User Manual

Table Of Contents
The infected objects are displayed in groups, based on the threats they are
infected with. Click the link corresponding to a threat to find out more
information about the infected objects.
You can choose an overall action to be taken for all issues or you can select
separate actions for each group of issues. One or several of the following
options can appear on the menu:
Take proper actions
Bitdefender will take the recommended actions depending on the type
of detected file:
Infected files. Files detected as infected match a piece of threat
information found in the Bitdefender Threat Information Database.
Bitdefender will automatically attempt to remove the malicious code
from the infected file and reconstruct the original file. This operation
is referred to as disinfection.
Files that cannot be disinfected are moved to quarantine to contain
the infection. Quarantined files cannot be executed or opened;
therefore, the risk of getting infected disappears. For more information,
refer to
Managing quarantined files (p. 91).
Important
For particular types of threats, disinfection is not possible because the
detected file is entirely malicious. In such cases, the infected file is
deleted from the disk.
Suspicious files. Files are detected as suspicious by the heuristic
analysis. Suspicious files cannot be disinfected, because no
disinfection routine is available. They will be moved to quarantine to
prevent a potential infection.
By default, quarantined files are automatically sent to Bitdefender
Labs to be analyzed by the Bitdefender threat researchers. If a threat
presence is confirmed, an information update is released to allow
removing the threat.
Archives containing infected files.
Archives that contain only infected files are deleted automatically.
If an archive contains both infected and clean files, Bitdefender will
attempt to delete the infected files provided it can reconstruct the
Managing your security 85
Bitdefender Total Security