Bitdefender Antivirus 2010 Betriebsanweisung

Stöbern Sie online oder laden Sie Betriebsanweisung nach Antivirus-Sicherheitssoftware Bitdefender Antivirus 2010 herunter. Bitdefender Antivirus 2010 Benutzerhandbuch

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 253
  • Inhaltsverzeichnis
  • FEHLERBEHEBUNG
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen

Inhaltsverzeichnis

Seite 1 - User's guide

User's guideCopyright© 2009 BitDefender

Seite 2

TERM OF LICENSE. The license granted hereunder shall commence on the purchasingdate of BitDefender and shall expire at the end of the period for which

Seite 3

⚫ Scan All - allows you to scan all managed computers at the same time.⚫ Update All allows you to update all managed computers at the same time.⚫ Regi

Seite 4 - Table of Contents

2. Type the home management password and click OK. A new window will appear.Add ComputerYou can see the list of computers in the network. The icon mea

Seite 5

Authenticate5. Type the home management password configured on the respective computer.6. Click OK. If you have provided the correct password, the sel

Seite 6

Network MapIf you move the mouse cursor over a computer from the network map, you can seebrief information about it (name, IP address, number of issue

Seite 7

Allows you to fix the issues that are affecting the security of this computer byfollowing the Fix All Issues wizard.⚫ View History/EventsAllows you ac

Seite 8

Enter Password2. Select a scan type.⚫ System Scan - starts a full scan of your computer (archives excluded).⚫ Deep System Scan - starts a full scan of

Seite 9

2. Click OK.16.1.6. Registering All ComputersTo register all managed computers, follow these steps:1. Click Register All. You will be prompted to prov

Seite 10 - BitDefender Antivirus 2010

Expert Mode91BitDefender Antivirus 2010

Seite 11

17. GeneralThe General module provides information on the BitDefender activity and the system.Here you can also change the overall behavior of BitDefe

Seite 12

17.1.1. Overall StatusThis is where you can find out the number of issues that are affecting the securityof your computer. To remove all threats, clic

Seite 13

CONDITIONS, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OFMERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE, NONINTERFERENCE, ACCURAC

Seite 14

DescriptionIssueA full system scan was started but not completed.The last system scanyou started was abortedbefore it finishedReal-time protection is

Seite 15

DescriptionStatusWindows security updates are not beingautomatically installed as soon as they becomeavailable.Windows AutomaticUpdates are disabledA

Seite 16

DescriptionItemIndicates when your BitDefender product was last updated.Please perform regular updates in order to have a fullyprotected system.Last u

Seite 17 - Installation and Removal

General SettingsHere you can set the overall behavior of BitDefender. By default, BitDefender isloaded at Windows startup and then runs minimized in t

Seite 18 - 1. System Requirements

Enter passwordType the password in the Password field,re-type it in the Retype password fieldand click OK.Once you have set the password, you willbe a

Seite 19

⚫ Enable BitDefender Outbreak Detection - sends to the BitDefender Labsreports regarding potential virus-outbreaks.The reports will contain no confide

Seite 20 - 2. Preparing for Installation

⚫ Go to - opens a window where the selected item is placed (the Registry forexample).NoteDepending on the selected item, the Go to button may not appe

Seite 21 - 3. Installing BitDefender

18. AntivirusBitDefender protects your computer from all kinds of malware (viruses, Trojans,spyware, rootkits and so on). The protection BitDefender o

Seite 22

Real-time ProtectionYou can see whether Real-time protection is enabled or disabled. If you want tochange the Real-time protection status, clear or se

Seite 23

DescriptionProtection levelOnly programs and incoming mail messages are scanned forviruses. Besides the classical signature-based scan, the heuristica

Seite 24

You acknowledge and accept that BitDefender may provide updates or additions tothe program or product which automatically download to your computer.By

Seite 25

Shield SettingsThe scan options are organized as an expandable menu, very similar to those usedfor exploration in Windows. Click the box with "+&

Seite 26

DescriptionOption.doc; .dot; .xls; .ppt; .wbk; .wiz; .pot;.ppa; .xla; .xlt; .vbs; .vbe; .mdb; .rtf;.htm; .hta; .html; .xml; .xtp; .php;.asp; .js; .shs

Seite 27

DescriptionOptionMoves infected files into the quarantine.Quarantined files cannot be executed orMove file toquarantineopened; therefore, the risk of

Seite 28

DescriptionOptionScans all incoming e-mail messages.Scan incoming e-mailScans all outgoing e-mail messages.Scan outgoing e-mail⚫ Scan web (HTTP) traff

Seite 29

BitDefender AVC AlertIf you know and trust the detected application,click Allow.If you want to immediately close the application,click OK.Select the R

Seite 30

ImportantKeep the Active Virus Control enabled in order to be protected against unknownviruses.If you want to be alerted and prompted for action by Ac

Seite 31

⚫ Remove - remove an application from the list.⚫ Edit - edit an application rule.18.1.4. Disabling Real-time ProtectionIf you want to disable real-tim

Seite 32

Antiphishing White ListYou can see the web sites that BitDefender does not currently check for phishingcontent.To add a new web site to the white list

Seite 33

There is a risk that a virus is already lodged in your system, before you even installBitDefender. This is why it's a very good idea to scan your

Seite 34 - 4. Upgrade

There are three categories of scan tasks:⚫ System tasks - contains the list of default system tasks. The following tasks areavailable:DescriptionDefau

Seite 35

In the event of invalidity of any provision of this Agreement, the invalidity shall notaffect the validity of the remaining portions of this Agreement

Seite 36 - Getting Started

⚫Delete - removes the selected task.NoteNot available for system tasks. You cannot remove a system task.⚫Scan Now - runs the selected task, initiating

Seite 37 - 6. Overview

⚫ Clone task - duplicates the selected task. This is useful when creating new tasks,as you can modify the settings of the task duplicate.⚫ Delete - de

Seite 38

OverviewHere you can see information about the task (name, last run and schedule status)and set the scan settings.Choosing Scan LevelYou can easily co

Seite 39

DescriptionProtection levelAll files and archives are scanned for viruses and spyware. Besidesthe classical signature-based scan, the heuristic analys

Seite 40

The scan options are organized as an expandable menu, very similar to those usedfor exploration in Windows. Click the box with "+" to open a

Seite 41

DescriptionOptionwbk; wiz; pot; ppa; xla; xlt; vbs; vbe;mdb; rtf; htm; hta; html; xml; xtp; php;asp; js; shs; chm; lnk; pif; prc; url; smm;pdf; msi; i

Seite 42

DescriptionActionNo action will be taken on infected files. Thesefiles will appear in the report file.Take No ActionRemove the malware code from the i

Seite 43

DescriptionActionMoves hidden files into the quarantine.Quarantined files cannot be executed or opened;therefore, the risk of getting infected disappe

Seite 44

– Action to take when an encrypted suspect file is found. Select theaction to be taken on suspicious files that are encrypted using Windows. Thefollow

Seite 45

Scan TargetYou can see the list of local, network and removable drives as well as the files orfolders added previously, if any. All checked items will

Seite 46

PrefaceThis guide is intended to all users who have chosen BitDefender Antivirus 2010as a security solution for their personal computers. The informat

Seite 47

⚫ All Entries - to scan all drives, no matter if they are local, in the network orremovable.NoteIf you want to scan your entire computer, select the c

Seite 48

Scheduling Scan TasksWith complex tasks, the scanning process will take some time and it will work bestif you close all other programs. That is why it

Seite 49

Click OK to save the changes and close the window. To run the task, just click Scan.18.2.5. Scanning Files and FoldersBefore you initiate a scanning p

Seite 50

Immediate ScanningTo scan your computer or part of it you can run the default scan tasks or your ownscan tasks. This is called immediate scanning.To r

Seite 51

Drag FileDrop FileThe Antivirus Scan wizard will appear and guide you through the scanning process.Manual ScanningManual scanning consists in directly

Seite 52 - 7. Fixing Issues

Manual ScanningClick Add Folder, select the location you want to scan and click OK. If you want toscan multiple folders, repeat this action for each a

Seite 53

ScanningYou can see the scan status and statistics (scanning speed, elapsed time, numberof scanned / infected / suspicious / hidden objects and other)

Seite 54

Stopping or pausing the scan. You can stop scanning anytime you want byclicking Stop&Yes. You will go directly to the last step of the wizard. To

Seite 55 - 8. Configuring Basic Settings

DescriptionActionRemoves the malware code from infected files.DisinfectDeletes detected files.DeleteMoves detected files to quarantine. Quarantined fi

Seite 56

SummaryYou can see the results summary. If you want comprehensive information on thescanning process, click View log to view the scan log.ImportantIf

Seite 57

NoteThe note is just a short observation. Although you can omit it, the notes can providevaluable information, such as specific feature or a link to s

Seite 58

18.2.6. Viewing Scan LogsTo see the scan results after a task has run, right-click the task and select Logs.The following window will appear:Scan Logs

Seite 59

Scan Log ExampleThe scan log contains detailed information about the logged scanning process, suchas scanning options, the scanning target, the threat

Seite 60 - 9. History and Events

ExceptionsYou can see the objects (files, folders, extensions) that are excluded from scanning.For each object you can see if it is excluded from on-a

Seite 61

You can click Discard to revert the changes made to the rule table, provided thatyou have not saved them by clicking Apply.18.3.1. Excluding Paths fro

Seite 62

Step 2/4 - Specify Excluded PathsExcluded PathsTo specify the paths to be excluded from scanning use either of the followingmethods:⚫ Click Browse, se

Seite 63

Step 3/4 - Select Scanning TypeScanning TypeYou can see a table containing the paths to be excluded from scanning and the typeof scanning they are exc

Seite 64

Step 4/4 - Scan Excluded FilesScan Excluded FilesIt is highly recommended to scan the files in the specified paths to make sure thatthey are not infec

Seite 65

Step 1/4 - Select Object TypeObject TypeSelect the option of excluding extensions from scanning.Click Next.Antivirus141BitDefender Antivirus 2010

Seite 66

Step 2/4 - Specify Excluded ExtensionsExcluded ExtensionsTo specify the extensions to be excluded from scanning use either of the followingmethods:⚫ S

Seite 67 - 11. Wizards

Step 3/4 - Select Scanning TypeScanning TypeYou can see a table containing the extensions to be excluded from scanning andthe type of scanning they ar

Seite 68

3. Request for CommentsWe invite you to help us improve the book. We have tested and verified all of theinformation to the best of our ability. Please

Seite 69

Step 4/4 - Select Scanning TypeScanning TypeIt is highly recommended to scan the files having the specified extensions to makesure that they are not i

Seite 70

QuarantineThe Quarantine section displays all the files currently isolated in the Quarantinefolder. For each quarantined file, you can see its name, t

Seite 71

18.4.2. Configuring Quarantine SettingsTo configure the quarantine settings, click Settings. A new window will appear.Quarantine SettingsUsing the qua

Seite 72

Automatically submit files. To automatically submit quarantined files, checkthe corresponding option. You must specify the frequency with which to sub

Seite 73

19. Privacy ControlBitDefender monitors dozens of potential “hotspots” in your system where spywaremight act, and also checks any changes made to your

Seite 74

⚫ Identity Control - protects your confidential data by filtering all outgoing web(HTTP), e-mail (SMTP) and instant messaging traffic according to the

Seite 75

You can create rules to protect any piece of information you might consider personalor confidential, from your phone number or e-mail address to your

Seite 76

Identity ControlIf you want to use Identity Control, follow these steps:1. Select the Enable Identity Control check box.2. Create rules to protect you

Seite 77

Step 1/4 - Welcome WindowWelcome WindowClick Next.Step 2/4 - Set Rule Type and DataSet Rule Type and DataYou must set the following parameters:Privacy

Seite 78

⚫ Rule Name - type the name of the rule in this edit field.⚫ Rule Type - choose the rule type (address, name, credit card, PIN, SSN etc).⚫ Rule Data -

Seite 79

Installation and Removal1BitDefender Antivirus 2010

Seite 80

You can choose to apply the rule only if the rule data matches whole words or if therule data and the detected string case match.Specify the users for

Seite 81

To open the window where you can manage exceptions, click Exclusions.ExclusionsTo add an exception, follow these steps:1. Click the Add button to add

Seite 82

Edit RuleHere you can change the name, description and parameters of the rule (type, dataand traffic). Click OK to save the changes.19.2.4. Rules Defi

Seite 83

Registry Control keeps an eye on the Windows Registry - this is again useful fordetecting Trojan horses. It will alert you whenever a program will try

Seite 84

Registry ControlYou can see the rules created so far listed in the table.To delete a rule, select it and click the Delete button.19.4. Cookie ControlC

Seite 85

Cookie AlertYou can see the name of the application that is tryingto send the cookie file.Click Yes or No and a rule will be created, applied andliste

Seite 86 - Intermediate Mode

Cookie ControlYou can see the rules created so far listed in the table.ImportantThe rules are listed in order of their priority starting from the top,

Seite 87 - 12. Dashboard

Select Address, Action and DirectionYou can set the parameters:⚫ Domain address - type in the domain on which the rule should apply.⚫ Action - select

Seite 88

19.5. Script ControlScripts and other codes such as ActiveX controls and Java applets, which are usedto create interactive web pages, can be programme

Seite 89 - 13. Antivirus

Script ControlYou can see the rules created so far listed in the table.ImportantThe rules are listed in order of their priority starting from the top,

Seite 90

1. System RequirementsYou may install BitDefender Antivirus 2010 only on computers running the followingoperating systems:⚫ Windows XP (32/64 bit) wit

Seite 91

Select Address and ActionYou can set the parameters:⚫ Domain address - type in the domain on which the rule should apply.⚫ Action - select the action

Seite 92

20. VulnerabilityAn important step in protecting your computer against malicious persons andapplications is to keep up to date the operating system an

Seite 93

ImportantTo be automatically notified about system or application vulnerabilities, keep theAutomatic Vulnerability Checking enabled.20.1.1. Fixing Vul

Seite 94 - 14. Antiphishing

Automatic Vulnerability Checking SettingsSelect the check boxes corresponding to the system vulnerabilities you want to beregularly checked.⚫ Critical

Seite 95

21. Instant Messaging (IM) EncryptionBy default, BitDefender encrypts all your instant messaging chat sessions providedthat:⚫ Your chat partner has a

Seite 96

Instant Messaging EncryptionBy default, IM Encryption is enabled for both Yahoo Messenger and Windows Live(MSN) Messenger. You can choose to disable I

Seite 97 - 15. Vulnerability

1. Click the Add button to open the configuration window.Adding Contacts2. Type in the edit field the user ID of your contact.3. Select the instant me

Seite 98

22. Game / Laptop ModeThe Game / Laptop Mode module allows you to configure the special operationmodes of BitDefender:⚫ Game Mode temporarily modifies

Seite 99 - 16. Network

Game ModeAt the top of the section, you can see the status of the Game Mode. You can clickTurn On Game Mode Mode or Turn Off Game Mode to change the c

Seite 100

NoteIf you do not want BitDefender to automatically enter Game Mode, clear theAutomatic Game Mode check box.22.1.2. Managing the Game ListBitDefender

Seite 101

⚫ Yahoo Messenger 8.5⚫ Windows Live Messenger 8System Requirements3BitDefender Antivirus 2010

Seite 102

Adding or Editing GamesWhen you add or edit an entry from the game list, the following window will appear:Add GameClick Browse to select the applicati

Seite 103

Advanced Settings2. Under the Use HotKey option, set the desired hotkey:⚫ Choose the modifier keys you want to use by checking one the following: Cont

Seite 104

Laptop ModeYou can see whether Laptop Mode is enabled or not. If Laptop Mode is enabled,BitDefender will apply the configured settings while the lapto

Seite 105

23. Home NetworkThe Network module allows you to manage the BitDefender products installed onyour home computers from a single computer.Network MapTo

Seite 106

Configure Password2. Type the same password in each of the edit fields.3. Click OK.You can see the computer name appearing in the network map.23.2. Ad

Seite 107 - Expert Mode

Add ComputerYou can see the list of computers in the network. The icon meaning is as follows:⚫Indicates an online computer with no BitDefender product

Seite 108 - 17. General

Authenticate5. Type the home management password configured on the respective computer.6. Click OK. If you have provided the correct password, the sel

Seite 109

Network MapIf you move the mouse cursor over a computer from the network map, you can seebrief information about it (name, IP address, number of issue

Seite 110

⚫ Fix all issues on this PCAllows you to fix the issues that are affecting the security of this computer byfollowing the Fix All Issues wizard.⚫ View

Seite 111

24. UpdateNew malware is found and identified every day. This is why it is very important tokeep BitDefender up to date with the latest malware signat

Seite 112

BitDefender Antivirus 2010User's guidePublished 2009.07.08Copyright© 2009 BitDefenderLegal NoticeAll rights reserved. No part of this book may be

Seite 113

2. Preparing for InstallationBefore you install BitDefender Antivirus 2010, complete these preparations to ensurethe installation will go smoothly:⚫ M

Seite 114

Automatic UpdateHere you can see when the last check for updates and the last update wereperformed, as well as information about the last update perfo

Seite 115

The Update module will connect to the BitDefender update server and will verifyif any update is available. If an update was detected, depending on the

Seite 116

Update SettingsThe update settings are grouped into 4 categories (Update Location Settings,Automatic Update Settings, Manual Update Settings and Advan

Seite 117 - 18. Antivirus

NoteWe recommend you to set as primary update location the local mirror and to leavethe alternate update location unchanged, as a fail-safe plan in ca

Seite 118

NoteIf BitDefender is updated while a scan is in progress, the scan process will beaborted.⚫ Don't update if game mode is on - BitDefender will n

Seite 119

on to that account. If the proxy server requires a username and a password, youmust specify them in the corresponding fields.⚫ Default Browser Proxy -

Seite 120

25. RegistrationTo find complete information on your BitDefender product and the registrationstatus, go to Registration in Expert Mode.RegistrationThi

Seite 121

RegistrationYou can see the BitDefender registration status, the current license key and howmany days are left until the license expires.To register B

Seite 122

ImportantYou must create an account within 15 days after installing BitDefender (if you registerit with a license key, the deadline is extended to 30

Seite 123

⚫ Password - type in a password for your BitDefender account. The passwordmust be between 6 and 16 characters long.⚫ Re-type password - type in again

Seite 124

3. Installing BitDefenderYou can install BitDefender from the BitDefender installation CD or using theinstallation file downloaded on your computer fr

Seite 125

4. Click Sign in.5. Click Finish to complete the wizard.Registration194BitDefender Antivirus 2010

Seite 126

Integration into Windows and Third-Party Software195BitDefender Antivirus 2010

Seite 127

26. Integration into Windows Contextual MenuThe Windows contextual menu appears whenever you right-click a file or folder onyour computer or objects o

Seite 128

5. Click Custom and configure the scanning options as needed. To find out whatan option does, keep the mouse over it and read the description displaye

Seite 129

27. Integration into Web BrowsersBitDefender protects you against phishing attempts when you are surfing theInternet. It scans the accessed web sites

Seite 130

▸ Ask before adding to whitelist - prompts you before adding a web site tothe White List.⚫ Add to White List - adds the current web site to the White

Seite 131

⚫ Help - opens the help file.⚫ About - opens a window where you can see information about BitDefender andwhere to look for help in case something unex

Seite 132

28. Integration into Instant Messenger ProgramsBitDefender offers encryption capabilities to protect your confidential documentsand your instant messa

Seite 133

How To202BitDefender Antivirus 2010

Seite 134

29. How to Scan Files and FoldersScanning is easy and flexible with BitDefender. There are 4 ways to set BitDefenderto scan files and folders for viru

Seite 135

Follow these steps to install BitDefender Antivirus 2010:1. Click Next. You can cancel installation anytime you want by clicking Cancel.BitDefender An

Seite 136

Running Scan Tasks in Intermediate ModeIn Intermediate Mode, you can run a number of pre-configured scan tasks. You canalso configure and run custom s

Seite 137

2. Click the Virus Scan tab. Here you can find a number of default scan tasks andyou can create your own scan tasks. These are the default scan tasks

Seite 138

5. Click Continue to start the scan.6. Follow the Antivirus Scan wizard to complete the scan.What is Safe Mode?Safe Mode is a special way to start Win

Seite 139

30. How to Schedule Computer ScanScanning your computer periodically is a best practice to keep your computer freefrom malware. BitDefender allows you

Seite 140

4. Right-click the desired scan task and select Schedule. A new window will appear.5. Schedule the task to run as needed:⚫ To run the scan task one-ti

Seite 141

Troubleshooting and Getting Help209BitDefender Antivirus 2010

Seite 142

31. TroubleshootingThis chapter presents some problems you may encounter when using BitDefenderand provides you with possible solutions to these probl

Seite 143

Description&SolutionError2. Run the uninstall tool using administrator privileges.3. Restart your computer.4. Start the setup wizard again to inst

Seite 144

1. Clean up the system after the failed installation. If the installation fails,some BitDefender registry keys and files may remain in your system. Su

Seite 145

⚫ temporary communication errors between the BitDefender services.⚫ some of the BitDefender services are stopped.⚫ other security solutions running on

Seite 146

⚫ Turn off Windows Defender - to turn off Windows Defender; this optionappears only on Windows Vista.Click Install in order to begin the installation

Seite 147

If this information was not helpful, you can contact BitDefender for support asdescribed in section “Support” (p. 215).Troubleshooting214BitDefender A

Seite 148

32. SupportAs a valued provider, BitDefender strives to provide its customers with anunparalleled level of fast and accurate support. The BitDefender

Seite 149

32.3. Contact InformationEfficient communication is the key to a successful business. During the past 10years BITDEFENDER has established an unquestio

Seite 150

DeutschlandOffice: +49 2301 91 84 222Sales: [email protected] support: http://kb.bitdefender.deWeb: http://www.bitdefender.deUK and Ire

Seite 151

BitDefender Rescue CD218BitDefender Antivirus 2010

Seite 152

33. OverviewBitDefender Antivirus 2010 comes with a bootable CD (BitDefender Rescue CD)capable to scan and disinfect all existing hard drives before y

Seite 153

33.2. Included SoftwareBitDefender Rescue CD includes the following software packages.XeditThis is a text file editor.VimThis is a powerful text file

Seite 154

For more information, please refer to the Nessus homepage.IptrafIptraf is an IP Network Monitoring Software.For more information, please refer to the

Seite 155

34. BitDefender Rescue CD HowtoThis chapter contains information on how to start and stop the BitDefender RescueCD, scan your computer for malware as

Seite 156

The Desktop34.2. Stop BitDefender Rescue CDChoose "EXIT"You can safely shut down your computer by selecting Exitfrom the BitDefender Rescue

Seite 157

3.1.1. Step 1/2 - Register BitDefender Antivirus 2010RegistrationBitDefender Antivirus 2010 comes with 30-day trial period. To continue evaluatingthe

Seite 158

Wait for this message when shutting down34.3. How do I perform an antivirus scan?A wizard will appear when the boot process has finished and allow you

Seite 159

1. Double click the START SCANNER icon on the Desktop. This will launch theBitDefender Scanner for Unices.2. Click Scanner, a new window will appear.3

Seite 160

DescriptionConnectionSelect this type of connection when you are using a localarea network (LAN) to access the Internet. It is also suitablefor wirele

Seite 161

Update Signatures2. Do one of the following:▸ Select Cumulative to install signatures already saved on your hard disk bybrowsing your computer and loa

Seite 162

6. Press F2 to save the current file, confirm saving, and then press F10 to closeit.7. Type the command: bdscan update.34.6. How do I save my data?Let

Seite 163

Desktop Screen3. Double-click the partition where the data you want to save is located (e.g.[sda3]).NoteWhen working with BitDefender Rescue CD, you w

Seite 164 - 19. Privacy Control

Saving Data6. Type /media/sdb1/ into the corresponding textbox and click Copy.Please be aware that depending on your computer configuration it might b

Seite 165

GlossaryActiveXActiveX is a model for writing programs so that other programs and the operatingsystem can call them. ActiveX technology is used with M

Seite 166

Internet Explorer. Both of these are graphical browsers, which means that theycan display graphics as well as text. In addition, most modern browsers

Seite 167

Filename extensionThe portion of a filename, following the final point, which indicates the kind ofdata stored in the file.Many operating systems use

Seite 168

3.1.2. Step 2/2 - Create a BitDefender AccountAccount CreationIf you do not want to create a BitDefender account at the moment, select Registerlater a

Seite 169

exists on tapes or disks. Every computer comes with a certain amount of physicalmemory, usually referred to as main memory or RAM.Non-heuristicThis me

Seite 170

Report fileA file that lists actions that have occurred. BitDefender maintains a report filelisting the path scanned, the folders, the number of archi

Seite 171

sends information back to the spyware's home base via the user's Internetconnection. Because spyware is using memory and system resources, t

Seite 172

itself over and over again is relatively easy to produce. Even such a simplevirus is dangerous because it will quickly use all available memory and br

Seite 173

⚫ Re-type password - type in again the previously specified password.NoteOnce the account is activated, you can use the provided e-mail address andpas

Seite 174

3.2. Configuration WizardOnce you have completed the registration wizard, a configuration wizard will appear.This wizard helps you configure the main

Seite 175

DescriptionOptionClick here if this PC is used mainly for browsing and multimediaactivities.TypicalClick here if this PC is used primarily for gaming.

Seite 176

Click Next to continue.3.2.3. Step 3 - Select User InterfaceUser Interface View ModesClick the button that best describes your computer skills to sele

Seite 177

Each man has his price BobAnd yours was pretty lowBitDefender Antivirus 2010

Seite 178

DescriptionModeYou can fix issues separately and choose which issuesto be monitored. Moreover, you can manage remotelythe BitDefender products install

Seite 179

2. Type the same administrative password in each of the edit fields. The passwordenables an administrator to manage this BitDefender product from anot

Seite 180

NoteIf you later want to change the time when the scan is scheduled to run, follow thesesteps:1. Open BitDefender and switch the user interface to Exp

Seite 181 - 20. Vulnerability

Click Finish to complete the wizard. You do not have to wait for the scan to complete.NoteThe scan will take a few minutes. When it is over, open the

Seite 182

4. UpgradeYou can upgrade to BitDefender Antivirus 2010 if you are using BitDefender Antivirus2010 beta or the 2008 or 2009 version.There are two ways

Seite 183

5. Repairing or Removing BitDefenderIf you want to repair or remove BitDefender Antivirus 2010, follow the path fromthe Windows start menu: Start → Pr

Seite 184

Getting Started20BitDefender Antivirus 2010

Seite 185

6. OverviewOnce you have installed BitDefender your computer is protected. If you have notcompleted the configuration wizard, you must open BitDefende

Seite 186

DescriptionModeYou can fix issues separately and choose which issuesto be monitored. Moreover, you can manage remotelythe BitDefender products install

Seite 187 - 22. Game / Laptop Mode

Novice ModeThe window is organized into three main sections:⚫ Security Status informs you of the issues that affect your computer's securityand h

Seite 188

Table of ContentsEnd User Software License Agreement ... . ... . ... . .. . . .. . ... . ... . ... . ... . ixPreface .. . ... . .. . ... . ... . ...

Seite 189

▸ When the Gamer profile is selected, the Turn On/Off Game Mode buttonallows you to enable/disable Game Mode. Game Mode temporarily modifiesprotection

Seite 190

Intermediate ModeThe Intermediate Mode window consists of five tabs. The following table brieflydescribes each tab. For detailed information, please r

Seite 191

In the upper-right corner of the window, you can see the Settings button. It opensa window where you can change the user interface mode and enable or

Seite 192

Expert ModeOn the left side of the window there is a menu containing all security modules. Eachmodule has one or more tabs where you can configure the

Seite 193 - 23. Home Network

DescriptionModuleAllows you to postpone the BitDefender scheduled tasks whileyour laptop runs on batteries and also to eliminate all alertsand pop-ups

Seite 194

Tray Icon⚫ Show - opens the main interface of BitDefender.⚫ Help - opens the help file, which explains in detail howto configure and use BitDefender A

Seite 195

Scan Activity BarThe gray bars (the File Zone) show the number of scannedfiles per second, on a scale from 0 to 50.NoteThe Scan activity bar will noti

Seite 196

4. Click OK to save and apply the changes.6.5. BitDefender Manual ScanBitDefender Manual Scan lets you scan a specific folder or hard disk partition w

Seite 197

Scanning options. The scanning options are pre-configured for the best detectionresults. If infected files are detected, BitDefender will try to disin

Seite 198

While in Game Mode, you can see the letter G over the BitDefender icon.Using Game ModeBy default, BitDefender automatically enters Game Mode when you

Seite 199 - 24. Update

6.6.2. Laptop Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 336.7. Automatic Device D

Seite 200

running on battery. While in Laptop Mode, scheduled scan tasks are not performed,as they require more system resources and, implicitly, increase power

Seite 201

If you accidentally disabled automatic device detection and you want to enable it,or if you want to configure its settings, follow these steps:1. Open

Seite 202

7. Fixing IssuesBitDefender uses an issue tracking system to detect and inform you about the issuesthat may affect the security of your computer and d

Seite 203

Fix All Issues WizardThe wizard displays the list of existing security vulnerabilities on your computer.All current issues are selected to be fixed. I

Seite 204

⚫ System vulnerabilities. BitDefender automatically checks your system forvulnerabilities and alerts you about them. System vulnerabilities include th

Seite 205

8. Configuring Basic SettingsYou can configure the main product settings (including changing the user interfaceview mode) from the basic settings wind

Seite 206 - 25. Registration

8.1. User Interface SettingsIn this area, you can switch the user interface view mode and reset the usage profile.Switching the user interface view mo

Seite 207

8.2. Security SettingsIn this area, you can enable or disable product settings that cover various aspectsof computer and data security. The current st

Seite 208

If you do not want a monitored setting that you disabled to be shown as an issue,you must configure the tracking system accordingly. You can do that e

Seite 209

DescriptionSettingBy enabling this option, you will receive informationalerts.Product NotificationAlertsThe Scan Activity Bar is a small, transparent

Seite 210

14.1. Status Area . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7814.2. Quick Ta

Seite 211

9. History and EventsThe View Logs link at the bottom of the BitDefender main window opens anotherwindow with the BitDefender history & events. Th

Seite 212

⚫ Update⚫ Registration⚫ Internet LogA list of events is available for each category. Each event comes with the followinginformation: a short descripti

Seite 213

10. Registration and My AccountBitDefender Antivirus 2010 comes with 30-day trial period. During the trial period,the product is fully functional and

Seite 214

RegistrationYou can see the BitDefender registration status, the current license key and howmany days are left until the license expires.To register B

Seite 215

10.2. Activating BitDefenderTo activate BitDefender, you must create or sign in to a BitDefender account. If youdid not register a BitDefender account

Seite 216

ImportantYou must create an account within 15 days after installing BitDefender (if you registerit with a license key, the deadline is extended to 30

Seite 217

2. Type the e-mail address and the password of your account in the correspondingfields.NoteIf you have forgotten your password, click Forgot your pass

Seite 218

11. WizardsIn order to make BitDefender very easy to use, several wizards help you carry outspecific security tasks or configure more complex product

Seite 219

You can see the scan status and statistics (scanning speed, elapsed time, numberof scanned / infected / suspicious / hidden objects and other).Wait fo

Seite 220

ActionsYou can see the number of issues affecting your system.The infected objects are displayed in groups, based on the malware they are infectedwith

Seite 221

19. Privacy Control . ... . ... . ... . ... . .. . . .. . ... . ... . ... . ... . ... . .. . . .. . .. 14819.1. Privacy Control Status . . . . . . . .

Seite 222

DescriptionActionto search for and find such files on your computer, ifany.Please note that these hidden files are not the filesthat you deliberately

Seite 223

Click Close to close the window.BitDefender Could Not Solve Some IssuesIn most cases BitDefender successfully disinfects the infected files it detects

Seite 224

Welcome WindowIf you want to skip over this window when running this wizard in the future, selectthe Don't show this step the next time this wiza

Seite 225

Select TargetClick Add Target, select the files or folders that you want to scan and click OK.The paths to the selected locations will appear in the S

Seite 226 - 31. Troubleshooting

DescriptionOptionOnly the files with the extensions specified by the userwill be scanned. These extensions must be separatedby ";".Scan user

Seite 227

DescriptionActionMoves infected files into the quarantine. Quarantinedfiles cannot be executed or opened; therefore, therisk of getting infected disap

Seite 228

Custom Scan LevelSpecify the type of malware you want BitDefender to scan for by selecting theappropriate options:DescriptionOptionScans for known vir

Seite 229

Click OK to close the window.Click Next.11.2.4. Step 4/6 - Additional SettingsBefore scanning begins, additional options are available:Additional Sett

Seite 230

ScanningNoteThe scanning process may take a while, depending on the complexity of the scan.You can click the scan progress icon in the system tray to

Seite 231 - 32. Support

SummaryYou can see the results summary. If you want comprehensive information on thescanning process, click View Log to view the scan log.ImportantIf

Seite 232

Integration into Windows and Third-Party Software ... 19526. Integration into Windows Contextual Menu .. . ... . ... . ... . .. . . .. . 19626.1.

Seite 233

11.3.1. Step 1/6 - Select Vulnerabilities to CheckVulnerabilitiesClick Next to check the system for the selected vulnerabilities.Wizards64BitDefender

Seite 234 - BitDefender Rescue CD

11.3.2. Step 2/6 - Checking for VulnerabilitiesVulnerability CheckWait for BitDefender to finish checking for vulnerabilities.Wizards65BitDefender Ant

Seite 235 - 33. Overview

11.3.3. Step 3/6 - Update WindowsWindows UpdatesYou can see the list of critical and non-critical Windows updates that are not currentlyinstalled on y

Seite 236

11.3.4. Step 4/6 - Update ApplicationsApplicationsYou can see the list of applications checked by BitDefender and if they are up todate. If an applica

Seite 237

11.3.5. Step 5/6 - Change Weak PasswordsUser PasswordsYou can see the list of the Windows user accounts configured on your computer andthe level of pr

Seite 238

⚫ Change user password. You must type the new password in the edit fields.Make sure to inform the user about the password change.NoteFor a strong pass

Seite 239

Intermediate Mode70BitDefender Antivirus 2010

Seite 240

12. DashboardThe Dashboard tab provides information regarding the security status of yourcomputer and allows you to fix pending issues.DashboardThe da

Seite 241

Click the name of a module to see more details about its status and to configurestatus tracking for its components.⚫ Usage Profile - Indicates the usa

Seite 242

13. AntivirusBitDefender comes with an Antivirus module that helps you keep your BitDefenderup to date and your computer virus free. To enter the Anti

Seite 243

End User Software License AgreementIF YOU DO NOT AGREE TO THESE TERMS AND CONDITIONS DO NOT INSTALL THESOFTWARE. BY SELECTING "I ACCEPT", &q

Seite 244

Red circle with an exclamation mark: Issues affect the component.The sentences describing issues are written in red. Just click the Fix buttoncorrespo

Seite 245

DescriptionIssueThe malware signatures of your BitDefender productare not being automatically updated on a regularbasis.Automatic Update isdisabledThe

Seite 246

Updating BitDefenderIn this window you can see the status of the update process.The update process is performed on the fly, meaning that the files to

Seite 247 - Glossary

DescriptionTaskScans the entire system, except for archives. In thedefault configuration, it scans for all types of malwareother than rootkits.System

Seite 248

14. AntiphishingBitDefender comes with an Antiphishing module which ensures that all web pagesyou access via Internet Explorer or Firefox are safe. To

Seite 249

The most common issue reported for this module is Antiphishing is disabled.This means Antiphishing is not enabled for any or some of the following sup

Seite 250

The update process is performed on the fly, meaning that the files to be updatedare replaced progressively. In this way, the update process will not a

Seite 251

15. VulnerabilityBitDefender comes with a Vulnerability module that helps you keep crucial softwareon your PC up-to-date. To monitor and fix your syst

Seite 252

DescriptionStatusBitDefender does not check for potential vulnerabilitiesregarding missing Windows updates, applicationupdates or weak passwords.Vulne

Seite 253

16. NetworkThe Network module allows you to manage the BitDefender products installed onyour home computers from a single computer. To enter the Netwo

Kommentare zu diesen Handbüchern

Keine Kommentare