User's guide Copyright© 2009 BitDefender
BitDefender Internet Security 2010 BitDefender Internet Security 2010 User's guide Published 2009.07.08 Copyright© 2009 BitDefender Legal Notice All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without written permission from an authorized representative of BitDefender.
BitDefender Internet Security 2010 Each man has his price Bob And yours was pretty low
BitDefender Internet Security 2010 Table of Contents End User Software License Agreement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xi Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvi 1. Conventions Used in This Book . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvi 1.1. Typographical Conventions . . . . . . . . . . . . . . . . .
BitDefender Internet Security 2010 6.6.1. Game Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 6.6.2. Laptop Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 6.7. Automatic Device Detection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 7. Fixing Issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
BitDefender Internet Security 2010 13.1.1. Configuring Status Tracking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13.2. Quick Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13.2.1. Updating BitDefender . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13.2.2. Scanning with BitDefender . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
BitDefender Internet Security 2010 18.3. Objects Excluded from Scanning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18.3.1. Excluding Paths from Scanning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18.3.2. Excluding Extensions from Scanning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18.4. Quarantine Area . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18.4.1.
BitDefender Internet Security 2010 21.4. Cookie Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21.4.1. Configuration Window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21.5. Script Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21.5.1. Configuration Window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
BitDefender Internet Security 2010 27.1. Automatic Update . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27.1.1. Requesting an Update . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27.1.2. Disabling Automatic Update . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27.2. Update Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
BitDefender Internet Security 2010 35. Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 301 35.1. Installation Problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35.1.1. Installation Validation Errors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35.1.2. Failed Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
BitDefender Internet Security 2010 End User Software License Agreement IF YOU DO NOT AGREE TO THESE TERMS AND CONDITIONS DO NOT INSTALL THE SOFTWARE. BY SELECTING "I ACCEPT", "OK", "CONTINUE", "YES" OR BY INSTALLING OR USING THE SOFTWARE IN ANY WAY, YOU ARE INDICATING YOUR COMPLETE UNDERSTANDING AND ACCEPTANCE OF THE TERMS OF THIS AGREEMENT. PRODUCT REGISTRATION.
BitDefender Internet Security 2010 TERM OF LICENSE. The license granted hereunder shall commence on the purchasing date of BitDefender and shall expire at the end of the period for which the license is purchased. EXPIRATION. The product will cease to perform its functions immediately upon expiration of the license. UPGRADES. If BitDefender is labeled as an upgrade, you must be properly licensed to use a product identified by BITDEFENDER as being eligible for the upgrade in order to use BitDefender.
BitDefender Internet Security 2010 CONDITIONS, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE, NON INTERFERENCE, ACCURACY OF DATA, ACCURACY OF INFORMATIONAL CONTENT, SYSTEM INTEGRATION, AND NON INFRINGEMENT OF THIRD PARTY RIGHTS BY FILTERING, DISABLING, OR REMOVING SUCH THIRD PARTY’S SOFTWARE, SPYWARE, ADWARE, COOKIES, EMAILS, DOCUMENTS, ADVERTISEMENTS OR THE LIKE, WHETHER ARISING BY STATUTE, LAW, COURSE OF DEALING, CUSTOM AND PRACTICE, OR T
BitDefender Internet Security 2010 You acknowledge and accept that BitDefender may provide updates or additions to the program or product which automatically download to your computer. By accepting this Agreement, You agree to upload the executable files for the purpose of being scanned by the BitDefender servers. Similarly, for the purpose of contracting and using the program, you may have to give BitDefender certain personal data.
BitDefender Internet Security 2010 In the event of invalidity of any provision of this Agreement, the invalidity shall not affect the validity of the remaining portions of this Agreement. BitDefender and BitDefender logos are trademarks of BITDEFENDER. All other trademarks used in the product or in associated materials are the property of their respective owners. The license will terminate immediately without notice if you are in breach of any of its terms and conditions.
BitDefender Internet Security 2010 Preface This guide is intended to all users who have chosen BitDefender Internet Security 2010 as a security solution for their personal computers. The information presented in this book is suitable not only for computer literates, it is accessible to everyone who is able to work under Windows. This book will describe for you BitDefender Internet Security 2010, will guide you through the installation process, will show you how to configure it.
BitDefender Internet Security 2010 Note The note is just a short observation. Although you can omit it, the notes can provide valuable information, such as specific feature or a link to some related topic. Important This requires your attention and is not recommended to skip over it. Usually, it provides non-critical but significant information. Warning This is critical information you should treat with increased caution. Nothing bad will happen if you follow the indications.
BitDefender Internet Security 2010 3. Request for Comments We invite you to help us improve the book. We have tested and verified all of the information to the best of our ability. Please write to tell us about any flaws you find in this book or how you think it could be improved, to help us provide you with the best documentation possible. Let us know by sending an e-mail to documentation@bitdefender.com.
BitDefender Internet Security 2010 Installation and Removal 1
BitDefender Internet Security 2010 1. System Requirements You may install BitDefender Internet Security 2010 only on computers running the following operating systems: ⚫ Windows XP (32/64 bit) with Service Pack 2 or higher ⚫ Windows Vista (32/64 bit) or Windows Vista with Service Pack 1 or higher ⚫ Windows 7 (32/64 bit) Before installation, make sure that your computer meets the minimum hardware and software requirements.
BitDefender Internet Security 2010 ⚫ Yahoo Messenger 8.5 ⚫ Windows Live Messenger 8 Antispam protection is provided for all POP3/SMTP e-mail clients. The BitDefender Antispam toolbar however is integrated only into: ⚫ Microsoft Outlook 2000 / 2003 / 2007 ⚫ Microsoft Outlook Express ⚫ Microsoft Windows Mail ⚫ Thunderbird 2.0.0.
BitDefender Internet Security 2010 2. Preparing for Installation Before you install BitDefender Internet Security 2010, complete these preparations to ensure the installation will go smoothly: ⚫ Make sure that the computer where you plan to install BitDefender meets the minimum system requirements. If the computer does not meet all the minimum system requirements, BitDefender will not be installed or, if installed, it will not work properly and it will cause system slowdowns and instability.
BitDefender Internet Security 2010 3. Installing BitDefender You can install BitDefender from the BitDefender installation CD or using the installation file downloaded on your computer from the BitDefender website or from other authorized websites (for example, the website of a BitDefender partner or an online shop). You can download the installation file from the BitDefender website at the following address: http://www.bitdefender.com/site/Downloads/.
BitDefender Internet Security 2010 Follow these steps to install BitDefender Internet Security 2010: 1. Click Next. You can cancel installation anytime you want by clicking Cancel. BitDefender Internet Security 2010 alerts you if you have other antivirus products installed on your computer. Click Remove to uninstall the corresponding product. If you want to continue without removing the detected products, click Next.
BitDefender Internet Security 2010 Important We recommend you to turn off Windows Firewall since BitDefender Internet Security 2010 already includes an advanced firewall. Running two firewalls on the same computer may cause problems. ⚫ Turn off Windows Defender - to turn off Windows Defender; this option appears only on Windows Vista. Click Install in order to begin the installation of the product. If not already installed, BitDefender will first install .NET Framework 1.1. 6.
BitDefender Internet Security 2010 3.1.1. Step 1/2 - Register BitDefender Internet Security 2010 Registration BitDefender Internet Security 2010 comes with 30-day trial period. To continue evaluating the product, select I want to evaluate BitDefender and click Next. To register BitDefender Internet Security 2010: 1. Select I want to evaluate BitDefender with a license key. 2. Type the license key in the edit field. Note You can find your license key: ⚫ on the CD label. ⚫ on the product registration card.
BitDefender Internet Security 2010 3.1.2. Step 2/2 - Create a BitDefender Account Account Creation If you do not want to create a BitDefender account at the moment, select Register later and click Finish. Otherwise, proceed according to your current situation: ⚫ “I do not have a BitDefender account” (p. 9) ⚫ “I already have a BitDefender account” (p.
BitDefender Internet Security 2010 ⚫ Re-type password - type in again the previously specified password. Note Once the account is activated, you can use the provided e-mail address and password to log in to your account at http://myaccount.bitdefender.com. 3. Optionally, BitDefender can inform you about special offers and promotions using the e-mail address of your account.
BitDefender Internet Security 2010 3.2. Configuration Wizard Once you have completed the registration wizard, a configuration wizard will appear. This wizard helps you configure the main BitDefender settings and user interface so that they suit your requirements better. At the end of the wizard, you can update the product files and malware signatures and scan the system files and applications to make sure they are not infected. The wizard consists of a few simple steps.
BitDefender Internet Security 2010 Option Description Typical Click here if this PC is used mainly for browsing and multimedia activities. Parent Click here if this PC is used by children and you want to control their access to Internet using the Parental Control module. Gamer Click here if this PC is used primarily for gaming. Custom Click here if you want to configure all the main settings of BitDefender. You can later reset the usage profile from the product interface. 3.2.2.
BitDefender Internet Security 2010 performed, as they require more system resources and, implicitly, increase power consumption. Click Next to continue. 3.2.3. Step 3 - Select User Interface User Interface View Modes Click the button that best describes your computer skills to select an appropriate user interface view mode. You can choose to view the user interface under any of three modes, depending on your computer skills and on your previous experience with BitDefender.
BitDefender Internet Security 2010 Mode Description Intermediate Mode Aimed at users with average computer skills, this mode extends what you can do in Novice Mode. You can fix issues separately and choose which issues to be monitored. Moreover, you can manage remotely the BitDefender products installed on the computers in your household. Advanced Mode Suited for more technical users, this mode allows you to fully configure each functionality of BitDefender.
BitDefender Internet Security 2010 1. Select Enable Parental Control. 2. If you are sharing your Windows user account with your children, select the corresponding check box and type a password in the corresponding fields to protect the Parental Control settings. Anyone trying to change the Parental Control settings must first provide the password that you have configured. Click Next to continue. 3.2.5.
BitDefender Internet Security 2010 Click Next to continue. 3.2.6. Step 6 - Select the Tasks to Be Run Task Selection Set BitDefender to perform important tasks for the security of your system. The following options are available: ⚫ Update BitDefender and perform a quick system scan now - during the next step, the virus signatures and product files of BitDefender will be updated in order to protect your computer against the latest threats.
BitDefender Internet Security 2010 3. Click the Virus Scan tab. 4. Right-click the System Scan task and select Schedule. A new window will appear. 5. Change the frequency and the start time as needed. 6. Click OK to save the changes. We recommend that you have these options enabled before moving on to the next step in order to ensure the security of your system. Click Next to continue. If you clear the first check box, there are no tasks to be performed in the last step of the wizard.
BitDefender Internet Security 2010 Note The scan will take a few minutes. When it is over, open the scan window and check the scan results to see if your system is clean. If viruses were detected during the scan, you should immediately open BitDefender and run a full system scan.
BitDefender Internet Security 2010 4. Upgrade You can upgrade to BitDefender Internet Security 2010 if you are using BitDefender Internet Security 2010 beta or the 2008 or 2009 version. There are two ways to perform the upgrade: ⚫ Install BitDefender Internet Security 2010 directly over the older version. If you install directly over the 2009 version, the Friends and Spammers lists and the Quarantine are automatically imported.
BitDefender Internet Security 2010 5. Repairing or Removing BitDefender If you want to repair or remove BitDefender Internet Security 2010, follow the path from the Windows start menu: Start → Programs → BitDefender 2010 → Repair or Remove. You will be requested to confirm your choice by clicking Next. A new window will appear where you can select: ⚫ Repair - to re-install all program components installed by the previous setup. If you choose to repair BitDefender, a new window will appear.
BitDefender Internet Security 2010 Getting Started 21
BitDefender Internet Security 2010 6. Overview Once you have installed BitDefender your computer is protected. If you have not completed the configuration wizard, you must open BitDefender as soon as possible and fix the existing issues. You may have to configure specific BitDefender components or take preventive actions to protect your computer and your data. If you want to, you can configure BitDefender not to alert you about specific issues.
BitDefender Internet Security 2010 Mode Description You can fix issues separately and choose which issues to be monitored. Moreover, you can manage remotely the BitDefender products installed on the computers in your household. Expert Mode Suited for more technical users, this mode allows you to fully configure each functionality of BitDefender. You can also use all tasks provided to protect your computer and data. The user interface mode is selected in the configuration wizard.
BitDefender Internet Security 2010 Novice Mode The window is organized into three main sections: ⚫ Security Status informs you of the issues that affect your computer's security and helps you fix them. By clicking Fix All Issues, a wizard will help you easily remove any threats to your computer and data security. For detailed information, please refer to “Fixing Issues” (p. 37). ⚫ Protect Your PC is where you can find the necessary tasks to protect your computer and data.
BitDefender Internet Security 2010 ▸ When the Parent profile is selected, the Parental Control button allows you to configure the Parental Control settings. For more information on how to configure Parental Control, please refer to “Parental Control” (p. 180). ▸ When the Gamer profile is selected, the Turn On/Off Game Mode button allows you to enable/disable Game Mode. Game Mode temporarily modifies protection settings so as to minimize their impact on system performance.
BitDefender Internet Security 2010 Intermediate Mode The Intermediate Mode window consists of five tabs. The following table briefly describes each tab. For detailed information, please refer to the “Intermediate Mode” (p. 89) part of this user guide. Tab Description Dashboard Displays the security status of your system and lets you reset the usage profile.
BitDefender Internet Security 2010 In the upper-right corner of the window, you can see the Settings button. It opens a window where you can change the user interface mode and enable or disable the main settings of BitDefender. For detailed information, please refer to “Configuring Basic Settings” (p. 40). In the bottom-right corner of the window, you can find several useful links.
BitDefender Internet Security 2010 Expert Mode On the left side of the window there is a menu containing all security modules. Each module has one or more tabs where you can configure the corresponding security settings or perform security or administrative tasks. The following table briefly describes each module. For detailed information, please refer to the “Expert Mode” (p. 111) part of this user guide.
BitDefender Internet Security 2010 Module Description Privacy Control Allows you to prevent data theft from your computer and protect your privacy while you are online. Firewall Allows you to protect your computer from inbound and outbound unauthorized connection attempts. It is quite similar to a guard at your gate - it will keep a watchful eye on your Internet connection and keep track of who to allow access to the Internet and who to block.
BitDefender Internet Security 2010 6.3. System Tray Icon To manage the entire product more quickly, you can use the BitDefender icon in the system tray. If you double-click this icon, BitDefender will open. Also, by right-clicking the icon, a contextual menu will allow you to quickly manage the BitDefender product. ⚫ Show - opens the main interface of BitDefender. ⚫ Help - opens the help file, which explains in detail how to configure and use BitDefender Internet Security 2010.
BitDefender Internet Security 2010 The gray bars (the File Zone) show the number of scanned files per second, on a scale from 0 to 50. The orange bars displayed in the Net Zone show the number of Kbytes transferred (sent and received from the Internet) every second, on a scale from 0 to 100. Note Scan Activity Bar The Scan activity bar will notify you when real-time protection or the Firewall is disabled by displaying a red cross over the corresponding area (File Zone or Net Zone). 6.4.1.
BitDefender Internet Security 2010 3. In the General Settings category, select the check box corresponding to Scan Activity Bar. 4. Click OK to save and apply the changes. 6.5. BitDefender Manual Scan BitDefender Manual Scan lets you scan a specific folder or hard disk partition without having to create a scan task. This feature was designed to be used when Windows is running in Safe Mode.
BitDefender Internet Security 2010 When you are done selecting the locations, click Continue. The Antivirus Scan wizard will appear and guide you through the scanning process. Scanning options. The scanning options are pre-configured for the best detection results. If infected files are detected, BitDefender will try to disinfect them (remove the malware code). If disinfection fails, the Antivirus Scan wizard will allow you to specify other actions to be taken on infected files.
BitDefender Internet Security 2010 ⚫ Scan only the most important files While in Game Mode, you can see the letter G over the BitDefender icon. Using Game Mode By default, BitDefender automatically enters Game Mode when you start a game from the BitDefender's list of known games or when an application goes to full screen. BitDefender will automatically return to the normal operation mode when you close the game or when the detected application exits full screen.
BitDefender Internet Security 2010 6.6.2. Laptop Mode Laptop Mode is especially designed for laptop and notebook users. Its purpose is to minimize BitDefender's impact on power consumption while these devices are running on battery. While in Laptop Mode, scheduled scan tasks are not performed, as they require more system resources and, implicitly, increase power consumption. BitDefender detects when your laptop has switched to battery power and it automatically enters Laptop Mode.
BitDefender Internet Security 2010 To scan the storage device, just click Yes. The Antivirus Scan wizard will appear and guide you through the scanning process. If you do not want to scan the device, you must click No. In this case, you may find one of these options useful: ⚫ Don't ask me again about this type of device - BitDefender will no longer offer to scan storage devices of this type when they are connected to your computer.
BitDefender Internet Security 2010 7. Fixing Issues BitDefender uses an issue tracking system to detect and inform you about the issues that may affect the security of your computer and data. By default, it will monitor only a series of issues that are considered to be very important. However, you can configure it as needed, choosing which specific issues you want to be notified about.
BitDefender Internet Security 2010 Fix All Issues Wizard The wizard displays the list of existing security vulnerabilities on your computer. All current issues are selected to be fixed. If there is an issue that you do not want to be fixed, just select the corresponding check box. If you do so, its status will change to Skip. Note If you do not want to be notified about specific issues, you must configure the tracking system accordingly, as described in the next section.
BitDefender Internet Security 2010 ⚫ System vulnerabilities. BitDefender automatically checks your system for vulnerabilities and alerts you about them. System vulnerabilities include the following: ▸ weak passwords to Windows user accounts. ▸ outdated software on your computer. ▸ missing Windows updates. ▸ Windows Automatic Updates is disabled. When such issues are to be fixed, the vulnerability scan wizard is started. This wizard assists you in fixing the detected system vulnerabilities.
BitDefender Internet Security 2010 8. Configuring Basic Settings You can configure the main product settings (including changing the user interface view mode) from the basic settings window. To open it, do any of the following: ⚫ Open BitDefender and click the Settings button in the upper-right corner of the window. ⚫ Right-click the BitDefender icon in the system tray and select Basic Settings. Note To configure the product settings in detail, use the Expert Mode interface.
BitDefender Internet Security 2010 8.1. User Interface Settings In this area, you can switch the user interface view mode and reset the usage profile. Switching the user interface view mode. As described in section “User Interface View Modes” (p. 22), there are three modes for displaying the user interface. Each user interface mode is designed for a specific category of users, based on their computer skills.
BitDefender Internet Security 2010 8.2. Security Settings In this area, you can enable or disable product settings that cover various aspects of computer and data security. The current status of a setting is indicated using one of these icons: Green circle with a check mark: The setting is enabled. Red circle with an exclamation mark: The setting is disabled. To enable / disable a setting, select / clear the corresponding Enable check box.
BitDefender Internet Security 2010 Setting Description defined. Restrictions may include blocking inappropriate web sites, as well as limiting gaming and Internet access according to a specified schedule. Firewall Firewall protects your computer from hacker and malicious outside attacks. File Encryption File Encryption keeps your documents private by encrypting them in special vaulted drives.
BitDefender Internet Security 2010 Setting Description Game Mode Game Mode temporarily modifies protection settings so as to minimize their impact on system performance during games. Laptop Mode Detection Laptop Mode temporarily modifies protection settings so as to minimize their impact on the life of your laptop battery. Settings Password This ensures that the BitDefender settings can only be changed by the person who knows this password.
BitDefender Internet Security 2010 9. History and Events The View Logs link at the bottom of the BitDefender main window opens another window with the BitDefender history & events. This window offers you an overview of the security-related events. For instance, you can easily check if the update was successfully performed, if malware was found on your computer etc. Note The link is only accessible in Intermediate Mode or in Expert Mode.
BitDefender Internet Security 2010 ⚫ IM encryption ⚫ File Encryption ⚫ Game/Laptop Mode ⚫ Home Network ⚫ Update ⚫ Registration ⚫ Internet Log A list of events is available for each category. Each event comes with the following information: a short description, the action BitDefender took on it when it happened, and the date and time when it occurred. If you want to find out more information about a particular event in the list, double click that event.
BitDefender Internet Security 2010 10. Registration and My Account BitDefender Internet Security 2010 comes with 30-day trial period. During the trial period, the product is fully functional and you can test it to see if it meets your expectations. Please note that, after 15 days of evaluation, the product will cease to update, unless you create a BitDefender account. Creating a BitDefender account is a mandatory part of the registration process.
BitDefender Internet Security 2010 Registration You can see the BitDefender registration status, the current license key and how many days are left until the license expires. To register BitDefender Internet Security 2010: 1. Type the license key in the edit field. Note You can find your license key: ⚫ on the CD label. ⚫ on the product registration card. ⚫ in the online purchase e-mail. If you do not have a BitDefender license key, click the provided link to go to the BitDefender online store and buy one.
BitDefender Internet Security 2010 10.2. Activating BitDefender To activate BitDefender, you must create or sign in to a BitDefender account. If you did not register a BitDefender account during the initial registration wizard, you can do that as follows: ⚫ In Novice Mode, click Fix All Issues. The wizard will help you fix all pending issues, including activating the product. ⚫ In Intermediate Mode, go to the Security tab and click the Fix button corresponding to the issue regarding the product activation.
BitDefender Internet Security 2010 Important You must create an account within 15 days after installing BitDefender (if you register it with a license key, the deadline is extended to 30 days). Otherwise, BitDefender will no longer update. I do not have a BitDefender account To successfully create a BitDefender account, follow these steps: 1. Select Create a new account. 2. Type the required information in the corresponding fields. The data you provide here will remain confidential.
BitDefender Internet Security 2010 2. Type the e-mail address and the password of your account in the corresponding fields. Note If you have forgotten your password, click Forgot your password? and follow the instructions. 3. Optionally, BitDefender can inform you about special offers and promotions using the e-mail address of your account. Select one of the available options from the menu: ⚫ Send me all messages ⚫ Send me only product related messages ⚫ Don't send me any messages 4. Click Sign in. 5.
BitDefender Internet Security 2010 11. Wizards In order to make BitDefender very easy to use, several wizards help you carry out specific security tasks or configure more complex product settings. This chapter describes the wizards that may appear when you fix issues or perform specific tasks with BitDefender. Other configuration wizards are described separately in the “Expert Mode” (p. 111) part. 11.1.
BitDefender Internet Security 2010 You can see the scan status and statistics (scanning speed, elapsed time, number of scanned / infected / suspicious / hidden objects and other). Wait for BitDefender to finish scanning. Note The scanning process may take a while, depending on the complexity of the scan. Password-protected archives. If BitDefender detects a password-protected archive during scanning and the default action is Prompt for password, you will be prompted to provide the password.
BitDefender Internet Security 2010 Actions You can see the number of issues affecting your system. The infected objects are displayed in groups, based on the malware they are infected with. Click the link corresponding to a threat to find out more information about the infected objects. You can choose an overall action to be taken for all issues or you can select separate actions for each group of issues.
BitDefender Internet Security 2010 Action Description to search for and find such files on your computer, if any. Please note that these hidden files are not the files that you deliberately hide from Windows. They are the files hidden by special programs, known as rootkits. Rootkits are not malicious in nature. However, they are commonly used to make viruses or spyware undetectable by normal antivirus programs. Click Continue to apply the specified actions. 11.1.3.
BitDefender Internet Security 2010 Click Close to close the window. BitDefender Could Not Solve Some Issues In most cases BitDefender successfully disinfects the infected files it detects or it isolates the infection. However, there are issues that cannot be solved. In these cases, we recommend you to contact the BitDefender Support Team at www.bitdefender.com. Our support representatives will help you solve the issues you are experiencing.
BitDefender Internet Security 2010 Welcome Window If you want to skip over this window when running this wizard in the future, select the Don't show this step the next time this wizard is run check box. Click Next. 11.2.2. Step 2/6 - Select Target Here you can specify the files or folders to be scanned as well as the scan options.
BitDefender Internet Security 2010 Select Target Click Add Target, select the files or folders that you want to scan and click OK. The paths to the selected locations will appear in the Scan Target column. If you change your mind about the location, just click the Remove button next to it. Click the Remove All button to remove all the locations that were added to the list. When you are done selecting the locations, set the Scan Options.
BitDefender Internet Security 2010 Option Description Scan user defined extensions only Only the files with the extensions specified by the user will be scanned. These extensions must be separated by ";". Click Next. 11.2.3. Step 3/6 - Select Actions Here you can specify the scanner settings and the scan level. Select Actions ⚫ Select the actions to be taken on the infected and suspect files detected.
BitDefender Internet Security 2010 Action Description Move files to Quarantine Moves infected files into the quarantine. Quarantined files cannot be executed or opened; therefore, the risk of getting infected disappears. ⚫ Select the action to be taken on the hidden (rootkits) files. The following options are available: Action Description Take No Action No action will be taken on hidden files. These files will appear in the report file. Rename Changes the name of hidden files by appending .bd.
BitDefender Internet Security 2010 Custom Scan Level Specify the type of malware you want BitDefender to scan for by selecting the appropriate options: Option Description Scan for viruses Scans for known viruses. BitDefender detects incomplete virus bodies, too, thus removing any possible threat that could affect your system's security. Wizards Scan for adware Scans for adware threats. Detected files will be treated as infected.
BitDefender Internet Security 2010 Click OK to close the window. Click Next. 11.2.4. Step 4/6 - Additional Settings Before scanning begins, additional options are available: Additional Settings ⚫ To save the custom task you are creating for future use select the Show this task in Intermediate UI check box and enter a name for the task in the provided edit field.
BitDefender Internet Security 2010 Scanning Note The scanning process may take a while, depending on the complexity of the scan. You can click the scan progress icon in the system tray to open the scan window and see the scan progress. 11.2.6.
BitDefender Internet Security 2010 Summary You can see the results summary. If you want comprehensive information on the scanning process, click View Log to view the scan log. Important If required, please restart your system in order to complete the cleaning process. Click Close to close the window. 11.3. Vulnerability Check Wizard This wizard checks the system for vulnerabilities and helps you fix them.
BitDefender Internet Security 2010 11.3.1. Step 1/6 - Select Vulnerabilities to Check Vulnerabilities Click Next to check the system for the selected vulnerabilities.
BitDefender Internet Security 2010 11.3.2. Step 2/6 - Checking for Vulnerabilities Vulnerability Check Wait for BitDefender to finish checking for vulnerabilities.
BitDefender Internet Security 2010 11.3.3. Step 3/6 - Update Windows Windows Updates You can see the list of critical and non-critical Windows updates that are not currently installed on your computer. Click Install All System Updates to install all the available updates. Click Next.
BitDefender Internet Security 2010 11.3.4. Step 4/6 - Update Applications Applications You can see the list of applications checked by BitDefender and if they are up to date. If an application is not up to date, click the provided link to download the latest version. Click Next.
BitDefender Internet Security 2010 11.3.5. Step 5/6 - Change Weak Passwords User Passwords You can see the list of the Windows user accounts configured on your computer and the level of protection their password provides. A password can be strong (hard to guess) or weak (easy to crack by malicious people with specialized software). Click Fix to modify the weak passwords. A new window will appear. Change Password Select the method to fix this issue: ⚫ Force user to change password at next login.
BitDefender Internet Security 2010 ⚫ Change user password. You must type the new password in the edit fields. Make sure to inform the user about the password change. Note For a strong password, use a combination of uppercase and lowercase letters, numbers and special characters (such as #, $ or @). You can search the Internet for more information and tips on creating strong passwords. Click OK to change the password. Click Next. 11.3.6. Step 6/6 - View Results Results Click Close. 11.4.
BitDefender Internet Security 2010 These wizards do not appear when you fix issues, because file vaults are an optional method of protecting your data. They can only be started from the Intermediate Mode interface of BitDefender, the File Storage tab, as follows: ⚫ Add File to Vault - starts the wizard that allows you to store your important files / documents privately by encrypting them in special, vaulted drives. ⚫ Remove Vault Files - starts the wizard that allows you to erase data from the file vault.
BitDefender Internet Security 2010 Click Add Target, select the file or folder that you want to add and click OK. The path to the selected location will appear in the Path column. If you change your mind about the location, just click the Remove button next to it. Note You can select one or several locations. Click Next. Step 2/6 - Select Vault This is where you can create a new vault or choose an existing vault.
BitDefender Internet Security 2010 Step 3/6 - Create Vault This is where you can specify information for the new Vault. Create Vault To complete the file vault related information follow these steps: 1. Click Browse and choose a location for the bvd file. Note Remember that the file vault is an encrypted file on your computer with the bvd extension. 2. Select a drive letter for the new file vault from the corresponding drop-down menu.
BitDefender Internet Security 2010 5. Set the size of the file vault (in MB) by typing a number into the corresponding field. Click Next. You will go to the step 5. Step 4/6 - Password This is where you will be asked to enter the password for the selected vault. Enter password Type the password into the corresponding field and click Next. Step 5/6 - Summary This is where you can review chosen operations.
BitDefender Internet Security 2010 Summary Click Next. Step 6/6 - Results This is where you can view the vault content.
BitDefender Internet Security 2010 Results Click Finish. 11.4.2. Remove Vault Files This wizard helps you remove files from a specific file vault. Step 1/5 - Select Vault Here you can specify the vault to remove files from.
BitDefender Internet Security 2010 Select Vault If you select Browse for a File Vault, you must click Browse and select the file vault. You will go either to the step 3 if the selected vault is opened (mounted ) or to the step 2 if it is locked (unmounted). If you click Select an existing File Vault, then you must click the desired vault name. You will go either to the step 3 if the selected vault is opened (mounted ) or to the step 2 if it is locked (unmounted). Click Next.
BitDefender Internet Security 2010 Enter password Type the password into the corresponding field and click Next. Step 3/5 - Select files This is where you will be provided with the list of the files from the previously selected vault.
BitDefender Internet Security 2010 Select files Select the files to be removed and click Next. Step 4/5 - Summary This is where you can review chosen operations.
BitDefender Internet Security 2010 Summary Click Next. Step 5/5 - Results This is where you can view operation result.
BitDefender Internet Security 2010 Results Click Finish. 11.4.3. View File Vault This wizard helps you open a specific file vault and view the files it contains. Step 1/4 - Select Vault Here you can specify the vault to view files from.
BitDefender Internet Security 2010 Select Vault If you select Browse for a File Vault, you must click Browse and select the file vault. You will go either to the step 3 if the selected vault is opened (mounted ) or to the step 2 if it is locked (unmounted). If you click Select an existing File Vault, then you must click the desired vault name. You will go either to the step 3 if the selected vault is opened (mounted ) or to the step 2 if it is locked (unmounted). Click Next.
BitDefender Internet Security 2010 Enter password Type the password into the corresponding field and click Next. Step 3/4 - Summary This is where you can review chosen operations.
BitDefender Internet Security 2010 Summary Click Next. Step 4/4 - Results This is where you can view the files of the vault.
BitDefender Internet Security 2010 Results Click Finish. 11.4.4. Lock File Vault This wizard helps you lock a specific file vault in order to protect its content. Step 1/3 - Select Vault Here you can specify the vault to lock.
BitDefender Internet Security 2010 Select Vault If you select Browse for a File Vault, you must click Browse and select the file vault. If you click Select an existing File Vault, then you must click the desired vault name. Click Next. Step 2/3 - Summary This is where you can review chosen operations.
BitDefender Internet Security 2010 Summary Click Next. Step 3/3 - Results This is where you can view operation result.
BitDefender Internet Security 2010 Results Click Finish.
BitDefender Internet Security 2010 Intermediate Mode 89
BitDefender Internet Security 2010 12. Dashboard The Dashboard tab provides information regarding the security status of your computer and allows you to fix pending issues. Dashboard The dashboard consists of the following sections: ⚫ Overall Status - Indicates the number of issues affecting your computer and helps you fix them. If there are any pending issues, you will see a red circle with an exclamation mark and the Fix All Issues button. Click the button to start the Fix All Issues wizard.
BitDefender Internet Security 2010 Click the name of a module to see more details about its status and to configure status tracking for its components. ⚫ Usage Profile - Indicates the usage profile that is currently selected and offers a link to a relevant task for that profile: ▸ When the Typical profile is selected, the Scan Now button allows you to perform a System Scan using the Antivirus Scan Wizard. The entire system will be scanned, except for archives.
BitDefender Internet Security 2010 13. Security BitDefender comes with a Security module that helps you keep your BitDefender up to date and your computer virus free. To enter the Security module, click the Security tab. Security The Security module consists of two sections: ⚫ Status Area - Displays the current status of all monitored security components and allows you to choose which of the components should be monitored.
BitDefender Internet Security 2010 Red circle with an exclamation mark: Issues affect the component. The sentences describing issues are written in red. Just click the Fix button corresponding to a sentence to fix the reported issue. If an issue is not fixed on the spot, follow the wizard to fix it. 13.1.1.
BitDefender Internet Security 2010 Issue Description Automatic Update is disabled The malware signatures of your BitDefender product are not being automatically updated on a regular basis. The update has not been The malware signatures of your BitDefender product performed for x days are outdated. ⚫ Firewall - BitDefender monitors the status of the Firewall feature. If it is not enabled, the issue Firewall is disabled will be reported.
BitDefender Internet Security 2010 13.2. Quick Tasks This is where you can find links to the most important security tasks: ⚫ Update Now - starts an immediate update. ⚫ System Scan - starts a standard scan of your computer (archives excluded). For additional on-demand scan tasks, click the arrow on this button and select a different scan task: My Documents Scan or Deep System Scan. ⚫ Custom Scan - starts a wizard that lets you create and run a custom scan task.
BitDefender Internet Security 2010 The update process is performed on the fly, meaning that the files to be updated are replaced progressively. In this way, the update process will not affect product operation and, at the same time, all vulnerabilities will be excluded. If you want to close this window, just click Cancel. However, this will not stop the update process.
BitDefender Internet Security 2010 the scanning process. For detailed information about this wizard, please refer to “Antivirus Scan Wizard” (p. 52). When you run a Custom Scan, the Custom Scan wizard will guide you through the scanning process. Follow the six-step guided procedure to scan specific files or folders. For detailed information about this wizard, please refer to “Custom Scan Wizard” (p. 56). 13.2.3.
BitDefender Internet Security 2010 14. Parental BitDefender Internet Security 2010 includes a Parental Control module. Parental Control enables you to restrict your children's access to Internet and to specific applications. To check the status of Parental Control, click the Parental tab. Parental The Parental module consists of two sections: ⚫ Status Area - Allows you to see if Parental Control is configured and to enable/disable tracking this module's activity.
BitDefender Internet Security 2010 If you want BitDefender to monitor the Parental Control module, click Configure Status Tracking and select the Enable alerts check box for this module. 14.2. Quick Tasks This is where you can find links to the most important security tasks: ⚫ Update Now - starts an immediate update. ⚫ System Scan - starts a full scan of your computer (archives excluded). ⚫ Deep System Scan - starts a full scan of your computer (archives included). 14.2.1.
BitDefender Internet Security 2010 If you want to close this window, just click Cancel. However, this will not stop the update process. Note If you are connected to the Internet through a dial-up connection, then it is recommended to regularly update BitDefender by user request. Restart the computer if required. In case of a major update, you will be asked to restart your computer. Click Reboot to immediately reboot your system. If you want to reboot your system later, just click OK.
BitDefender Internet Security 2010 15. File Vault BitDefender comes with a File Vault module that helps you keep your data not only safe, but confidential. To achieve this goal, use file encryption. With this feature you can protect files by placing them in file vaults. ⚫ The file vault is a secured storage space for personal information or sensitive files. ⚫ The file vault is an encrypted file on your computer with the bvd extension.
BitDefender Internet Security 2010 ⚫ Status Area - Allows you to see the full list of monitored components. You can choose which of the components to be monitored. It is recommended to enable the monitoring option for all of them. ⚫ Quick Tasks - This is where you can find links to the most important security tasks: adding, viewing, locking and removing file vaults. 15.1.
BitDefender Internet Security 2010 16. Network The Network module allows you to manage the BitDefender products installed on your home computers from a single computer. To enter the Network module, click the Network tab. Network To be able to manage the BitDefender products installed on your home computers, you must follow these steps: 1. Join the BitDefender home network on your computer. Joining the network consists in configuring an administrative password for the home network management. 2.
BitDefender Internet Security 2010 ⚫ Scan All - allows you to scan all managed computers at the same time. ⚫ Update All allows you to update all managed computers at the same time. ⚫ Register All allows you to register all managed computers at the same time. 16.1.1. Joining the BitDefender Network To join the BitDefender home network, follow these steps: 1. Click Enable Network. You will be prompted to configure the home management password. Configure Password 2.
BitDefender Internet Security 2010 2. Type the home management password and click OK. A new window will appear. Add Computer You can see the list of computers in the network. The icon meaning is as follows: ⚫ Indicates an online computer with no BitDefender products installed. ⚫ Indicates an online computer with BitDefender installed. ⚫ Indicates an offline computer with BitDefender installed. 3. Do one of the following: ⚫ Select from the list the name of the computer to add.
BitDefender Internet Security 2010 Authenticate 5. Type the home management password configured on the respective computer. 6. Click OK. If you have provided the correct password, the selected computer name will appear in the network map. Note You can add up to five computers to the network map. 16.1.3. Managing the BitDefender Network Once you have successfully created a BitDefender home network, you can manage all BitDefender products from a single computer.
BitDefender Internet Security 2010 Network Map If you move the mouse cursor over a computer from the network map, you can see brief information about it (name, IP address, number of issues affecting the system security, BitDefender registration status). If you right-click a computer name in the network map, you can see all the administrative tasks you can run on the remote computer. ⚫ Remove PC from home network Allows you to remove a PC from the network.
BitDefender Internet Security 2010 Allows you to fix the issues that are affecting the security of this computer by following the Fix All Issues wizard. ⚫ View History/Events Allows you access to the History&Events module of the BitDefender product installed on this computer. ⚫ Update Now Intitiates the Update process for the BitDefender product installed on this computer.
BitDefender Internet Security 2010 Enter Password 2. Select a scan type. ⚫ System Scan - starts a full scan of your computer (archives excluded). ⚫ Deep System Scan - starts a full scan of your computer (archives included). ⚫ My Documents Scan - starts a quick scan of your documents and settings. Select Scan Type 3. Click OK. 16.1.5. Updating All Computers To update all managed computers, follow these steps: 1. Click Update All. You will be prompted to provide the local home management password.
BitDefender Internet Security 2010 2. Click OK. 16.1.6. Registering All Computers To register all managed computers, follow these steps: 1. Click Register All. You will be prompted to provide the local home management password. Enter Password 2. Enter the key you want to register with. Register All 3. Click OK.
BitDefender Internet Security 2010 Expert Mode 111
BitDefender Internet Security 2010 17. General The General module provides information on the BitDefender activity and the system. Here you can also change the overall behavior of BitDefender. 17.1. Dashboard To see if any issues affect your computer, as well as product activity statistics and your registration status, go to General>Dashboard in Expert Mode. Dashboard The dashboard consists of several sections: ⚫ Overall Status - Informs you of any issues affecting the security of your computer.
BitDefender Internet Security 2010 ⚫ Network Activity - Indicates the evolution of the network traffic filtered by BitDefender Firewall. The height of the bar indicates the intensity of the traffic during that time interval. 17.1.1. Overall Status This is where you can find out the number of issues that are affecting the security of your computer. To remove all threats, click Fix All Issues. This will start the Fix All Issues wizard.
BitDefender Internet Security 2010 Issue Description You have never scanned An on demand system scan was never performed your computer for to check if files stored on your computer are malware malware free. The last system scan A full system scan was started but not completed. you started was aborted before it finished Antivirus is in a critical Real-time protection is disabled and a system scan state is overdue. ⚫ Update - BitDefender monitors if the malware signatures are up-to-date.
BitDefender Internet Security 2010 Status Description Vulnerability Check is disabled BitDefender does not check for potential vulnerabilities regarding missing Windows updates, application updates or weak passwords. Multiple vulnerabilities BitDefender found missing Windows/application were detected updates and/or weak passwords. Critical Microsoft updates Critical Microsoft updates are available but not installed.
BitDefender Internet Security 2010 Item Description scan your computer as soon as possible. To scan the entire computer, go to Antivirus, Virus Scan tab, and run either Full System Scan or Deep System Scan. Next scan Indicates the next time when your computer is going to be scanned. 17.1.3. Overview This is where you can see the update status, your account status, registration and license information. Item Description Last update Indicates when your BitDefender product was last updated.
BitDefender Internet Security 2010 General Settings Here you can set the overall behavior of BitDefender. By default, BitDefender is loaded at Windows startup and then runs minimized in the taskbar. 17.2.1. General Settings ⚫ Enable password protection for product settings - enables setting a password in order to protect the BitDefender configuration.
BitDefender Internet Security 2010 Type the password in the Password field, re-type it in the Retype password field and click OK. Once you have set the password, you will be asked for it whenever you want to change the BitDefender settings. The other system administrators (if any) will also have to provide this password in order to change the BitDefender settings.
BitDefender Internet Security 2010 Note This option can be configured only for the current Windows user account. The Scan activity bar is only available when the interface is in Expert Mode. 17.2.2. Virus Report Settings ⚫ Send virus reports - sends to the BitDefender Labs reports regarding viruses identified in your computer. It helps us keep track of virus-outbreaks. The reports will contain no confidential data, such as your name, IP address or others, and will not be used for commercial purposes.
BitDefender Internet Security 2010 System Information The list contains all the items loaded when starting the system as well as the items loaded by different applications. Three buttons are available: ⚫ Restore - changes a current file association to default. Available for the File Associations settings only! ⚫ Go to - opens a window where the selected item is placed (the Registry for example). Note Depending on the selected item, the Go to button may not appear.
BitDefender Internet Security 2010 18. Antivirus BitDefender protects your computer from all kinds of malware (viruses, Trojans, spyware, rootkits and so on). The protection BitDefender offers is divided into two categories: ⚫ Real-time protection - prevents new malware threats from entering your system. BitDefender will, for example, scan a word document for known threats when you open it, and an e-mail message when you receive one.
BitDefender Internet Security 2010 Real-time Protection You can see whether Real-time protection is enabled or disabled. If you want to change the Real-time protection status, clear or select the corresponding check box. Important To prevent viruses from infecting your computer keep Real-time protection enabled. To start a system scan, click Scan Now. 18.1.1. Configuring Protection Level You can choose the protection level that better fits your security needs.
BitDefender Internet Security 2010 Protection level Description Only programs and incoming mail messages are scanned for viruses. Besides the classical signature-based scan, the heuristic analysis is also used. The actions taken on infected files are the following: disinfect file/move file to quarantine. Default Offers standard security. The resource consumption level is low. All files and incoming&outgoing mail messages are scanned for viruses and spyware.
BitDefender Internet Security 2010 Shield Settings The scan options are organized as an expandable menu, very similar to those used for exploration in Windows. Click the box with "+" to open an option or the box with "-" to close an option. Note You can observe that some scan options, although the "+" sign appears, cannot be opened. The reason is that these options weren't selected yet. You will observe that if you select them, they can be opened.
BitDefender Internet Security 2010 Option Description .doc; .dot; .xls; .ppt; .wbk; .wiz; .pot; .ppa; .xla; .xlt; .vbs; .vbe; .mdb; .rtf; .htm; .hta; .html; .xml; .xtp; .php; .asp; .js; .shs; .chm; .lnk; .pif; .prc; .url; .smm; .pdf; .msi; .ini; .csc; .cmd; .bas; .eml and .nws. Scan user defined Only the files with the extensions specified extensions by the user will be scanned. These extensions must be separated by ";". Scan for riskware Scans for riskware. Detected files will be treated as infected.
BitDefender Internet Security 2010 Option Description Move file quarantine to Moves infected files into the quarantine. Quarantined files cannot be executed or opened; therefore, the risk of getting infected disappears. Second action Select from the drop-down menu the second action to take on infected files, in case the first action fails. Deny access and In case an infected file is detected, the access continue to this will be denied.
BitDefender Internet Security 2010 Option Description Scan incoming e-mail Scans all incoming e-mail messages. Scan outgoing e-mail Scans all outgoing e-mail messages. ⚫ Scan web (HTTP) traffic - scans the http traffic. ⚫ Show warning when a virus is found - opens an alert window when a virus is found in a file or in an e-mail message.
BitDefender Internet Security 2010 If you know and trust the detected application, click Allow. If you want to immediately close the application, click OK. Select the Rememeber this action for this application check box before making your choice and BitDefender will take the same action for the detected application in the future. The rule that is thus created will be listed in the table under Exclusions. BitDefender AVC Alert To configure the Active Virus Control, click BD AVC Settings.
BitDefender Internet Security 2010 Important Keep the Active Virus Control enabled in order to be protected against unknown viruses. If you want to be alerted and prompted for action by Active Virus Control whenever an application tries to perform a possible malicious action, select the Ask me before taking an action check box. Configuring the Protection Level The AVC protection level automatically changes when you set a new real-time protection level.
BitDefender Internet Security 2010 ⚫ Remove - remove an application from the list. ⚫ Edit - edit an application rule. 18.1.4. Disabling Real-time Protection If you want to disable real-time protection, a warning window will appear. You must confirm your choice by selecting from the menu how long you want the real-time protection to be disabled. You can disable real-time protection for 5, 15 or 30 minutes, for an hour, permanently or until the system restart. Warning This is a critical security issue.
BitDefender Internet Security 2010 Antiphishing White List You can see the web sites that BitDefender does not currently check for phishing content. To add a new web site to the white list, type its url address in the New address field and click Add. The white list should contain only web sites you fully trust. For example, add the web sites where you currently shop online. Note You can easily add web sites to the white list from the BitDefender Antiphishing toolbar integrated into your web browser.
BitDefender Internet Security 2010 There is a risk that a virus is already lodged in your system, before you even install BitDefender. This is why it's a very good idea to scan your computer for resident viruses after you've installed BitDefender. And it's definitely a good idea to frequently scan your computer for viruses. To configure and initiate on-demand scanning, go to Antivirus>Virus Scan in Expert Mode. Scan Tasks On-demand scanning is based on scan tasks.
BitDefender Internet Security 2010 There are three categories of scan tasks: ⚫ System tasks - contains the list of default system tasks. The following tasks are available: Default Task Description Deep System Scan Scans the entire system. In the default configuration, it scans for all types of malware threatening your system's security, such as viruses, spyware, adware, rootkits and others. System Scan Scans the entire system, except for archives.
BitDefender Internet Security 2010 ⚫ Delete - removes the selected task. Note Not available for system tasks. You cannot remove a system task. ⚫ Scan Now - runs the selected task, initiating an immediate scan. To the left of each task you can see the Properties button, that allows you to configure the task and view the scan logs. 18.2.2. Using Shortcut Menu A shortcut menu is available for each task. Right-click the selected task to open it.
BitDefender Internet Security 2010 ⚫ Clone task - duplicates the selected task. This is useful when creating new tasks, as you can modify the settings of the task duplicate. ⚫ Delete - deletes the selected task. Note Not available for system tasks. You cannot remove a system task. ⚫ Properties - opens the Properties window, Overview tab, where you can change the settings of the selected task.
BitDefender Internet Security 2010 Overview Here you can see information about the task (name, last run and schedule status) and set the scan settings. Choosing Scan Level You can easily configure the scan settings by choosing the scan level. Drag the slider along the scale to set the appropriate scan level. There are 3 scan levels: Protection level Description Permissive Offers reasonable detection efficiency. The resource consumption level is low. Only programs are scanned for viruses.
BitDefender Internet Security 2010 Protection level Description All files and archives are scanned for viruses and spyware. Besides the classical signature-based scan, the heuristic analysis is also used. A series of general options for the scanning process are also available: ⚫ Run the task with Low priority. Decreases the priority of the scan process. You will allow other programs to run faster and increase the time needed for the scan process to finish. ⚫ Minimize Scan Wizard to tray.
BitDefender Internet Security 2010 The scan options are organized as an expandable menu, very similar to those used for exploration in Windows. Click the box with "+" to open an option or the box with "-" to close an option. The scan options are grouped into 3 categories: ⚫ Scan Level. Specify the type of malware you want BitDefender to scan for by selecting the appropriate options from the Scan Level category. Option Description Scan for viruses Scans for known viruses.
BitDefender Internet Security 2010 Option Description wbk; wiz; pot; ppa; xla; xlt; vbs; vbe; mdb; rtf; htm; hta; html; xml; xtp; php; asp; js; shs; chm; lnk; pif; prc; url; smm; pdf; msi; ini; csc; cmd; bas; eml and nws. Scan user defined Only the files with the extensions specified extensions by the user will be scanned. These extensions must be separated by ";". Scan packed files Scans packed files. Scan inside archives Scans inside regular archives, such as .zip, .rar, .ace, .iso and others.
BitDefender Internet Security 2010 Action Description Take No Action No action will be taken on infected files. These files will appear in the report file. Disinfect files Remove the malware code from the infected files detected. Delete files Deletes infected files immediately, without any warning. Move files to Quarantine Moves infected files into the quarantine. Quarantined files cannot be executed or opened; therefore, the risk of getting infected disappears.
BitDefender Internet Security 2010 Action Description Move files to Quarantine Moves hidden files into the quarantine. Quarantined files cannot be executed or opened; therefore, the risk of getting infected disappears. Note Please note that these hidden files are not the files that you deliberately hide from Windows. They are the files hidden by special programs, known as rootkits. Rootkits are not malicious in nature.
BitDefender Internet Security 2010 – Action to take when an encrypted suspect file is found. Select the action to be taken on suspicious files that are encrypted using Windows. The following options are available: Action Description Take no action Only log the suspicious files that are encrypted using Windows. After the scan is completed, you can open the scan log to view information on these files. Delete files Deletes suspicious files immediately, without any warning.
BitDefender Internet Security 2010 Scan Target You can see the list of local, network and removable drives as well as the files or folders added previously, if any. All checked items will be scanned when running the task. The section contains the following buttons: ⚫ Add Folder(s) - opens a browsing window where you can select the file(s) / folder(s) that you want to be scanned. Note You can also use drag and drop to add files/folders to the list.
BitDefender Internet Security 2010 ⚫ All Entries - to scan all drives, no matter if they are local, in the network or removable. Note If you want to scan your entire computer, select the checkbox corresponding to All Entries. Click OK to save the changes and close the window. To run the task, just click Scan. Viewing the Scan Target of System Tasks You can not modify the scan target of the scan tasks from the System Tasks category. You can only see their scan target.
BitDefender Internet Security 2010 Scheduling Scan Tasks With complex tasks, the scanning process will take some time and it will work best if you close all other programs. That is why it is best for you to schedule such tasks when you are not using your computer and it has gone into the idle mode. To see the schedule of a specific task or to modify it, right-click the task and select Schedule. If you are already in a task's Properties window, select the Scheduler tab.
BitDefender Internet Security 2010 Click OK to save the changes and close the window. To run the task, just click Scan. 18.2.5. Scanning Files and Folders Before you initiate a scanning process, you should make sure that BitDefender is up to date with its malware signatures. Scanning your computer using an outdated signature database may prevent BitDefender from detecting new malware found since the last update. To verify when the last update was performed, go to Update>Update in Advanced View.
BitDefender Internet Security 2010 Immediate Scanning To scan your computer or part of it you can run the default scan tasks or your own scan tasks. This is called immediate scanning. To run a scan task, use one of the following methods: ⚫ double-click the desired scan task in the list. ⚫ click the Scan now button corresponding to the task. ⚫ select the task and then click Run Task. The Antivirus Scan wizard will appear and guide you through the scanning process.
BitDefender Internet Security 2010 Drag File Drop File The Antivirus Scan wizard will appear and guide you through the scanning process. Manual Scanning Manual scanning consists in directly selecting the object to be scanned using the BitDefender Manual Scan option from the BitDefender program group in the Start Menu. Note Manual scanning is very useful, as it can be performed when Windows works in Safe Mode, too.
BitDefender Internet Security 2010 Manual Scanning Click Add Folder, select the location you want to scan and click OK. If you want to scan multiple folders, repeat this action for each additional location. The paths to the selected locations will appear in the Scan Target column. If you change your mind about the location, just click the Remove button next to it. Click the Remove All Paths button to remove all the locations that were added to the list.
BitDefender Internet Security 2010 Scanning You can see the scan status and statistics (scanning speed, elapsed time, number of scanned / infected / suspicious / hidden objects and other). Wait for BitDefender to finish scanning. Note The scanning process may take a while, depending on the complexity of the scan. Password-protected archives. If BitDefender detects a password-protected archive during scanning and the default action is Prompt for password, you will be prompted to provide the password.
BitDefender Internet Security 2010 Stopping or pausing the scan. You can stop scanning anytime you want by clicking Stop&Yes. You will go directly to the last step of the wizard. To temporarily stop the scanning process, just click Pause. You will have to click Resume to resume scanning. Step 2/3 - Select Actions When the scanning is completed, a new window will appear, where you can see the scan results. Actions You can see the number of issues affecting your system.
BitDefender Internet Security 2010 Action Description Disinfect Removes the malware code from infected files. Delete Deletes detected files. Move to quarantine Moves detected files to quarantine. Quarantined files cannot be executed or opened; therefore, the risk of getting infected disappears. Rename files Changes the name of hidden files by appending .bd.ren to their name. As a result, you will be able to search for and find such files on your computer, if any.
BitDefender Internet Security 2010 Summary You can see the results summary. If you want comprehensive information on the scanning process, click View log to view the scan log. Important If required, please restart your system in order to complete the cleaning process. Click Close to close the window. BitDefender Could Not Solve Some Issues In most cases BitDefender successfully disinfects the infected files it detects or it isolates the infection. However, there are issues that cannot be solved.
BitDefender Internet Security 2010 18.2.6. Viewing Scan Logs To see the scan results after a task has run, right-click the task and select Logs. The following window will appear: Scan Logs Here you can see the report files generated each time the task was executed. For each file you are provided with information on the status of the logged scanning process, the date and time when the scanning was performed and a summary of the scanning results.
BitDefender Internet Security 2010 Scan Log Example The scan log contains detailed information about the logged scanning process, such as scanning options, the scanning target, the threats found and the actions taken on these threats. 18.3. Objects Excluded from Scanning There are cases when you may need to exclude certain files from scanning. For example, you may want to exclude an EICAR test file from on-access scanning or .avi files from on-demand scanning.
BitDefender Internet Security 2010 Note The objects excluded from on-access scanning will not be scanned, no matter if they are accessed by you or by an application. To see and manage the objects Antivirus>Exceptions in Expert Mode. excluded from scanning, go to Exceptions You can see the objects (files, folders, extensions) that are excluded from scanning. For each object you can see if it is excluded from on-access, on-demand scanning or both.
BitDefender Internet Security 2010 type of scanning you want them to be excluded from, as needed. Make the necessary changes and click OK. Note You can also right-click an object and use the options on the shortcut menu to edit or delete it. You can click Discard to revert the changes made to the rule table, provided that you have not saved them by clicking Apply. 18.3.1. Excluding Paths from Scanning To exclude paths from scanning, click the Add button.
BitDefender Internet Security 2010 Step 2/4 - Specify Excluded Paths Excluded Paths To specify the paths to be excluded from scanning use either of the following methods: ⚫ Click Browse, select the file or folder that you want to be excluded from scanning and then click Add. ⚫ Type the path that you want to be excluded from scanning in the edit field and click Add. Note If the provided path does not exist, an error message will appear. Click OK and check the path for validity.
BitDefender Internet Security 2010 Step 3/4 - Select Scanning Type Scanning Type You can see a table containing the paths to be excluded from scanning and the type of scanning they are excluded from. By default, the selected paths are excluded from both on-access and on-demand scanning. To change when to apply the exception, click on the right column and select the desired option from the list. Click Next.
BitDefender Internet Security 2010 Step 4/4 - Scan Excluded Files Scan Excluded Files It is highly recommended to scan the files in the specified paths to make sure that they are not infected. Select the check box to scan these files before excluding them from scanning. Click Finish. 18.3.2. Excluding Extensions from Scanning To exclude extensions from scanning, click the Add button. You will be guided through the process of excluding extensions from scanning by the configuration wizard that will appear.
BitDefender Internet Security 2010 Step 1/4 - Select Object Type Object Type Select the option of excluding extensions from scanning. Click Next.
BitDefender Internet Security 2010 Step 2/4 - Specify Excluded Extensions Excluded Extensions To specify the extensions to be excluded from scanning use either of the following methods: ⚫ Select from the menu the extension that you want to be excluded from scanning and then click Add. Note The menu contains a list of all the extensions registered on your system. When you select an extension, you can see its description, if available.
BitDefender Internet Security 2010 Step 3/4 - Select Scanning Type Scanning Type You can see a table containing the extensions to be excluded from scanning and the type of scanning they are excluded from. By default, the selected extensions are excluded from both on-access and on-demand scanning. To change when to apply the exception, click on the right column and select the desired option from the list. Click Next.
BitDefender Internet Security 2010 Step 4/4 - Select Scanning Type Scanning Type It is highly recommended to scan the files having the specified extensions to make sure that they are not infected. Click Finish. 18.4. Quarantine Area BitDefender allows isolating the infected or suspicious files in a secure area, named quarantine.
BitDefender Internet Security 2010 Quarantine The Quarantine section displays all the files currently isolated in the Quarantine folder. For each quarantined file, you can see its name, the name of the detected virus, the path to its original location and the submission date. Note When a virus is in quarantine it cannot do any harm because it cannot be executed or read. 18.4.1. Managing Quarantined Files You can send any selected file from the quarantine to the BitDefender Lab by clicking Send.
BitDefender Internet Security 2010 18.4.2. Configuring Quarantine Settings To configure the quarantine settings, click Settings. A new window will appear. Quarantine Settings Using the quarantine settings, you can set BitDefender to automatically perform the following actions: Delete old files. To automatically delete old quarantined files, check the corresponding option.
BitDefender Internet Security 2010 Automatically submit files. To automatically submit quarantined files, check the corresponding option. You must specify the frequency with which to submit files. Note By default, BitDefender will automatically submit quarantined files every 60 minutes. Scan quarantined files after update. To automatically scan quarantined files after each update performed, check the corresponding option.
BitDefender Internet Security 2010 19. Antispam BitDefender Antispam employs remarkable technological innovations and industry standard antispam filters to weed out spam before it reaches the user's Inbox. 19.1. Antispam Insights Spam is a growing problem, both for individuals and for organizations. It's not pretty, you wouldn't want your kids to see it, it can get you fired (for wasting too much time or from receiving porn in your office mail) and you can't stop people from sending it.
BitDefender Internet Security 2010 Image Filter Since avoiding heuristic filter detection has become quite a challenge, nowadays' inbox folders are full with more and more messages only containing an image with unsolicited content. To cope with this growing problem, BitDefender introduced the Image filter that compares the image signature from the e-mail with those from the BitDefender database. In case of a match the e-mail will be tagged as SPAM.
BitDefender Internet Security 2010 trace a certain scent. Sometimes the filter must be corrected too - prompted to adjust when it makes a wrong decision. Important You can correct the Bayesian filter using the from the Antispam toolbar. Is Spam and Not Spam buttons 19.1.2. Antispam Operation The BitDefender Antispam Engine uses all antispam filters combined to determine whether a certain e-mail message should get into your Inbox or not.
BitDefender Internet Security 2010 characteristics of SPAM. The result is that it will add a Spam score to the e-mail, too. Note If the e-mail is tagged as SEXUALLY EXPLICIT in the subject line, BitDefender will consider it SPAM. The Bayesian filter module will further analyze the message, according to statistical information regarding the rate at which specific words appear in messages classified SPAM as compared to those declared NON-SPAM (by you or by the heuristic filter).
BitDefender Internet Security 2010 Antispam Status You can see whether Antispam is enabled or disabled. If you want to change the Antispam status, clear or select the corresponding check box. Important To prevent spam from entering your Inbox, keep the Antispam filter enabled. In the Statistics section you can view the results of the antispam activity presented per session (since you started your computer) or a summary (since the installation of BitDefender). 19.2.1.
BitDefender Internet Security 2010 Protection level Description Permissive Offers protection for accounts that receive a lot of legitimate commercial mail. The filter will let most e-mail pass through, but it may produce false negatives (spam classified as legitimate mail). Permissive to Moderate Offers protection for accounts that receive some legitimate commercial mail. The filter will let most e-mail pass through, but it may produce false negatives (spam classified as legitimate mail).
BitDefender Internet Security 2010 Friends List Here you can add or remove entries from the Friends list. If you want to add an e-mail address check the E-mail address option, type in the address and click . The address will appear in the Friends list. Important Syntax: name@domain.com. If you want to add a domain check the Domain name option, type in the domain and click . The domain will appear in the Friends list. Important Syntax: ⚫ @domain.com, *domain.com and domain.
BitDefender Internet Security 2010 You can save the Friends list to a file so that you can use it on another computer or after reinstalling the product. To save the Friends list, click the Save button and save it to the desired location. The file will have a .bwl extension. To load a previously saved Friends list, click the Load button and open the corresponding .bwl file. To reset the content of the existing list when loading a previously saved list, select Overwrite the current list.
BitDefender Internet Security 2010 Spammers List Here you can add or remove entries from the Spammers list. If you want to add an e-mail address check the Email address option, type in the address and click . The address will appear in the Spammers list. Important Syntax: name@domain.com. If you want to add a domain check the Domain name option, type in the domain and click . The domain will appear in the Spammers list. Important Syntax: ⚫ @domain.com, *domain.com and domain.
BitDefender Internet Security 2010 from any registered user of such a service will be detected as spam. If, for example, you add yahoo.com to the Spammers list, all e-mail messages coming from yahoo.com addresses will be marked as [spam]. To delete an item from the list, select it and click the Remove button. To delete all entries from the list, click the Clear list button and then Yes to confirm.
BitDefender Internet Security 2010 Antispam Settings Three categories of options are available (Antispam settings, Basic Antispam filters and Advanced Antispam filters) organized like an expandable menu, similar to those from Windows. Note Click the box labeled "+" to open a category or click the one labeled "-" to close it. To enable/disable an option select/clear the checkbox corresponding to it. To apply the default settings, click Default. Click Apply to save the changes. 19.3.1.
BitDefender Internet Security 2010 19.3.2. Basic Antispam Filters ⚫ Enable Friends/Spammers lists - filter e-mail messages using the Friends/Spammers lists. ▸ Automatically add recipients to Friends list - automatically add recipients of sent mail to Friends list. ▸ Automatically add to Friends list - when you click the Not Spam button from the Antispam toolbar, the sender of the selected e-mail is automatically added to the Friends list.
BitDefender Internet Security 2010 20. Parental Control BitDefender Parental Control enables you to control the access to the Internet and to specific applications for each user holding a user account on the system. You can configure Parental Control to block: ⚫ inappropriate web pages. ⚫ Internet access, for specific periods of time (such as when it's time for lessons). ⚫ web pages, e-mail messages and instant messages if they contain specific keywords.
BitDefender Internet Security 2010 Parental Control You can see information regarding the Parental Control status for each Windows user account. The age category is listed below each user name if Parental Control is enabled. If Parental Control is disabled, the status is not configured. Additionally, you can see the status of each Parental Control feature per user: Green circle with a check mark: The feature is enabled. Red circle with an exclamation mark: The feature is disabled.
BitDefender Internet Security 2010 Parental Control Status To configure the Parental Control for this user account, follow these steps: 1. Enable the Parental Control for this user account by selecting the Parental Control check box. Important Keep the Parental Control enabled in order to protect your children against inappropriate content by using your customized computer access rules. 2. Set a password to protect your Parental Control settings.
BitDefender Internet Security 2010 ⚫ Web - to filter web navigation according to the rules set by you in the Web section. ⚫ Applications - to block access to the applications specified by you in the Applications section. ⚫ Keywords - to filter web, mail and instant messaging access according to the rules set by you in the Keywords section. ⚫ IM - to allow or block chat with IM contacts according to the rules set by you in the IM Traffic section.
BitDefender Internet Security 2010 To set the password protection, do the following: 1. Type the password in the Password field. 2. Type the password again in the Retype Password field to confirm it. 3. Click OK to save the password and close the window. Once you set the password, if you want to change the Parental Control settings, you will be asked to provide the password. The other system administrators (if any) will also have to provide this password in order to change the Parental Control settings.
BitDefender Internet Security 2010 Web Filter Categories Select the check box corresponding to a category you want to block and the user will no longer be allowed to access websites matching that category. To make your selection easier, the categories of web content are listed according to the age group for which one could consider them appropriate: ⚫ Child Profile Categories includes content that children under the age of 14 may be allowed access to.
BitDefender Internet Security 2010 ⚫ Teenager Profile Categories includes content that may be considered safe for children between 14 and 18 years old. Category Description Web Proxy Blocker Websites used to mask the URL of a requested website. Tabloids Online magazines. Gambling Online casinos, betting websites, websites offering betting tips, betting forums, etc. Online Shopping Online shops and stores. Social Networking Social networking websites.
BitDefender Internet Security 2010 ⚫ Send me an activity report via e-mail. An e-mail notification is sent every time BitDefender Parental Control blocks an activity. ⚫ Save an internet traffic log. Logs the websites visited by users for whom Parental Control is enabled. 20.2.1. Checking Visited Websites BitDefender logs by default the websites visited by your children. To view the logs, click View Logs to open History&Events and select Internet Log. 20.2.2.
BitDefender Internet Security 2010 ⚫ If the server uses a different port than the default port 25, type it in the corresponding field. ⚫ Sender's e-mail address - type the address you want to appear in the From field of the e-mail. ⚫ Recipient's e-mail address - type the address where you want the reports to be e-mailed. ⚫ If the server requires authentication, select the My SMTP server requires authentication check box and type your user name and password in the corresponding fields.
BitDefender Internet Security 2010 Web Control To enable this protection select the check box corresponding to Enable Web Control. 20.3.1. Creating Web Control Rules To allow or block access to a website, follow these steps: 1. Click Allow Site or Block Site.
BitDefender Internet Security 2010 Specify Website 2. Enter the website address in the Website field. Syntax: ⚫ *.xxx.com - the action of the rule will apply on all web sites finished with .xxx.com; ⚫ *porn* - the action of the rule will apply on all web sites containing porn in the web site address; ⚫ www.*.com - the action of the rule will apply on all web sites having the domain suffix com; ⚫ www.xxx.* - the action of the rule will apply on all web sites starting with www.xxx.
BitDefender Internet Security 2010 ⚫ Allow all sites, except the ones in the list. Select this option to allow access to all websites except those for which you have set the Block action. ⚫ Block all sites, except the ones in the list. Select this option to block access to all websites except those for which you have set the Allow action. 20.4. Web Time Limiter The Web Time Limiter helps you to allow or block web access for users or applications during specified time intervals.
BitDefender Internet Security 2010 can click Block all to select all the cells and, implicitly, to block all the web access. If you click Allow all, the internet connections will be permitted all the time. Important The boxes coloured in grey represent the time intervals when all internet connections are blocked. 20.5. Applications Control The Applications Control helps you to block any application from running.
BitDefender Internet Security 2010 20.5.1. Creating Application Control Rules To block or restrict access to an application, follow these steps: 1. Click Block Application or Restrict Application. A new window will appear: Specify Application 2. Click Browse to locate the application to which you want to block/restrict access. 3. Select the action of the rule: ⚫ Block permanently to block access to the application completely. ⚫ Block based on this schedule to restrict access to certain time intervals.
BitDefender Internet Security 2010 To edit a rule, select it, click the Edit button and make the necessary changes in the configuration window. To delete a rule, select it and click the Delete button. 20.6. Keywords Control Keywords Control helps you block users' access to e-mail messages, web pages and instant messages that contain specific words. Using Keywords Control, you can prevent your children from seeing inappropriate words or phrases when they are online.
BitDefender Internet Security 2010 20.6.1. Creating Keywords Control Rules To block a word or phrase, follow these steps: 1. Click Block Keyword. A new window will appear: Specify Keyword 2. Type the word or phrase you want to block in the edit field. If you want only whole words to be detected, select the Match whole words check box. 3. Select the traffic type BitDefender should scan for the specified word. Option Description HTTP Web pages that contain the keyword are blocked.
BitDefender Internet Security 2010 20.7. Instant Messaging (IM) Control The Instant Messaging (IM) Control allows you to specify the IM contacts your children are allowed to chat with. Note The IM Control is only available for Yahoo Messenger and Windows Live (MSN) Messenger. To configure IM Control for a specific user account, click the Modify button corresponding to that user account and click the Messaging tab.
BitDefender Internet Security 2010 Add IM contact 2. Type the contact's name in the Name field. 3. Type the e-mail address or the user name used by the IM contact in the E-mail or IM ID field. 4. Choose the IM program the contact associates with. 5. Select the action for this rule - Block or Allow 6. Click Finish to add the rule. 20.7.2. Managing Instant Messaging (IM) Control Rules The IM Control rules that have been configured are listed in the table on the lower side of the window.
BitDefender Internet Security 2010 21. Privacy Control BitDefender monitors dozens of potential “hotspots” in your system where spyware might act, and also checks any changes made to your system and software. It is effective in blocking Trojan horses and other tools installed by hackers, who try to compromise your privacy and send your personal information, like credit card numbers, from your computer to the hacker. 21.1.
BitDefender Internet Security 2010 ⚫ Identity Control - protects your confidential data by filtering all outgoing web (HTTP), e-mail (SMTP) and instant messaging traffic according to the rules you create in the Identity section. ⚫ Registry Control - asks for your permission whenever a program tries to modify a registry entry in order to be executed at Windows start-up. ⚫ Cookie Control - asks for your permission whenever a new website tries to set a cookie.
BitDefender Internet Security 2010 You can create rules to protect any piece of information you might consider personal or confidential, from your phone number or e-mail address to your bank account information. Multiuser support is provided so that users logging on to different Windows user accounts can configure and use their own identity protection rules.
BitDefender Internet Security 2010 Identity Control If you want to use Identity Control, follow these steps: 1. Select the Enable Identity Control check box. 2. Create rules to protect your sensitive data. For more information, please refer to “Creating Identity Rules” (p. 201). 3. If needed, define specific exclusions from the rules you have created. For more information, please refer to “Defining Exclusions” (p. 204). 4.
BitDefender Internet Security 2010 Step 1/4 - Welcome Window Welcome Window Click Next.
BitDefender Internet Security 2010 ⚫ Rule Name - type the name of the rule in this edit field. ⚫ Rule Type - choose the rule type (address, name, credit card, PIN, SSN etc). ⚫ Rule Data - type the data you want to protect in this edit field. For example, if you want to protect your credit card number, type all or part of it here. Note If you enter less than three characters, you will be prompted to validate the data.
BitDefender Internet Security 2010 You can choose to apply the rule only if the rule data matches whole words or if the rule data and the detected string case match. Specify the users for which the rule applies. ⚫ Only for me (current user) - the rule will apply only to your user account. ⚫ Limited user accounts - the rule will apply to you and all limited Windows accounts. ⚫ All users - the rule will apply to all Windows accounts. Click Next.
BitDefender Internet Security 2010 To open the window where you can manage exceptions, click Exclusions. Exclusions To add an exception, follow these steps: 1. Click the Add button to add a new entry in the table. 2. Double-click Specify excluded item and provide the web site, the e-mail address or the IM contact that you want to add as exception. 3. Double-click Traffic type and choose from the menu the option corresponding to the type of address previously provided.
BitDefender Internet Security 2010 Edit Rule Here you can change the name, description and parameters of the rule (type, data and traffic). Click OK to save the changes. 21.2.4. Rules Defined by Other Administrators When you are not the only user with administrative rights on your system, the other administrators can create identity rules of their own.
BitDefender Internet Security 2010 Registry Control keeps an eye on the Windows Registry - this is again useful for detecting Trojan horses. It will alert you whenever a program will try to modify a registry entry in order to be executed at Windows start-up. You can see the program that is trying to modify Windows Registry. If you do not recognize the program and if it seems suspicious, click Block to prevent it from modifying Windows Registry. Otherwise, click Allow to permit the modification.
BitDefender Internet Security 2010 Registry Control You can see the rules created so far listed in the table. To delete a rule, select it and click the Delete button. 21.4. Cookie Control Cookies are a very common occurrence on the Internet. They are small files stored on your computer. Websites create these cookies in order to keep track of specific information about you. Cookies are generally made to make your life easier.
BitDefender Internet Security 2010 You can see the name of the application that is trying to send the cookie file. Click Yes or No and a rule will be created, applied and listed in the rules table. Cookie Alert This will help you to choose which websites you trust and which you don't. Note Because of the great number of cookies used on the Internet today, Cookie Control can be quite bothersome to begin with. At first, it will ask a lot of questions about sites trying to place cookies on your computer.
BitDefender Internet Security 2010 Cookie Control You can see the rules created so far listed in the table. Important The rules are listed in order of their priority starting from the top, meaning the first rule has the highest priority. Drag&drop rules in order to change their priority. To delete a rule, select it and click the Delete button. To modify the rule parameters, select the rule and click the Edit button or double-click it. Make the desired changes in the configuration window.
BitDefender Internet Security 2010 Select Address, Action and Direction You can set the parameters: ⚫ Domain address - type in the domain on which the rule should apply. ⚫ Action - select the action of the rule. Action Description Allow The cookies on that domain will execute. Deny The cookies on that domain will not execute. ⚫ Direction - select the traffic direction. Type Description Outgoing The rule applies only for the cookies that are sent out back to the connected site.
BitDefender Internet Security 2010 21.5. Script Control Scripts and other codes such as ActiveX controls and Java applets, which are used to create interactive web pages, can be programmed to have harmful effects. ActiveX elements, for example, can gain total access to your data and they can read data from your computer, delete information, capture passwords and intercept messages while you're online. You should only accept active content from sites you fully know and trust.
BitDefender Internet Security 2010 Script Control You can see the rules created so far listed in the table. Important The rules are listed in order of their priority starting from the top, meaning the first rule has the highest priority. Drag&drop rules in order to change their priority. To delete a rule, select it and click the Delete button. To modify the rule parameters, select the rule and click the Edit button or double-click it. Make the desired changes in the configuration window.
BitDefender Internet Security 2010 Select Address and Action You can set the parameters: ⚫ Domain address - type in the domain on which the rule should apply. ⚫ Action - select the action of the rule. Action Description Allow The scripts on that domain will execute. Deny The scripts on that domain will not execute. Click Finish.
BitDefender Internet Security 2010 22. Firewall The Firewall protects your computer from inbound and outbound unauthorized connection attempts. It is quite similar to a guard at your gate - it will keep a watchful eye on your Internet connection and keep track of who to allow access to the Internet and who to block. Note A firewall is essential if you have a broadband or DSL connection. In Stealth Mode your computer is “hidden” from malicious software and hackers.
BitDefender Internet Security 2010 You can see whether the BitDefender firewall is enabled or disabled. If you want to change the firewall status, clear or select the corresponding check box. Important To be protected against Internet attacks keep the Firewall enabled. There are two categories of information: ⚫ Network Configuration Brief. You can see your computer's name, its IP address and the default gateway.
BitDefender Internet Security 2010 Default action Description Allow All Applies the current rules and allows all traffic attempts that do not match any of the current rules without prompting. This policy is strongly discouraged, but it might be useful for network administrators and gamers. Allow Known Programs Applies the current rules and allows all outgoing connection attempts from programs which are known to be legitimate (whitelisted) by BitDefender without prompting.
BitDefender Internet Security 2010 Note This option does not automatically enable ICS on your system, but only allows this type of connection in case you enable it from your operating system. Internet Connection Sharing (ICS) enables members of local area networks to connect to the Internet through your computer. This is useful when you benefit from a special/particular Internet connection (e.g. wireless connection) and you want to share it with other members of your network.
BitDefender Internet Security 2010 ⚫ Enable Intrusion Detection (IDS) - activates the heuristic monitoring of the applications trying to access network services or the Internet. 22.2. Network To configure the firewall settings, go to Firewall>Network in Expert Mode. Network The columns in the Network Configuration table provide detailed information on the network you are connected to: ⚫ Adapter - the network adapter your computer uses to connect to the network or the Internet.
BitDefender Internet Security 2010 22.2.1. Changing the Trust Level BitDefender assigns each network adapter a trust level. The trust level assigned to the adapter indicates how trustworthy the respective network is. Based on the trust level, specific rules are created for the adapter regarding how the system and BitDefender processes access the network and the Internet. You can see the trust level configured for each adapter in the Network Configuration table, under the Trust Level column.
BitDefender Internet Security 2010 Stealth option Description Remote Your computer cannot be detected from the Internet. Local network users can ping and detect your computer. 22.2.3. Configuring Generic Settings If the IP address of a network adapter is changed, BitDefender modifies the trust level accordingly. If you want to keep the same trust level, click the arrow from the Generic column and select Yes. 22.2.4. Network Zones You can add allowed or blocked computers for a specific adapter.
BitDefender Internet Security 2010 2. Select the action: ⚫ Allow - to allow all traffic between your computer and the selected computer. ⚫ Deny - to block all traffic between your computer and the selected computer. 3. Click OK. 22.3. Rules To manage the firewall rules controlling applications' access to network resources and Internet, go to Firewall>Rules in Expert Mode. Firewall Rules You can see the applications (processes) for which firewall rules have been created.
BitDefender Internet Security 2010 through any adapter. You can manually create rules or edit existing rules to filter an application's network or Internet access through a specific adapter (for example, a wireless network adapter). ⚫ Command Line - the command used to start the process in the Windows command line interface (cmd). ⚫ Protocol - the IP protocol the rule applies to. You may see one of the following: Protocol Description Any Includes all IP protocols.
BitDefender Internet Security 2010 ⚫ Action - whether the application is allowed or denied access to network or Internet under the specified circumstances. 22.3.1.
BitDefender Internet Security 2010 3. Click OK to add the new rule. Modifying rules. To modify an existing rule, follow these steps: 1. Click the Edit rule button or double-click the rule. The configuration window will appear. 2. Configure the main and the advanced parameters as needed. 3. Click OK to save the changes. Configuring Main Parameters The Main tab of the configuration window allows configuring the main rule parameters. Main Parameters You can configure the following parameters: ⚫ Program Path.
BitDefender Internet Security 2010 ▸ If you want the rule to apply to UDP, select UDP. ▸ If you want the rule to apply to a specific protocol, select Other. An edit field will appear. Type the number assigned to the protocol you want to filter in the edit field. Note IP protocol numbers are assigned by the Internet Assigned Numbers Authority (IANA). You can find the complete list of assigned IP protocol numbers at www.iana.org/assignments/protocol-numbers. ⚫ Events.
BitDefender Internet Security 2010 Advanced Parameters You can configure the following advanced parameters: ⚫ Direction. Select from the menu the traffic direction the rule applies to. Direction Description Outbound The rule applies only for the outgoing traffic. Inbound The rule applies only for the incoming traffic. Both The rule applies in both directions. ⚫ IP version. Select from the menu the IP version (IPv4, IPv6 or any) the rule applies to. ⚫ Local Address.
BitDefender Internet Security 2010 ▸ To filter traffic between your computer and a specific computer, clear the Any check box and type its IP address. ▸ If you have selected TCP or UDP as protocol you can set a specific port or a range between 0 and 65535. If you want the rule to apply to all ports, select Any. ⚫ Apply this rule only to directly connected computers. Select this option when you want the rule to apply only to the local traffic attempts. ⚫ Check process parent chain for the original event.
BitDefender Internet Security 2010 Note When a connection attempt is made (whether incoming or outgoing), BitDefender applies the action of the first rule matching the respective connection. Therefore, the order by which rules are checked is very important. To delete a rule, select it and click the Delete rule button. To edit an existing rule, select it and click the Edit rule button or double-click it. You can increase or decrease the priority of a rule.
BitDefender Internet Security 2010 You can see the total traffic sorted by application. For each application, you can see the connections and the open ports, as well as statistics regarding the outgoing & incoming traffic speed and the total amount of data sent / received. If you want to see the inactive processes too, clear the Hide inactive processes check box. The meaning of the icons is as follows: ⚫ Indicates an outgoing connection. ⚫ Indicates an incoming connection.
BitDefender Internet Security 2010 23. Vulnerability An important step in protecting your computer against malicious persons and applications is to keep up to date the operating system and the applications you regularly use. Moreover, to prevent unauthorized physical access to your computer, strong passwords (passwords that cannot be easily guessed) must be configured for each Windows user account. BitDefender regularly checks your system for vulnerabilities and notifies you about the existing issues. 23.
BitDefender Internet Security 2010 Important To be automatically notified about system or application vulnerabilities, keep the Automatic Vulnerability Checking enabled. 23.1.1. Fixing Vulnerabilities Depending on the issue, to fix a specific vulnerability proceed as follows: ⚫ If Windows updates are available, click Install in the Action column to install them. ⚫ If an application is outdated, use the Home Page link provided to download and install the latest version of that application.
BitDefender Internet Security 2010 Automatic Vulnerability Checking Settings Select the check boxes corresponding to the system vulnerabilities you want to be regularly checked. ⚫ Critical Windows Updates ⚫ Regular Windows Updates ⚫ Application Updates ⚫ Weak Passwords Note If you clear the check box corresponding to a specific vulnerability, BitDefender will no longer notify you about the related issues.
BitDefender Internet Security 2010 24. Encryption BitDefender offers encryption capabilities to protect your confidential documents and your instant messaging conversations through Yahoo Messenger and MSN Messenger. 24.1.
BitDefender Internet Security 2010 Instant Messaging Encryption By default, IM Encryption is enabled for both Yahoo Messenger and Windows Live (MSN) Messenger. You can choose to disable IM Encryption for a specific chat application only or completely. Two tables are displayed: ⚫ Encryption Exclusions - lists the user IDs and the associated IM program for which encryption is disabled. To remove a contact from the list, select it and click the Remove button.
BitDefender Internet Security 2010 1. Click the Add button to open the configuration window. Adding Contacts 2. Type in the edit field the user ID of your contact. 3. Select the instant messaging application associated with the contact. 4. Click OK. 24.2. File Encryption BitDefender File Encryption enables you to create encrypted, password-protected logical drives (or vaults) on your computer where you can securely store your confidential and sensitive documents.
BitDefender Internet Security 2010 File Vault To disable File Encryption, clear the File Encryption is enabled check box and click Yes to confirm. If you disable File Vault, all file vaults will be locked and you will no longer be able to access the files they contain. The table at the top displays the file vaults on your computer. You can see the name, the status (opened / locked), the drive letter and the full path of the vault. The table at the bottom displays the content of the selected vault. 24.2.1.
BitDefender Internet Security 2010 Create File Vault Proceed as follows: 1. Specify the location and the name of the vault file. ⚫ Click Browse, select the location of the vault and save the vault file under the desired name. ⚫ Just type the name of the vault in the corresponding field to create it in My Documents. To open My Documents, click the Windows Start menu and then My Documents. ⚫ Type the full path of the vault file on the disk. For example, C:\my_vault.bvd. 2.
BitDefender Internet Security 2010 24.2.2. Opening a Vault In order to access and work with the files stored in a vault, you must open the vault. When you open the vault, a virtual disk drive appears in My Computer. The drive is labeled with the drive letter assigned to the vault. To open a vault, use any of these methods: ⚫ Select the vault from the table and click Open vault. ⚫ Right-click the vault in the table and select Open.
BitDefender Internet Security 2010 ⚫ Select the vault from the table and click Lock vault. ⚫ Right-click the vault in the table and select Lock. ⚫ Right-click the corresponding virtual disk drive from My Computer, point to BitDefender File Vault and select Lock. BitDefender will immediately inform you about the result of the operation. If an error has occurred, use the error message to troubleshoot the error. Click OK to close the window. 24.2.4.
BitDefender Internet Security 2010 Note The password must have at least 8 characters. For a strong password, use a combination of uppercase and lowercase letters, numbers and special characters (such as #, $ or @). 3. Click OK to change the password. BitDefender will immediately inform you about the result of the operation. If an error has occurred, use the error message to troubleshoot the error. Click OK to close the window. 24.2.5. Adding Files to a Vault To add files to a vault, follow these steps: 1.
BitDefender Internet Security 2010 3. Remove files or folders as you normally do in Windows (for example, right-click a file you want to delete and select Delete).
BitDefender Internet Security 2010 25. Game / Laptop Mode The Game / Laptop Mode module allows you to configure the special operation modes of BitDefender: ⚫ Game Mode temporarily modifies the product settings so as to minimize the resource consumption when you play. ⚫ Laptop Mode prevents scheduled tasks from running when the laptop is running on battery in order to save battery power. 25.1. Game Mode Game Mode temporarily modifies protection settings so as to minimize their impact on system performance.
BitDefender Internet Security 2010 Game Mode At the top of the section, you can see the status of the Game Mode. You can click Turn On Game Mode Mode or Turn Off Game Mode to change the current status. 25.1.1. Configuring Automatic Game Mode Automatic Game Mode allows BitDefender to automatically enter Game Mode when a game is detected.
BitDefender Internet Security 2010 Note If you do not want BitDefender to automatically enter Game Mode, clear the Automatic Game Mode check box. 25.1.2. Managing the Game List BitDefender automatically enters Game Mode when you start an application from the game list. To view and manage the game list, click Manage Games. A new window will appear. Game List New applications are automatically added to the list when: ⚫ You start a game from the BitDefender's list of known games.
BitDefender Internet Security 2010 Adding or Editing Games When you add or edit an entry from the game list, the following window will appear: Add Game Click Browse to select the application or type the full path to the application in the edit field. If you do not want to automatically enter Game Mode when the selected application is started, select Disable. Click OK to add the entry to the game list. 25.1.3.
BitDefender Internet Security 2010 3. Click OK to save the changes. 25.1.4. Changing Game Mode Hotkey You can manually enter Game Mode using the default Ctrl+Alt+Shift+G hotkey. If you want to change the hotkey, follow these steps: 1. Click Advanced Settings. A new window will appear. Advanced Settings 2. Under the Use HotKey option, set the desired hotkey: ⚫ Choose the modifier keys you want to use by checking one the following: Control key (Ctrl), Shift key (Shift) or Alternate key (Alt).
BitDefender Internet Security 2010 To configure Laptop Mode, go to Game / Laptop Mode>Laptop Mode in Expert Mode. Laptop Mode You can see whether Laptop Mode is enabled or not. If Laptop Mode is enabled, BitDefender will apply the configured settings while the laptop is running on battery. 25.2.1.
BitDefender Internet Security 2010 26. Home Network The Network module allows you to manage the BitDefender products installed on your home computers from a single computer. Network Map To be able to manage the BitDefender products installed on your home computers, you must follow these steps: 1. Join the BitDefender home network on your computer. Joining the network consists in configuring an administrative password for the home network management. 2.
BitDefender Internet Security 2010 Configure Password 2. Type the same password in each of the edit fields. 3. Click OK. You can see the computer name appearing in the network map. 26.2. Adding Computers to the BitDefender Network Before you can add a computer to the BitDefender home network, you must configure the BitDefender home management password on the respective computer. To add a computer to the BitDefender home network, follow these steps: 1. Click Add Computer.
BitDefender Internet Security 2010 Add Computer You can see the list of computers in the network. The icon meaning is as follows: ⚫ Indicates an online computer with no BitDefender products installed. ⚫ Indicates an online computer with BitDefender installed. ⚫ Indicates an offline computer with BitDefender installed. 3. Do one of the following: ⚫ Select from the list the name of the computer to add. ⚫ Type the IP address or the name of the computer to add in the corresponding field. 4. Click Add.
BitDefender Internet Security 2010 Authenticate 5. Type the home management password configured on the respective computer. 6. Click OK. If you have provided the correct password, the selected computer name will appear in the network map. Note You can add up to five computers to the network map. 26.3. Managing the BitDefender Network Once you have successfully created a BitDefender home network, you can manage all BitDefender products from a single computer.
BitDefender Internet Security 2010 Network Map If you move the mouse cursor over a computer from the network map, you can see brief information about it (name, IP address, number of issues affecting the system security, BitDefender registration status). If you click a computer name in the network map, you can see all the administrative tasks you can run on the remote computer. ⚫ Remove PC from home network Allows you to remove a PC from the network.
BitDefender Internet Security 2010 ⚫ Fix all issues on this PC Allows you to fix the issues that are affecting the security of this computer by following the Fix All Issues wizard. ⚫ View History/Events Allows you access to the History&Events module of the BitDefender product installed on this computer. ⚫ Update Now Intitiates the Update process for the BitDefender product installed on this computer.
BitDefender Internet Security 2010 27. Update New malware is found and identified every day. This is why it is very important to keep BitDefender up to date with the latest malware signatures. If you are connected to the Internet through broadband or DSL, BitDefender takes care of this itself. By default, it checks for updates when you turn on your computer and every hour after that.
BitDefender Internet Security 2010 Automatic Update Here you can see when the last check for updates and the last update were performed, as well as information about the last update performed (if successful or the errors that occurred). Also, information about the current engine version and the number of signatures is displayed. If you open this section during an update, you can see the download status. Important To be protected against the latest threats keep the Automatic Update enabled.
BitDefender Internet Security 2010 The Update module will connect to the BitDefender update server and will verify if any update is available. If an update was detected, depending on the options set in the Manual Update Settings section, you will be asked to confirm the update or the update will be made automatically. Important It may be necessary to restart the computer when you have completed the update. We recommend doing it as soon as possible.
BitDefender Internet Security 2010 Update Settings The update settings are grouped into 4 categories (Update Location Settings, Automatic Update Settings, Manual Update Settings and Advanced Settings). Each category will be described separately. 27.2.1. Setting Update Locations To set the update locations, use the options from the Update Location Settings category.
BitDefender Internet Security 2010 Note We recommend you to set as primary update location the local mirror and to leave the alternate update location unchanged, as a fail-safe plan in case the local mirror becomes unavailable. In case the company uses a proxy server to connect to the Internet, check Use proxy and then click Proxy Settings to configure the proxy settings. For more information, please refer to “Managing Proxies” (p. 260) 27.2.2.
BitDefender Internet Security 2010 Note If BitDefender is updated while a scan is in progress, the scan process will be aborted. ⚫ Don't update if game mode is on - BitDefender will not update if the game mode is turned on. In this way, you can minimize the product’s influence on system performance during games. 27.2.5. Managing Proxies If your company uses a proxy server to connect to the Internet, you must specify the proxy settings in order for BitDefender to update itself.
BitDefender Internet Security 2010 on to that account. If the proxy server requires a username and a password, you must specify them in the corresponding fields. ⚫ Default Browser Proxy - proxy settings of the current user, extracted from the default browser. If the proxy server requires a username and a password, you must specify them in the corresponding fields. Note The supported web browsers are Internet Explorer, Mozilla Firefox and Opera.
BitDefender Internet Security 2010 28. Registration To find complete information on your BitDefender product and the registration status, go to Registration in Expert Mode. Registration This section displays: ⚫ Product Information: the BitDefender product and version. ⚫ Registration Information: the e-mail address used to log your BitDefender account (if configured), the current license key and how many days are left until the license expires. 28.1.
BitDefender Internet Security 2010 Registration You can see the BitDefender registration status, the current license key and how many days are left until the license expires. To register BitDefender Internet Security 2010: 1. Type the license key in the edit field. Note You can find your license key: ⚫ on the CD label. ⚫ on the product registration card. ⚫ in the online purchase e-mail. If you do not have a BitDefender license key, click the provided link to go to the BitDefender online store and buy one.
BitDefender Internet Security 2010 Important You must create an account within 15 days after installing BitDefender (if you register it with a license key, the deadline is extended to 30 days). Otherwise, BitDefender will no longer update. If you have not yet created a BitDefender account, click Activate Product to open the account registration window. Account Creation If you do not want to create a BitDefender account at the moment, select Register later and click Finish.
BitDefender Internet Security 2010 ⚫ Password - type in a password for your BitDefender account. The password must be between 6 and 16 characters long. ⚫ Re-type password - type in again the previously specified password. Note Once the account is activated, you can use the provided e-mail address and password to log in to your account at http://myaccount.bitdefender.com. 3. Optionally, BitDefender can inform you about special offers and promotions using the e-mail address of your account.
BitDefender Internet Security 2010 4. Click Sign in. 5. Click Finish to complete the wizard.
BitDefender Internet Security 2010 Integration into Windows and Third-Party Software 267
BitDefender Internet Security 2010 29. Integration into Windows Contextual Menu The Windows contextual menu appears whenever you right-click a file or folder on your computer or objects on your desktop. Windows Contextual Menu BitDefender integrates into the Windows contextual menu to help you easily scan files for viruses and prevent other users from accessing your sensitive files. You can quickly locate the BitDefender options on the contextual menu by looking for the BitDefender icon.
BitDefender Internet Security 2010 3. Click the Virus Scan tab. 4. Right-click the Contextual Scan task and select Open. A window will appear. 5. Click Custom and configure the scanning options as needed. To find out what an option does, keep the mouse over it and read the description displayed at the bottom of the window. 6. Click OK to save the changes. 7. Click OK to confirm and apply the new scanning options.
BitDefender Internet Security 2010 29.2.1. Create Vault Keep in mind that a vault is actually just a file with the .bvd extension. Only when you open the vault, a virtual disk drive appears in My Computer and you can safely store files inside it. When creating a vault, you must specify where and under which name to save it on your computer. You must also specify a password to protect its content. Only users who know the password can open the vault and access the documents and data stored inside it.
BitDefender Internet Security 2010 7. Click Create if you only want to create the vault at the selected location. To create and display the vault as a virtual disk drive in My Computer, click Create&Open. BitDefender will immediately inform you about the result of the operation. If an error has occurred, use the error message to troubleshoot the error. Click OK to close the window. Note It may be convenient to save all file vaults to the same location. In this way, you can find them quicker. 29.2.2.
BitDefender Internet Security 2010 29.2.3. Lock Vault When you are done with your work in a file vault, you must lock it in order to protect your data. By locking the vault, the corresponding virtual disk drive disappears from My Computer. Consequently, access to the data stored in the vault is completely blocked. To lock a vault, follow these steps: 1. Open My Computer (click the Windows Start menu and then My Computer). 2. Identify the virtual disk drive corresponding to the vault you want to close.
BitDefender Internet Security 2010 29.2.5. Remove from File Vault In order to remove files or folders from a vault, the vault must be open. To remove files or folders from a vault, follow these steps: 1. Open My Computer (click the Windows Start menu and then My Computer). 2. Enter the virtual disk drive corresponding to the vault. Look for the drive letter you assigned to the vault when you opened it. 3.
BitDefender Internet Security 2010 Note The password must have at least 8 characters. For a strong password, use a combination of uppercase and lowercase letters, numbers and special characters (such as #, $ or @). 5. Click OK to change the password. BitDefender will immediately inform you about the result of the operation. If an error has occurred, use the error message to troubleshoot the error. Click OK to close the window.
BitDefender Internet Security 2010 30. Integration into Web Browsers BitDefender protects you against phishing attempts when you are surfing the Internet. It scans the accessed web sites and alerts you if there are any phishing threats. A White List of web sites that will not be scanned by BitDefender can be configured.
BitDefender Internet Security 2010 ⚫ Enable / Disable - enables / disables the BitDefender antiphishing protection in the current web browser. ⚫ Settings - opens a window where you can specify the antiphishing toolbar's settings. The following options are available: ▸ Real-time Antiphishing Web Protection - detects and alerts you in real-time if a web site is phished (set up to steal personal information). This option controls the BitDefender antiphishing protection in the current web browser only.
BitDefender Internet Security 2010 You can add the sites that you fully trust to the White List, so that they will not be scanned by the antiphishing engines anymore. To add a site to the White List, provide its address in the corresponding field and click Add. ⚫ Report as Phishing - informs the BitDefender Lab that you consider the respective web site to be used for phishing. By reporting phished web sites you help protect other people against identity theft. ⚫ Help - opens the help file.
BitDefender Internet Security 2010 31. Integration into Instant Messenger Programs BitDefender offers encryption capabilities to protect your confidential documents and your instant messaging conversations through Yahoo Messenger and MSN Messenger. By default, BitDefender encrypts all your instant messaging chat sessions provided that: ⚫ Your chat partner has a BitDefender version installed that supports IM Encryption and IM Encryption is enabled for the instant messaging application used for chatting.
BitDefender Internet Security 2010 32. Integration into Mail Clients BitDefender Internet Security 2010 includes an Antispam module. Antispam verifies the e-mail messages you receive and identifies those that are spam. The spam messages detected by BitDefender are marked with the [SPAM] prefix in the subject line. Note Antispam protection is provided for all POP3/SMTP e-mail clients.
BitDefender Internet Security 2010 32.1.1. Step 1/6 - Welcome Window Welcome Window Click Next.
BitDefender Internet Security 2010 32.1.2. Step 2/6 - Fill in the Friends List Fill in the Friends List Here you can see all the addresses from your Address Book. Please select those you want to be added to your Friends list (we recommend to select them all). You will receive all the e-mail messages from these addresses, regardless of their content. To add all your contacts to the Friends list, check Select all. If you want to skip this configuration step, select Skip this step. Click Next to continue.
BitDefender Internet Security 2010 32.1.3. Step 3/6 - Delete Bayesian Database Delete Bayesian Database You may find that your antispam filter has begun to lose efficiency. This may be due to improper training. (i.e. you have mistakenly tagged a number of legitimate messages as spam, or vice versa). If your filter is very inaccurate, you may need to wipe the filter database and retrain the filter by following the next steps of this wizard.
BitDefender Internet Security 2010 32.1.4. Step 4/6 - Train Bayesian Filter with Legitimate Mail Train Bayesian Filter with Legitimate Mail Please select a folder that contains legitimate e-mail messages. These messages will be used to train the antispam filter. There are two advanced options under the directory list: ⚫ Include all subfolders - to include the subfolders to your selection. ⚫ Automatically add to Friends list - to add the senders to the Friends list.
BitDefender Internet Security 2010 32.1.5. Step 5/6 - Train Bayesian Filter with Spam Train Bayesian Filter with Spam Please select a folder that contains spam e-mail messages. These messages will be used to train the antispam filter. Important Please make sure that the folder you choose contains no legitimate e-mail at all, otherwise the antispam performance will be considerably reduced.
BitDefender Internet Security 2010 32.1.6. Step 6/6 - Summary Summary Here you can view all the settings for the configuration wizard. You can make any changes, by returning to the previous steps (click Back). If you do not want to make any modifications, click Finish to end the wizard. 32.2. Antispam Toolbar In the upper area of your mail client window you can see the Antispam toolbar. The Antispam toolbar helps you manage antispam protection directly from your mail client.
BitDefender Internet Security 2010 Antispam Toolbar Each button from the BitDefender toolbar will be explained below: ⚫ Is Spam - sends a message to the Bayesian module indicating that the selected e-mail is spam. The e-mail will be tagged as SPAM and moved to the Spam folder. The future e-mail messages that fit the same patterns will be tagged as SPAM. Note You can select one e-mail or as many e-mail messages as you want.
BitDefender Internet Security 2010 Select Don't show this message again if you don't want to be prompted for confirmation when you add a spammer's address to the list. Click OK to close the window. Add Spammer The future e-mail messages from that address will be tagged as SPAM. Note You can select one sender or as many senders as you want. ⚫ Add Friend - adds the sender of the selected e-mail to the Friends list.
BitDefender Internet Security 2010 Note Any e-mail message received from an address contained in the Spammers list will be automatically marked as SPAM, without further processing. Spammers List Here you can add or remove entries from the Spammers list. If you want to add an e-mail address check the Email address option, type in the address and click the button. The address will appear in the Spammers list. Important Syntax: name@domain.com.
BitDefender Internet Security 2010 Warning Do not add domains of legitimate web-based e-mail services (such as Yahoo, Gmail, Hotmail or other) to the Spammers list. Otherwise, the e-mail messages received from any registered user of such a service will be detected as spam. If, for example, you add yahoo.com to the Spammers list, all e-mail messages coming from yahoo.com addresses will be marked as [spam].
BitDefender Internet Security 2010 Friends List Here you can add or remove entries from the Friends list. If you want to add an e-mail address check the Email address option, type in the address and click the button. The address will appear in the Friends list. Important Syntax: name@domain.com. If you want to add a domain check the Domain name option, type in the domain and click the button. The domain will appear in the Friends list. Important Syntax: ▸ @domain.com, *domain.com and domain.
BitDefender Internet Security 2010 For Microsoft Outlook Express / Windows Mail a new window will appear from where you can select the folder that contains the e-mail addresses you want to add to the Friends list. Choose them and click Select. In both cases the e-mail addresses will appear in the import list. Select the desired ones and click to add them to the Friends list. If you click all the e-mail addresses will be added to the list.
BitDefender Internet Security 2010 The following options are available: ▸ Move message to Deleted Items - moves the spam messages to the Deleted Items (only for Microsoft Outlook Express / Windows Mail); ▸ Mark message as 'read' - marks all the spam messages as read so as not to be disturbing when new spam messages arrive. If your antispam filter is very inaccurate, you may need to wipe the filter database and retrain the Bayesian filter. Click Wipe antispam database to reset the Bayesian database.
BitDefender Internet Security 2010 How To 293
BitDefender Internet Security 2010 33. How to Scan Files and Folders Scanning is easy and flexible with BitDefender. There are 4 ways to set BitDefender to scan files and folders for viruses and other malware: ⚫ Using Windows Contextual Menu ⚫ Using Scan Tasks ⚫ Using BitDefender Manual Scan ⚫ Using Scan Activity Bar Once you initiate a scan, the Antivirus Scan wizard will appear and guide you through the process. For detailed information about this wizard, please refer to “Antivirus Scan Wizard” (p. 52).
BitDefender Internet Security 2010 Running Scan Tasks in Intermediate Mode In Intermediate Mode, you can run a number of pre-configured scan tasks. You can also configure and run custom scan tasks to scan specific locations on your computer using custom scanning options. Follow these steps to run a scan task in Intermediate Mode: 1. Click the Security tab. 2. On the left-side Quick Tasks area, click System Scan to start a standard scan of the entire computer.
BitDefender Internet Security 2010 2. Click the Virus Scan tab. Here you can find a number of default scan tasks and you can create your own scan tasks. These are the default scan tasks that you can use: Default Task Description Deep System Scan Scans the entire system. In the default configuration, it scans for all types of malware threatening your system's security, such as viruses, spyware, adware, rootkits and others. System Scan Scans the entire system, except for archives.
BitDefender Internet Security 2010 5. Click Continue to start the scan. 6. Follow the Antivirus Scan wizard to complete the scan. What is Safe Mode? Safe Mode is a special way to start Windows, used mainly to troubleshoot problems affecting normal operation of Windows. Such problems range from conflicting drivers to viruses preventing Windows from starting normally. In Safe Mode, Windows loads only a minimum of operating system components and basic drivers. Only a few applications work in Safe Mode.
BitDefender Internet Security 2010 34. How to Schedule Computer Scan Scanning your computer periodically is a best practice to keep your computer free from malware. BitDefender allows you to schedule scan tasks so that you can automatically scan your computer. To schedule BitDefender to scan your computer, follow these steps: 1. Open BitDefender and switch the user interface to Expert Mode. 2. Click Antivirus on the left-side menu. 3. Click the Virus Scan tab.
BitDefender Internet Security 2010 4. Right-click the desired scan task and select Schedule. A new window will appear. 5. Schedule the task to run as needed: ⚫ To run the scan task one-time only, select Once and specify the start date and time. ⚫ To run the scan task after the system startup, select On system startup. You can specify how long after the startup the task should start running (in minutes).
BitDefender Internet Security 2010 Troubleshooting and Getting Help 300
BitDefender Internet Security 2010 35. Troubleshooting This chapter presents some problems you may encounter when using BitDefender and provides you with possible solutions to these problems. Most of these problems can be solved through the appropriate configuration of the product settings. If you cannot find your problem here, or if the presented solutions do not solve it, you can contact the BitDefender technical support representatives as presented in chapter “Support” (p. 316). 35.1.
BitDefender Internet Security 2010 Error Description&Solution 2. Run the uninstall tool using administrator privileges. 3. Restart your computer. 4. Start the setup wizard again to install BitDefender. The BitDefender product is You are trying to install BitDefender on an unsupported not compatible with your operating system. Please check the “System operating system. Requirements” (p. 2) to find out the operating systems you can install BitDefender on.
BitDefender Internet Security 2010 1. Clean up the system after the failed installation. If the installation fails, some BitDefender registry keys and files may remain in your system. Such remainders may prevent a new installation of BitDefender. They may also affect system performance and stability. This is why you must remove them before you try to install the product again. If the error screen provides a button to run an uninstall tool, click that button to clean up the system.
BitDefender Internet Security 2010 ⚫ temporary communication errors between the BitDefender services. ⚫ some of the BitDefender services are stopped. ⚫ other security solutions running on your computer at the same time with BitDefender. ⚫ viruses on your system affect the normal operation of BitDefender. To troubleshoot this error, try these solutions: 1. Wait a few moments and see if anything changes. The error may be temporary. 2. Restart the computer and wait a few moments until BitDefender is loaded.
BitDefender Internet Security 2010 Unsecured Wi-Fi networks present a great security risk because your computer is connected to unknown computers. Without the proper protection provided by a firewall, anyone connected to the network can access your shares and even break into your computer. When connected to an unsecured Wi-Fi network, BitDefender automatically blocks communication with the computers in this network.
BitDefender Internet Security 2010 ▸ If the Windows Firewall is used, it can be configured to allow file and printer sharing as follows: open the Windows Firewall settings window, Exceptions tab and select the File and Printer Sharing check box. ▸ If another firewall program is used, please refer to its documentation or help file. ⚫ General conditions that may prevent using or connecting to the shared printer: ▸ You may need to log on to a Windows administrator account to access the shared printer.
BitDefender Internet Security 2010 5. Depending on the level of security you want to obtain, choose one of the following options: ⚫ Unsafe - to access the files and printers shared in the Wi-Fi network, without allowing access to your shares. ⚫ Safe - to allow file and printer sharing both ways. This means that the users connected to the Wi-Fi network can also access your shared files or printer.
BitDefender Internet Security 2010 If you suspect the problem is with the BitDefender firewall, you can contact BitDefender for support as described in section “Support” (p. 316). 35.4. Antispam Filter Does Not Work Properly This article helps you troubleshoot the following problems concerning the BitDefender Antispam filtering operation: ⚫ A number of legitimate e-mail messages are marked as [spam]. ⚫ Many spam messages are not marked accordingly by the antispam filter.
BitDefender Internet Security 2010 Note BitDefender integrates into the most commonly used mail clients through an easy-to-use antispam toolbar. For a complete list of supported mail clients, please refer to “Supported Software” (p. 2). If you are using a different mail client, you cannot indicate detection errors and train the Learning Engine. To solve the problem, try decreasing the antispam protection level.
BitDefender Internet Security 2010 4. Click the Add Friend button on the BitDefender antispam toolbar to add the sender to the Friends list. You may need to click OK to acknowledge. You will always receive e-mail messages from this address no matter what they contain. 5. Click the Not Spam button on the BitDefender antispam toolbar (normally located in the upper part of the mail client window). This indicates to the Learning Engine that the selected message is not spam.
BitDefender Internet Security 2010 8. Click Finish to start the training process. 9. When training is completed, click Close. Ask for Help If this information was not helpful, you can contact BitDefender for support as described in section “Support” (p. 316). 35.4.2. Many Spam Messages Are Not Detected If you are receiving many spam messages that are not marked as [spam], you must configure the BitDefender antispam filter so as to improve its efficiency.
BitDefender Internet Security 2010 2. Go to the Inbox folder. 3. Select the undetected spam messages. 4. Click the Is Spam button on the BitDefender antispam toolbar (normally located in the upper part of the mail client window). This indicates to the Learning Engine that the selected messages are spam. They are immediately marked as [spam] and moved to the junk mail folder. The next e-mail messages that fit the same patterns will be marked as [spam].
BitDefender Internet Security 2010 Retrain Learning Engine (Bayesian) Before training the Learning Engine (Bayesian), prepare a folder containing only SPAM messages and another one containing only legitimate messages. The Learning Engine will analyze them and learn the characteristics that define the spam or legitimate messages that you usually receive. In order for the training to be efficient, there must be over 50 messages in each folder.
BitDefender Internet Security 2010 Note POP3 is one of the most widely used protocols for downloading e-mail messages from a mail server. If you do not know the protocol that your e-mail client uses to download e-mail messages, ask the person who configured your e-mail client. ⚫ BitDefender Internet Security 2010 doesn't scan Lotus Notes POP3 traffic. You should also verify the following possible causes: 1. Make sure Antispam is enabled. a. Open BitDefender. b.
BitDefender Internet Security 2010 2. Run the uninstall tool using administrator privileges. The uninstall tool will remove all the files and registry keys that were not removed during the automatic removal process. 3. Restart your computer. If this information was not helpful, you can contact BitDefender for support as described in section “Support” (p. 316).
BitDefender Internet Security 2010 36. Support As a valued provider, BitDefender strives to provide its customers with an unparalleled level of fast and accurate support. The BitDefender Knowledge Base provides you with articles that contain solutions to most of your problems and questions related to BitDefender. If you cannot find the solution in the Knowledge Base, you can contact the BitDefender Customer Care.
BitDefender Internet Security 2010 36.3. Contact Information Efficient communication is the key to a successful business. During the past 10 years BITDEFENDER has established an unquestionable reputation by constantly striving for better communication so as to exceed the expectations of our clients and partners. Should you have any questions, do not hesitate to contact us. 36.3.1. Web Addresses Sales department: sales@bitdefender.com Technical support: www.bitdefender.
BitDefender Internet Security 2010 Deutschland Office: +49 2301 91 84 222 Sales: vertrieb@bitdefender.de Technical support: http://kb.bitdefender.de Web: http://www.bitdefender.de UK and Ireland Business Centre 10 Queen Street Newcastle, Staffordshire ST5 1ED E-mail: info@bitdefender.co.uk Phone: +44 (0) 8451-305096 Sales: sales@bitdefender.co.uk Technical support: http://www.bitdefender.com/help Web: http://www.bitdefender.co.
BitDefender Internet Security 2010 BitDefender Rescue CD 319
BitDefender Internet Security 2010 37. Overview BitDefender Internet Security 2010 comes with a bootable CD (BitDefender Rescue CD) capable to scan and disinfect all existing hard drives before your operating system starts. You should use BitDefender Rescue CD any time your operating system is not working properly because of virus infections. That usually happens when you don't use an antivirus product.
BitDefender Internet Security 2010 37.2. Included Software BitDefender Rescue CD includes the following software packages. Xedit This is a text file editor. Vim This is a powerful text file editor, containing syntax highlighting, a GUI, and much more. For more information, please refer to the Vim homepage. Xcalc This is a calculator. RoxFiler RoxFiler is a fast and powerful graphical file manager. For more information, please refer to the RoxFiler homepage.
BitDefender Internet Security 2010 For more information, please refer to the Nessus homepage. Iptraf Iptraf is an IP Network Monitoring Software. For more information, please refer to the Iptraf homepage. Iftop Iftop displays bandwidth usage on an interface. For more information, please refer to the Iftop homepage. MTR MTR is a network diagnostic tool. For more information, please refer to the MTR homepage. PPPStatus PPPStatus displays statistics about the incoming and outgoing TCP/IP traffic.
BitDefender Internet Security 2010 38. BitDefender Rescue CD Howto This chapter contains information on how to start and stop the BitDefender Rescue CD, scan your computer for malware as well as save data from your compromised Windows PC to a removable device. However, by using the software applications that come with the CD, you can do many tasks the description of which goes far beyond the scope of this user's guide. 38.1.
BitDefender Internet Security 2010 The Desktop 38.2. Stop BitDefender Rescue CD You can safely shut down your computer by selecting Exit from the BitDefender Rescue CD contextual menu (right-click to open it) or by issuing the halt command in a terminal. Choose "EXIT" When BitDefender Rescue CD has successfully closed all programs it will show a screen like the following image. You may remove the CD in order to boot from your hard drive. Now it's ok to turn off your computer or to reboot it.
BitDefender Internet Security 2010 Wait for this message when shutting down 38.3. How do I perform an antivirus scan? A wizard will appear when the boot process has finished and allow you to full scan your computer. All you have to do is click the Start button. Note If your screen resolution isn't high enough, you will be asked to start scanning in text-mode. Follow the three-step guided procedure to complete the scanning process. 1.
BitDefender Internet Security 2010 1. Double click the START SCANNER icon on the Desktop. This will launch the BitDefender Scanner for Unices. 2. Click Scanner, a new window will appear. 3. Select the directory you wish to scan and click Open to start scanning using the same wizard that appeared when you first booted. ⚫ Use the contextual menu - browse your folders, right-click a file or directory and select Send to. Then choose BitDefender Scanner.
BitDefender Internet Security 2010 Connection Description netcardconfig Select this type of connection when you are using a local area network (LAN) to access the Internet. It is also suitable for wireless connections. gprsconnect Select this type of connection when you are accessing the Internet over a mobile phone network by using GPRS (General Packet Radio Service) protocol. Of course you can use also a GPRS modem instead of a mobile phone.
BitDefender Internet Security 2010 Update Signatures 2. Do one of the following: ▸ Select Cumulative to install signatures already saved on your hard disk by browsing your computer and loading the cumulative.zip file. ▸ Select Update to immediately connect to the internet and download the latest virus signatures. 3. Click OK. 38.5.1.
BitDefender Internet Security 2010 6. Press F2 to save the current file, confirm saving, and then press F10 to close it. 7. Type the command: bdscan update. 38.6. How do I save my data? Let's assume that you cannot start your Windows PC due to some unknown issues. At the same time, you desperately need to access some important data from your computer. This is where BitDefender Rescue CD comes in handy.
BitDefender Internet Security 2010 Desktop Screen 3. Double-click the partition where the data you want to save is located (e.g. [sda3]). Note When working with BitDefender Rescue CD, you will deal with Linux-type partition names. So, [sda1] will probably correspond to the (C:) Windows-type partition, [sda3] to (F:), and [sdb1] to the memory stick. Important If the computer was not properly shut down, it is possible that certain partitions were not mounted automatically.
BitDefender Internet Security 2010 Saving Data 6. Type /media/sdb1/ into the corresponding textbox and click Copy. Please be aware that depending on your computer configuration it might be sda1 instead of sdb1. 38.7. How do I use console mode? If your screen resolution is not high enough to run the graphical user interface, you can run the BitDefender Rescue CD in console mode. The simple text mode allows you to perform a complete scan of your computer.
BitDefender Internet Security 2010 Glossary ActiveX ActiveX is a model for writing programs so that other programs and the operating system can call them. ActiveX technology is used with Microsoft Internet Explorer to make interactive Web pages that look and behave like computer programs, rather than static pages. With ActiveX, users can ask or answer questions, use push buttons, and interact in other ways with the Web page. ActiveX controls are often written using Visual Basic.
BitDefender Internet Security 2010 Internet Explorer. Both of these are graphical browsers, which means that they can display graphics as well as text. In addition, most modern browsers can present multimedia information, including sound and video, though they require plug-ins for some formats. Command line In a command line interface, the user types commands in the space provided directly on the screen using command language.
BitDefender Internet Security 2010 Filename extension The portion of a filename, following the final point, which indicates the kind of data stored in the file. Many operating systems use filename extensions, e.g. Unix, VMS, and MS-DOS. They are usually from one to three letters (some sad old OSes support no more than three). Examples include "c" for C source code, "ps" for PostScript, "txt" for arbitrary text. Heuristic A rule-based method of identifying new viruses.
BitDefender Internet Security 2010 exists on tapes or disks. Every computer comes with a certain amount of physical memory, usually referred to as main memory or RAM. Non-heuristic This method of scanning relies on specific virus signatures. The advantage of the non-heuristic scan is that it is not fooled by what might seem to be a virus, and does not generate false alarms. Packed programs A file in a compression format.
BitDefender Internet Security 2010 Report file A file that lists actions that have occurred. BitDefender maintains a report file listing the path scanned, the folders, the number of archives and files scanned, how many infected and suspicious files were found. Rootkit A rootkit is a set of software tools which offer administrator-level access to a system.
BitDefender Internet Security 2010 sends information back to the spyware's home base via the user's Internet connection. Because spyware is using memory and system resources, the applications running in the background can lead to system crashes or general system instability. Startup items Any files placed in this folder will open when the computer starts.
BitDefender Internet Security 2010 itself over and over again is relatively easy to produce. Even such a simple virus is dangerous because it will quickly use all available memory and bring the system to a halt. An even more dangerous type of virus is one capable of transmitting itself across networks and bypassing security systems. Virus definition The binary pattern of a virus, used by the antivirus program to detect and eliminate the virus.