User Manual

Table Of Contents
Scan keyloggers. Select this option to scan your system for keylogger
apps. Keyloggers record what you type on your keyboard and send reports
over the internet to a malicious person (hacker). The hacker can find out
sensitive information from the stolen data, such as bank account numbers
and passwords, and use it to gain personal benefits.
Early boot scan. Select the Early boot scan option to scan your system
at startup as soon as all its critical services are loaded. The mission of
this feature is to improve threat detection at system startup and the boot
time of your system.
Actions taken on detected threats
You can configure the actions taken by the real-time protection by following
these steps:
1. Click Protection on the navigation menu on the
Bitdefender interface.
2. In the ANTIVIRUS pane, click Open.
3. In the Advanced window, scroll down on the window until you see the
Threat actions option.
4. Configure the scan settings as needed.
The following actions can be taken by the real-time protection in Bitdefender:
Take proper actions
Bitdefender will take the recommended actions depending on the type
of detected file:
Infected files. Files detected as infected match a piece of threat
information found in the Bitdefender Threat Information Database.
Bitdefender will automatically attempt to remove the malicious code
from the infected file and reconstruct the original file. This operation
is referred to as disinfection.
Files that cannot be disinfected are moved to quarantine to contain
the infection. Quarantined files cannot be executed or opened;
therefore, the risk of getting infected disappears. For more information,
refer to
Managing quarantined files (p. 91).
Important
For particular types of threats, disinfection is not possible because the
detected file is entirely malicious. In such cases, the infected file is
deleted from the disk.
Managing your security 77
Bitdefender Total Security