User's GuideCopyright© 2010 BitDefender
43. Contact Information ... . . ... . ... . ... . ... . ... . ... . ... 24043.1. Web Addresses . . . . . . . . . . . . . . . . . . . .
1. Welcome Window2. Add Contacts to Friends ListHere you can see all the addresses from your Address Book. Please select thoseyou want to be added to
There are two advanced options under the directory list:● Include all subfolders - to include the subfolders to your selection.● Automatically add to
●Spammers - opens the Spammers list that contains all the e-mail addressesfrom which you don't want to receive messages, regardless of their cont
3. Select the undetected spam messages.4. Click the Is Spam button on the BitDefender antispam toolbar (normally locatedin the upper part of the mail
18.3.5. Configuring General SettingsTo configure general antispam settings for your mail client, click the Settingsbutton on the BitDefender antispam
18.5. Configuring the Friends ListThe Friends list is a list of all the e-mail addresses from which you always want toreceive messages, regardless of
18.6. Configuring the Spammers ListThe Spammers list is a list of all the e-mail addresses from which you don't wantto receive messages, regardle
To load a previously saved Spammers list, click the Load button and open thecorresponding .bwl file. To reset the content of the existing list when lo
To apply the default settings, click Default.Antispam98BitDefender Total Security 2011
19. Parental ControlBitDefender Parental Control enables you to control the access to the Internet andto specific applications for each user holding a
Installation and Removal1BitDefender Total Security 2011
3. Depending on the user interface view mode, access the Parental Control settingsas follows:Intermediate ViewGo to the Security tab and click Parenta
● Save an internet traffic log. Logs the websites visited by users for whomParental Control is enabled.For more information, please refer to “Monitori
19.1.2. Web ControlThe Web Control helps you to block access to web sites with inappropriate content.A list of candidates for blocking both sites and
To edit a rule, select it and click Edit or double-click it. Make the necessary changesin the configuration window.Restricting Internet Access By Time
● Block permanently to block access to the application completely.● Block based on this schedule to restrict access to certain time intervals.If you c
2. Type the word or phrase you want to block in the edit field. If you want only wholewords to be detected, select the Match whole words check box.3.
3. Select Scanning OptionsSelect the type of traffic you want BitDefender to scan.● Scan Web (HTTP traffic) - scans the HTTP (web) traffic and blocks
In this case, you must specify the IM IDs your child is explicitly allowed toinstant message with. For example, you can allow instant messaging withfa
3. Click Parental Control on the left-side menu.NoteYou can also open these logs from the Parental Control window by clicking ViewLogs.If you do not s
Expert ViewClick Parental Control on the left-side menu.NoteIn Basic View and Intermediate View, you can configure a shortcut so that you canaccess th
1. System RequirementsYou may install BitDefender Total Security 2011 only on computers running thefollowing operating systems:● Windows XP with Servi
Click Test Settings to validate the settings. If any issues are found duringvalidation, you will be informed what you have to do to correct them.Click
4. Use the switch to turn on Remote Parental Control. Remote Parental Control willbe enabled for all user accounts on the system.19.3.3. Accessing Rem
● which are the most contacted and the most blocked instant messaging IDs.You can directly block a website, an application or an instant messaging ID
Blocking WebsitesTo block a website:1. Click Block another Website.2. Enter the website in the corresponding field. Alternatively, if you want to bloc
20. Privacy ControlBitDefender monitors dozens of potential “hotspots” in your system where spywaremight act, and also checks any changes made to your
Use the description on the right side of the scale to choose the protection levelthat better fits your security needs.● You can customize the protecti
● Identity Control is very effective in blocking keylogger spyware. This type ofmalicious applications records your keystrokes and sends them over the
5. If needed, define specific exclusions from the rules you have created. For example,if you have created a rule to protect your credit card number, a
● All users - the rule will apply to all Windows accounts.4. Describe RuleEnter a short description of the rule in the edit field. Since the blocked d
To edit a rule select it and click the Edit button or double-click it. A new windowwill appear. Here you can change the name, description and paramete
● Microsoft Windows Live Messenger 8Instant Messaging (IM) encryption is provided only for:● Yahoo! Messenger 8.1● Microsoft Windows Live Messenger 8A
This is where Cookie Control helps. When enabled, Cookie Control will prompt youfor permission whenever a new web site tries to set or request a cooki
DescriptionTypeThe rule applies in both directions.BothNoteYou can accept cookies but never return them by setting the action to Deny and thedirection
Creating Rules ManuallyTo manually create a rule, click the Add button and configure the rule parametersin the configuration window. You can set the p
21. FirewallThe Firewall protects your computer from inbound and outbound unauthorizedconnection attempts. It is quite similar to a guard at your gate
you specify is applied every time the respective application requests network/Internetaccess.NoteTo view the BitDefender white list, click the corresp
● Show Wi-Fi Notifications - if you are connected to a wireless network, displaysinformative windows regarding specific network events (for example, w
● Protocol - the IP protocol the rule applies to. You may see one of the following:DescriptionProtocolIncludes all IP protocols.AnyTransmission Contro
on the application and the BitDefender firewall settings, this is done with or withoutyour intervention.If you are using Basic View or Intermediate Vi
1. Click the Edit rule button or double-click the rule. The configuration window willappear.2. Configure the main and the advanced parameters as neede
DescriptionEventState in which an application monitors the network awaiting toestablish a connection or to receive information from a peerapplication.
2. Preparing for InstallationBefore you install BitDefender Total Security 2011, complete these preparations toensure the installation will go smoothl
● Remote Address. Specify the remote IP address and port the rule applies to asfollows:▶ To filter traffic between your computer and a specific comput
To delete a rule, select it and click the Remove rule button. You can select anddelete several rules at once.If you want to delete all the rules creat
Traffic going through VPN connections is filtered differently than traffic goingthrough other network connections. If the connection is a VPN, click t
3. Click OK.21.4. DevicesTo manage devices connected to the network, open BitDefender and, dependingon the user interface view mode, proceed as follow
The window presents the current network / Internet activity in real-time. Asconnections or ports are closed, you can see that the corresponding statis
22. VulnerabilityAn important step in protecting your computer against malicious persons andapplications is to keep up to date the operating system an
This is where you can view the operation result.22.2. StatusTo see the current vulnerability status and enable/disable automatic vulnerabilityscanning
● Media AutorunNoteIf you clear the check box corresponding to a specific vulnerability, BitDefenderwill no longer notify you about the related issues
23. BackupBitDefender comes with a Backup module that helps you make reserve copies ofany valuable data on your system. You can backup your data on yo
If you decide to back your data up on your computer, your USB drive or on anetwork location, click Choose location and select where to save the data t
3. Installing BitDefenderYou can install BitDefender from the BitDefender installation CD or using theinstallation file downloaded on your computer fr
23.2. Restoring Locally Backed-Up DataThe Local Restore Wizard helps you restore data that you backed up on a localstorage medium. At the end of this
Click Restore if you are satisfied with your settings. Wait for BitDefender torestore the selected data and then click Finish.23.3. Backup SettingsIf
To backup your chat records only, click the Backup My Chat Records button andfollow the three step procedure.NoteThe three step procedure is described
Default job name is automatically generated when files or directories are selectedto be backed up, but it can be modified.3. Click Browse to choose wh
Compression, High Intensity Compression. For example, to start standardcompression at a medium compression rate and speed, follow these steps:1. Click
5. Or click Restart computer when backup finishes.6. Or click Logoff the current user when backup finishes.7. Click OK.NoteIf you want the configurati
Filters can be modified by following these steps:1. Click File Filter.2. Click the filter you wish to modify and click Edit.3. Modify your options in
2. Select Fastest, Medium or Lowest speed.3. Click OK.Data VerificationTo make sure your backup data is always safe, follow these steps.1. Click Data
It is also possible to configure multiple schedules for a task by clicking Showmultiple schedules. By clicking Advanced you can set additional schedul
Modify Job OptionsTo modify job options, select the job and then click Modify Job Options in the JobManagement section.The selected job can be either
Quick ScanA quick scan of critical areas on your system is performed to ensure no activemalware is residing on it.The scan shouldn't take more th
To further refine the job schedule, click the Settings tab. Three sub-optionsare available.● Scheduled Task Completed▶ Delete the task if it is not sc
3. Click Browse to select the command files to execute.4. Or click Shut down computer when backup finishes.5. Or click Restart computer when backup fi
To include or exclude directories irrespective of their location, click Appliedto all directories.5. Click OK.Filters can be modified by following the
When you select an item in the left side window, its content will be displayed inthe right side window to help you refine your selection.2. In the Sel
NoteDo not forget to click Restore to begin or Cancel to stop.To refine your settings, click Options.Restore Options Dialog BoxThe restore options all
● Click View in the Menu Bar and select Log Viewer.● Use a shortcut by pressing CTRL+Alt+L.View LogsThe log viewing option allows tracing back your op
Automatically ClearWhen BitDefender Backup starts, it compares the existing log size to the defaultlog size. BitDefender Backup will automatically cle
23.3.4. ToolboxThis section shows how to use BitDefender Backup to burn data to a CD/DVD or toburn an ISO Image file. It covers subjects such as burni
Manage My BurnerThis helps you manage and view the recording device and media on the currentsystem. It contains the following links:● Eject Device Eje
● Clear All: Clears the content of the selected job report.● Refresh: Refreshes the content of the selected job report.View● Get Started: If the get s
● I purchased BitDefender Total Security 2011 on a CD or onlineIn this case, you need to register the product:1. Type the license key in the edit fiel
24. Chat EncryptionThe contents of your instant messages should remain between you and your chatpartner. By encrypting your conversations, you can mak
▶ Your contact does not have installed a BitDefender version that supports IMencryption.24.1. Disabling Encryption for Specific UsersTo disable encryp
25. File EncryptionBitDefender File Encryption enables you to create encrypted, password-protectedlogical drives (or vaults) on your computer where yo
Expert ViewGo to Encryption > File Encryption in Expert View and do one of the following:● Click Create vault.● Right-click in the vaults table and
NoteIf a previously created vault does not appear in the table, click Search vaultand browse to its location first.A new window will appear.3. Choose
BitDefender will immediately inform you about the result of the operation. If an errorhas occurred, use the error message to troubleshoot the error. C
3. Create File VaultIf you have chosen to create a new vault, this is where you specify thenecessary information about it. For more information, pleas
This is where you can review chosen operations.5. FinishThis is where you can view the operation result.Expert ViewGo to Encryption > File Encrypti
2. If the vault is locked, you must first open it (right-click it and select Openvault).3. The table at the bottom displays the content of the selecte
content. Only users who know the password can open the vault and access thedocuments and data stored inside it.To create a vault, follow these steps:1
▶ Username - type in your e-mail address.▶ Password - type in a password for your BitDefender account. The passwordmust be between 6 and 16 characters
3. Choose a drive letter from the menu.4. Type the vault password in the Password field.5. Click Open.BitDefender will immediately inform you about th
● If several vaults are open, you will be prompted to choose the vault to copy theitem to. Select from the menu the drive letter corresponding to the
5. Click OK to change the password.BitDefender will immediately inform you about the result of the operation. If an errorhas occurred, use the error m
26. Tune-UpBitDefender comes with a Tune-Up module that helps you maintain the integrity ofyour system. The maintenance tools offered are critical for
Follow the five-step guided procedure to perform the defragmentation.1. Choose disks to analyzeSelect the partitions you want to check for fragmentati
NoteYou can also add a shortcut to My Tools.Follow the three-step guided procedure to perform the clean-up. You can navigatethrough the wizard using t
26.4. Cleaning Windows RegistryMany applications write keys in the Windows Registry at installation time. Whenremoving such applications, some of thei
DescriptionCategoryassociations (to ensure that the correct programopens when you open a file using WindowsExplorer). For example, such a registry key
Intermediate ViewGo to the Tune-Up tab and click Registry Recovery in the Quick Tasks areaon the left side of the window.Expert ViewGo to Tune-Up and
2. Search for DuplicatesWait for BitDefender to finish searching for duplicates.3. Mark files for deletionIdentical files are listed in groups. You ca
3. Optionally, BitDefender can inform you about special offers and promotionsusing the e-mail address of your account. Click View Contact Options ands
System configuration is evaluated by using a system rating based on the amountof installed RAM memory, CPU frequency, and the hard disk's free sp
27. Game / Laptop ModeThe Game / Laptop Mode module allows you to configure the special operationmodes of BitDefender:● Game Mode temporarily modifies
At the top of the section, you can see the status of the Game Mode. You can clickGame Mode is enabled or Game Mode is turned off to change the current
27.1.3. Adding or Editing GamesWhen you add or edit an entry from the game list, a new window will appear.Click Browse to select the application or ty
27.1.5. Changing Game Mode HotkeyYou can manually enter Game Mode using the default Ctrl+Alt+Shift+G hotkey.If you want to change the hotkey, follow t
● Enable this module to modify Antivirus scan tasks schedules - to preventscheduled scan tasks from running while in Laptop Mode. You can choose one o
1. Open BitDefender, click Options in the upper-right corner of the window andchoose Expert View.2. Go to Game/Laptop Mode > Silent Mode.At the top
28. Home NetworkThe Network module allows you to manage the BitDefender products installed onyour home computers from a single computer. To access the
28.2. Adding Computers to the BitDefender NetworkAny computer will be automatically added to the network if it meets the followingcriteria:● the BitDe
If you click a computer name in the network map, you can see all the administrativetasks you can run on the remote computer.● Register BitDefender on
BitDefender Total Security 2011User's GuidePublished 2010.07.30Copyright© 2010 BitDefenderLegal NoticeAll rights reserved. No part of this book m
NoteNo personal identifiable information will be shared if this feature is enabled.Click Next to continue.Choose User InterfaceSelect the user interfa
● Scan All - allows you to scan all managed computers at the same time.● Update All allows you to update all managed computers at the same time.● Regi
29. UpdateNew malware is found and identified every day. This is why it is very important tokeep BitDefender up to date with the latest malware signat
Expert ViewGo to Update > Update.The Update module will connect to the BitDefender update server and will verifyif any update is available. If an u
For more reliable and faster updates, you can configure two update locations: aPrimary update location and an Alternate update location. By default, t
● Wait for reboot, instead of prompting - If an update requires a reboot, theproduct will keep working with the old files until the system is rebootin
How To195BitDefender Total Security 2011
30. How Do I Scan Files and Folders?Scanning is easy and flexible with BitDefender. There are several ways to setBitDefender to scan files and folders
Running Scan Tasks in Intermediate ViewIn Intermediate View, you can run a number of pre-configured scan tasks. You canalso configure and run custom s
31. How Do I Create a Custom Scan Task?To create a scan task, open BitDefender and depending on the user interface viewmode, proceed as follows:Interm
32. How Do I Schedule a Computer Scan?Scanning your computer periodically is a best practice to keep your computer freefrom malware. BitDefender allow
In this area, you can enable or disable product settings that cover various aspectsof computer and data security.DescriptionSettingReal-time protectio
If none of these scan tasks suit your needs, you can create a new scan task, whichyou can then schedule to run as needed.4. Right-click the desired sc
33. How Do I Back Up Data?With BitDefender Total Security 2011, you can make reserve copies of your valuabledata (documents, images etc) on various st
34. How Do I Restore Backed Up Data?You can easily recover lost data that you previously backed up with BitDefender.Before restoring any data, make su
35. How Do I Create Windows User Accounts?A Windows user account is a unique profile that includes all the settings, privilegesand personal files for
36. How Do I Update BitDefender Using a Proxy Server?Normally, BitDefender automatically detects and imports the proxy settings fromyour system. If yo
37. How Do I Upgrade to Another BitDefender 2011Product?With BitDefender 2011 you can easily upgrade from one BitDefender 2011 productto another.All y
38. How Can I Improve the Speed of My System?The system speed depends not only on the hardware configuration, such as theCPU load, memory usage and ha
39. How Do I Use File Vaults?The BitDefender File Vault enables you to create encrypted, password-protectedlogical drives (or vaults) on your computer
You can now perform operations on the drive that corresponds to the desired filevault using Windows Explorer, just as you would with a regular drive.
Troubleshooting and Getting Help209BitDefender Total Security 2011
● General SettingsIn this area, you can enable or disable settings that affect product behavior anduser experience.DescriptionSettingGame Mode tempora
40. TroubleshootingThis chapter presents some problems you may encounter when using BitDefenderand provides you with possible solutions to these probl
Description&SolutionError2. Run the uninstall tool using administrator privileges.3. Restart your computer.4. Start the setup wizard again to inst
1. Clean up the system after the failed installation. If the installation fails,some BitDefender registry keys and files may remain in your system. Su
same time. For more information, please refer to “Minimal System Requirements”(p. 2).● There are too many invalid registry keys left in your Windows R
40.4. I Can no Longer Use an ApplicationThis issue occurs when you are trying to use a program which was working normallybefore installing BitDefender
Intermediate ViewGo to the Security tab and click Configure Firewall in the Quick Tasks areaon the left side of the window. Select the Settings tab in
2. Identify ProblemClick Choose Printer. Select the printer from the list, either by name or by IPaddress. If you cannot find the device in the list,
40.7. I Cannot Share Files with Another ComputerDepending on the network you are connected to, the BitDefender firewall may blockthe connection betwee
3. Clear the Firewall is enabled check box to temporarily disable the firewall.4. Check if you can connect to the Internet with the BitDefender firewa
6. Select only Signatures updates and then click Ok.7. BitDefender will download and install only the malware signature updates.40.10. My Computer Is
Configure My ToolsNoteThis step appears only if you have set the BitDefender interface to Basic View orIntermediate View.With My Tools, you can person
1. Wait a few moments and see if anything changes. The error may be temporary.2. Restart the computer and wait a few moments until BitDefender is load
Engine analyzes the indicated messages and learns their patterns. The nexte-mail messages that fit the same patterns will not be marked as [spam].2. D
Indicate Detection ErrorsIf you are using a supported mail client, you can easily correct the antispam filter(by indicating which e-mail messages shou
2. On the BitDefender antispam toolbar, click the Wizard button to start theantispam configuration wizard.3. Click Next.4. Select Skip this step and c
If you are using a different mail client, you cannot indicate spam messages andtrain the Learning Engine. To solve the problem, try increasing the ant
6. Click OK to save the changes and close the window.Increase Antispam Protection LevelTo increase the antispam protection level, follow these steps:1
● The BitDefender Antispam protection is available only for e-mail clients configuredto receive e-mail messages via the POP3 protocol. This means the
If removal fails, some BitDefender registry keys and files may remain in your system.Such remainders may prevent a new installation of BitDefender. Th
41. Removing Malware from Your SystemMalware can affect your system in many different ways and the BitDefender approachdepends on the type of malware
1. Set up the BIOS of your computer to boot off the CD.2. Put the CD in the drive and reboot the computer.3. Wait until the BitDefender screen appears
Home Network ManagementNoteThis step appears only if you have added Home Network Management to My Tools.You can select one of three options:● Set up t
If the selected action could not be taken and the scan log reveals an infection whichcould not be deleted, you have to remove the file(s) manually:The
5. Delete the original archive in order to make sure the infection is totally removed.6. Recompress the files in a new archive using an archiving appl
This feature was designed to be used when Windows is running in Safe Mode.If your system is infected with a virus which cannot be removed in normal mo
41.7. How to Clean the Infected Files from System VolumeInformationThe System Volume Information folder is a zone on your hard drive created by theOpe
● For Windows 7:1. Click Start, right-click Computer and click Properties.2. Click System protection link in the left pane.3. In the System protection
41.11. Why Did BitDefender Automatically Delete an InfectedFile?If an infected file is detected, BitDefender will automatically attempt to disinfect i
42. SupportBitDefender strives to provide its customers with an unparalleled level of fast andaccurate support. If you experience any issue with or if
If your BitDefender product does not operate well, if it cannot remove specific virusesfrom your computer or if you have questions about the way it wo
42.2. Asking for HelpThe Troubleshooting and Getting Help section provides you with the necessaryinformation regarding the most frequent issues you ma
7. Please wait for a few minutes while BitDefender gathers product relatedinformation. This information will help our engineers find a solution to you
It is highly recommended to scan your system at least once a week. Select adifferent day and time if the default schedule is not suitable for you. If
43. Contact InformationEfficient communication is the key to a successful business. During the past 10years BITDEFENDER has established an unquestiona
U.S.ABitDefender, LLC6301 NW 5th Way, Suite 3500Fort Lauderdale, Florida 33309Phone (office&sales): 1-954-776-6262Sales: [email protected]
RomaniaBITDEFENDER SRLWest Gate Park, Building H2, 24 Preciziei StreetBucharestFax: +40 21 2641799Sales phone: +40 21 2063470Sales e-mail: sales@bitde
44. Useful InformationThis chapter presents some important procedures that you must be aware beforestarting to troubleshoot a technical issue.Troubles
operating system components. This is why most viruses are inactive when usingWindows in Safe Mode and they can be easily removed.To start Windows in S
4. Look under Use a proxy server for your LAN and you should see theAddress and Port of the proxy.● For Mozilla Firefox 3.6:1. Open Firefox.2. Select
1. Open BitDefender, click Options in the upper-right corner of the window andchoose Expert View.2. Go to Antivirus > Shield.3. Clear the Real-time
GlossaryActiveXActiveX is a model for writing programs so that other programs and the operatingsystem can call them. ActiveX technology is used with M
Internet Explorer. Both of these are graphical browsers, which means that theycan display graphics as well as text. In addition, most modern browsers
Filename extensionThe portion of a filename, following the final point, which indicates the kind ofdata stored in the file.Many operating systems use
4. Upgrading From an Older Version of BitDefenderYou can upgrade to BitDefender Total Security 2011 if you are using BitDefenderTotal Security 2011 be
exists on tapes or disks. Every computer comes with a certain amount of physicalmemory, usually referred to as main memory or RAM.Non-heuristicThis me
Report fileA file that lists actions that have occurred. BitDefender maintains a report filelisting the path scanned, the folders, the number of archi
sends information back to the spyware's home base via the user's Internetconnection. Because spyware is using memory and system resources, t
itself over and over again is relatively easy to produce. Even such a simplevirus is dangerous because it will quickly use all available memory and br
5. Repairing or Removing BitDefenderIf you want to repair or remove BitDefender Total Security 2011, follow the pathfrom the Windows start menu: Start
Getting Started18BitDefender Total Security 2011
6. OverviewOnce you have installed BitDefender Total Security 2011, your computer is protectedagainst all kinds of malware (such as viruses, spyware a
Each man has his price BobAnd yours was pretty lowBitDefender Total Security 2011
Tray Icon● Show - opens the main interface of BitDefender.● Help - opens the help file, which explains in detail howto configure and use BitDefender T
NoteThe Scan activity bar will notify you when real-time protection or the Firewall isdisabled by displaying a red cross over the corresponding area (
6.4. Automatic Device DetectionBitDefender automatically detects when you connect a removable storage deviceto your computer and offers to scan it bef
7. Main Application WindowBitDefender Total Security 2011 meets the needs of computer beginners and verytechnical people alike. Its graphical user int
Protect Your PC areaThis is where you can take the necessary actions to manage your protectionand maintain your computer.Help areaThis is where you ca
● My Tools allows you to create shortcuts to your favorite tasks and settings.To perform a task or configure settings, click the corresponding button
DescriptionLinkOpens a window where you can see current license keyinformation and register your product with a new license key.License InfoAllows you
7.2.2. SecurityThe Security tab allows you to manage the security of your computer and data.“Status Area” (p. 27)“Quick Tasks” (p. 27)Status AreaThe s
● Configure Firewall - opens a window where you can view and configure theFirewall settings. For more information, please refer to “Firewall” (p. 123)
● Registry Recovery can retrieve registry keys previously deleted from the WindowsRegistry using BitDefender Registry Cleaner.● File Shredder permanen
Table of ContentsInstallation and Removal ... 11. System Requirements ... . ... . . ... . ... . ...
● View File Vault - starts the wizard that allows you to view the content of yourfile vaults.● Lock File Vault - starts the wizard that allows you to
Privacy ControlAllows you to prevent data theft from your computer and protect your privacywhile you are online.FirewallAllows you to protect your com
DescriptionLinkAllows you to see a detailed history of all tasks performed byBitDefender on your system.View LogsHelps you purchase a license key for
8. My ToolsWhen using BitDefender in Basic View or Intermediate View, you can customizeyour dashboard by adding shortcuts to tasks and settings that a
DescriptionScan TaskStarts a wizard that lets you create a custom scantask.Custom ScanUse this task to scan important current user folders:My Document
DescriptionSettingsConfigure the Antivirus module. For moreinformation, please refer to “Antivirus Protection”(p. 60)Antivirus SettingsConfigure the F
9. Alerts and Pop-upsBitDefender uses pop-ups and alerts to inform you about its operation or specialevents that may interest you and to prompt you fo
If you are using the Basic View or Intermediate View interface, a pop-up will informyou whenever Active Virus Control blocks a potentially harmful app
5. On the Overview tab, configure the scanning options as needed. For moreinformation, please refer to “Configuring Scan Settings” (p. 74).6. On the D
● If you have typed the address of a legitimate website, check if the address iscorrect. If the address is incorrect, re-type it and go to the web pag
9.1. Antivirus Alerts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 369.2. Active Vi
9.7. Privacy Control AlertsPrivacy Control provides advanced users with some extra features to protect theirprivacy. You will be prompted for action t
For more information, please refer to “Script Control” (p. 121).9.7.3. Cookie AlertsIf you enable Cookie Control, you will be prompted for permission
10. Fixing IssuesBitDefender uses an issue tracking system to detect and inform you about the issuesthat may affect the security of your computer and
The issues that this wizard helps you fix can be grouped into these main categories:● Disabled security settings. Such issues are fixed immediately, b
11. Configuring Main SettingsYou can configure the main product settings (including reconfiguring the usageprofile) from the Preferences window. To op
Automatic UpdateAutomatic update ensures that the newest BitDefender product and signaturefiles are downloaded and installed automatically, on a regul
The status of some of these settings may be monitored by the BitDefender issuetracking system. If you disable a monitored setting, BitDefender will in
These pop-ups may be very useful in detecting intrusion attempts and protectingyourself against network threats.Quarantine AlertsQuarantine alerts inf
as your name or IP address, and that they will not be used for commercialpurposes.Outbreak DetectionBy enabling this option, reports regarding potenti
In this case, a password is required to protect the Parental Control settings.You can set it now or at a later time from the BitDefender window.● Skip
16.1. Configuring the Antiphishing White List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8316.2. Managing the BitDefender Antip
12. History and EventsThe View Logs link at the bottom of the BitDefender main window opens anotherwindow with the BitDefender history & events. T
13. Registration and My AccountRegistration is a two-step process:1. Product activation (registration of a BitDefender account). You mustcreate a BitD
2. Click Register Now.3. Click Finish.13.2. Activating BitDefenderTo activate BitDefender, you must create or sign in to a BitDefender account. If you
You do not have to retype the password if you selected not to mask thepassword while typing it.● Password hint - enter a word or phrase that will help
● Send me important messages● Do not send me any messages4. Click Submit.5. Click Finish to close the window.13.3. Buying or Renewing License KeysIf t
Configuration and Management55BitDefender Total Security 2011
14. General SettingsThe General module provides information on the BitDefender activity and the system.Here you can also change the overall behavior o
● Show the Scan Activity bar (on screen graph of product activity) - displaysthe Scan Activity bar whenever you log on to Windows. Clear this check bo
on to that account. If the proxy server requires a username and a password, youmust specify them in the corresponding fields.● Default Browser Proxy -
2. Go to General > System Info.The list contains all the items loaded when starting the system as well as the itemsloaded by different applications
21. Firewall . ... . ... . . ... . ... . ... . ... . ... . ... . ... . ... 12321.1. Protection Settings . . . . . . . . . . . . .
15. Antivirus ProtectionBitDefender protects your computer from all kinds of malware (viruses, Trojans,spyware, rootkits and so on). The protection Bi
protection levels. Or, if you are an advanced user, you can configure the scan settingsin detail by creating a custom protection level.To learn more,
15.1.2. Creating a Custom Protection LevelAdvanced users might want to take advantage of the scan settings BitDefenderoffers. The scanner can be set t
system. The malware can affect your system only if the infected file is extractedfrom the archive and executed without having real-time protection ena
ImportantFor particular types of malware, disinfection is not possible because the detectedfile is entirely malicious. In such cases, the infected fil
If you know and trust the detected application, click Allow.If you want to immediately close the application, click OK.Select the Remember this action
4. Go to the AVC tab.5. If you want to be prompted for action when Active Virus Control detects apotentially harmful application, select the Alert me
5. Select the corresponding check box to enable the Intrusion Detection System.6. Drag the slider along the scale to set the desired aggressiveness le
Expert ViewGo to Antivirus > Virus Scan. To run a system or user-defined scan task, clickthe corresponding Run Task button.These are the default ta
that autologon scanning may affect system performance for a short time afterstartup.15.2.2. Antivirus Scan WizardWhenever you initiate an on-demand sc
25.2.6. Change Vault Password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17126. Tune-Up . . ... . ... .
Step 2/3 - Select ActionsWhen the scanning is completed, a new window will appear, where you can see thescan results.If there are no unresolved threat
ImportantIf required, please restart your system in order to complete the cleaning process.Click Close to close the window.BitDefender Could Not Solve
To manage the existing scan tasks:1. Open BitDefender.2. Depending on the user interface view mode, proceed as follows:Intermediate ViewGo to the Secu
● User tasks - contains the user-defined tasks.A task called My Documents is provided. Use this task to scan important currentuser folders: My Documen
● Paths - opens the Properties window, Paths tab, where you can change thescan target of the selected task. In the case of system tasks, this option i
2. Configure the scan settings as needed. To find out what an option does, keepthe mouse over it and read the description displayed at the bottom of t
▶ Infected files. Files detected as infected match a malware signature in theBitDefender Malware Signature Database. BitDefender can normally removeth
NoteYou can also use drag and drop to add files/folders to the list.● Delete Item(s) - removes the file(s) / folder(s) previously selected from the li
BitDefender allows excluding objects from on-access or on-demand scanning, orfrom both. This feature is intended to decrease scanning times and to avo
a. Select the option of excluding a path from scanning. This step appears onlywhen you start the wizard by clicking the Add button.b. To specify the p
36. How Do I Update BitDefender Using a Proxy Server? ... . ... . . 20437. How Do I Upgrade to Another BitDefender 2011 Product? ... . 20538. How
● Click the Add button, located at the top of the exclusions table.5. Follow the configuration wizard. You can navigate through the wizard using theNe
NoteYou can also right-click an object and use the options on the shortcut menu to editor delete it.To disable scan exclusions, clear the correspondin
If you want to restore a quarantined file to its original location, select it and clickRestore.Configuring Quarantine SettingsTo configure the quarant
16. Antiphishing ProtectionBitDefender Antiphishing prevents you from disclosing personal information whilebrowsing the Internet by alerting you about
● Internet Explorer● Mozilla FirefoxYou can easily and efficiently manage antiphishing protection and the White Listusing the BitDefender Antiphishing
17. Search AdvisorSearch Advisor improves your online threat protection by alerting you about phishingor untrusted web pages directly from your search
18. AntispamSpam is a term used to describe unsolicited e-mail. Spam is a growing problem,both for individuals and for organizations. It's not pr
Friends List / Spammers ListMost people communicate regularly to a group of people or even receive messagesfrom companies or organizations in the same
NoteStarting May 19, 2004, spam that contains sexually oriented material must includethe warning SEXUALLY-EXPLICIT: in the subject line or face fines
The URL filter will compare the links found in the e-mail against the links from theBitDefender database of known spam links. In case of a match, the
Komentarze do niniejszej Instrukcji