bitdefender on a second computer?
- 8.2. How can I reinstall Bitdefender?
- 8.3. Where can I download my Bitdefender product from?
- 8.4. How can I change the language of my Bitdefender product?
- 8.5. How do I use my Bitdefender subscription after a Windows upgrade?
- 8.6. How can I upgrade to the latest Bitdefender version?
- 9. Subscriptions
- 10. Bitdefender Central
- 11. Scanning with Bitdefender
- 11.1. How do I scan a file or a folder?
- 11.2. How do I scan my system?
- 11.3. How do I schedule a scan?
- 11.4. How do I create a custom scan task?
- 11.5. How do I except a folder from being scanned?
- 11.6. What to do when Bitdefender detected a clean file as infected?
- 11.7. How do I check what threats Bitdefender detected?
- 12. Privacy protection
- 13. Useful Information
- 13.1. How do I test my security solution?
- 13.2. How do I remove Bitdefender?
- 13.3. How do I remove Bitdefender VPN?
- 13.4. How do I automatically shut down the computer after the scan is over?
- 13.5. How do I configure Bitdefender to use a proxy internet connection?
- 13.6. Am I using a 32 bit or a 64 bit version of Windows?
- 13.7. How do I display hidden objects in Windows?
- 13.8. How do I remove other security solutions?
- 13.9. How do I restart in Safe Mode?
- 8. Installation
- Managing your security
- 14. Antivirus protection
- 15. Advanced Threat Defense
- 16. Online Threat Prevention
- 17. Vulnerability
- 18. Safe Files
- 19. Ransomware Remediation
- 20. Password Manager protection for your credentials
- 21. VPN
- 22. Safepay security for online transactions
- 23. Data Protection
- 24. USB Immunizer
- System optimization
- Troubleshooting
- 26. Solving common issues
- 26.1. My system appears to be slow
- 26.2. Scan doesn't start
- 26.3. I can no longer use an app
- 26.4. What to do when Bitdefender blocks a safe website or online app
- 26.5. What to do if Bitdefender detects a safe app as ransomware
- 26.6. How to update Bitdefender on a slow internet connection
- 26.7. Bitdefender services are not responding
- 26.8. The Autofill feature in my Wallet doesn't work
- 26.9. Bitdefender removal failed
- 26.10. My system doesn't boot up after installing Bitdefender
- 27. Removing threats from your system
- 27.1. Bitdefender Rescue Mode (Rescue Environment in Windows 10)
- 27.2. What to do when Bitdefender finds threats on your computer?
- 27.3. How do I clean a threat in an archive?
- 27.4. How do I clean a threat in an email archive?
- 27.5. What to do if I suspect a file as being dangerous?
- 27.6. What are the password-protected files in the scan log?
- 27.7. What are the skipped items in the scan log?
- 27.8. What are the over-compressed files in the scan log?
- 27.9. Why did Bitdefender automatically delete an infected file?
- 26. Solving common issues
- Contact us
- Glossary

13.8. How do I remove other security solutions? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
13.9. How do I restart in Safe Mode? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
Managing your security ............................................ 69
14. Antivirus protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70
14.1. On-access scanning (real-time protection) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
14.1.1. Turning on or off real-time protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
14.1.2. Configuring the real-time protection advanced settings . . . . . . . . . . . . . . . 71
14.1.3. Restoring the default settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
14.2. On-demand scanning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
14.2.1. Scanning a file or folder for threats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
14.2.2. Running a Quick Scan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
14.2.3. Running a System Scan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
14.2.4. Configuring a custom scan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
14.2.5. Antivirus Scan Wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
14.2.6. Checking scan logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
14.3. Automatic scan of removable media . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
14.3.1. How does it work? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
14.3.2. Managing removable media scan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84
14.4. Scan hosts file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
14.5. Configuring scan exceptions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
14.5.1. Excepting files and folders from scanning . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
14.5.2. Excepting file extensions from scanning . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
14.5.3. Managing scan exceptions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
14.6. Managing quarantined files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
15. Advanced Threat Defense . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
15.1. Turning on or off Advanced Threat Defense . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
15.2. Checking detected malicious attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
15.3. Adding processes to exceptions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90
16. Online Threat Prevention . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
16.1. Bitdefender alerts in the browser . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
17. Vulnerability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
17.1. Scanning your system for vulnerabilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
17.2. Using automatic vulnerability monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
17.3. Wi-Fi Security Advisor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
17.3.1. Turning on or off Wi-Fi Security Advisor notifications . . . . . . . . . . . . . . . . . 98
17.3.2. Configuring Home Wi-Fi network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
17.3.3. Public Wi-Fi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
17.3.4. Checking information about Wi-Fi networks . . . . . . . . . . . . . . . . . . . . . . . . . . 99
18. Safe Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101
18.1. Turning on or off Safe Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101
18.2. Protect personal files from ransomware attacks . . . . . . . . . . . . . . . . . . . . . . . . . 102
18.3. Configuring apps access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102
18.4. Protection at boot . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
19. Ransomware Remediation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104
v
Bitdefender Antivirus Plus










