User's GuideCopyright© 2012 Bitdefender
1. Preparing for installationBefore you install Bitdefender Internet Security 2013, complete these preparationsto ensure the installation will go smoo
To load a previously saved Spammers list, click the Load button and open thecorresponding .bwl file. To reset the content of the existing list when lo
If you are using Microsoft Outlook / Outlook Express / Windows Mail / Thunderbird,you can configure the local antispam filters directly from your mail
18. Privacy ControlYour private information is a constant target for cyber criminals. As the threats havespread to nearly the entire spectrum of onlin
4. In the Privacy Control Settings window, select the Antiphishing tab.Click the switches to turn on or off:● Showing the Bitdefender toolbar in the w
To remove a web site from the list, select it in the list and click the correspondingRemove link.Click Save to save the changes and close the window.1
SettingsClick to select individual features to turn on or off:● Antiphishing Filter● Antimalware Web Filter● Search AdvisorPower SwitchTo enable / dis
Once the prerequisites are met, Bitdefender will inform you of the encryption statusof your chat session through messages displayed in the chat window
3. In the Settings Overview window, select Privacy Control.4. In the Privacy Control Settings window, select the Data Protection tab.5. Make sure data
● Limited user accounts - the rule will apply to you and all limited Windowsaccounts.Click Finish. The rule will appear in the table.From now on, any
2. On the Privacy panel, click Secure and select File Shredder from the drop-downmenu.3. Follow the File Shredder wizard:a. Select file/folderAdd the
2. System requirementsYou may install Bitdefender Internet Security 2013 only on computers running thefollowing operating systems:● Windows XP with Se
19. FirewallThe Firewall protects your computer from inbound and outbound unauthorizedconnection attempts, both on local networks and on the Internet.
19.1. Turning on or off firewall protectionTo turn firewall protection on or off, follow these steps:1. Open the Bitdefender window.2. On the Firewall
DescriptionStealth optionStealth Mode is on. Your computer is invisible fromboth the local network and the Internet.OnStealth Mode is off. Anyone from
Sending E-mailsAllow or deny sending e-mails over SMTP.By default, this type of connection is allowed.Web Browsing HTTPAllow or deny HTTP web browsing
DescriptionProtocoldelivery of data and also guarantees that packets will be deliveredin the same order in which they were sent.User Datagram Protocol
DescriptionEventbetween two computers occurs only after a connection isestablished.Flow of data between two computers.TrafficState in which an applica
19.3.3. Adapter rulesFor each network connection you can configure special trusted or untrusted zones.A trusted zone is a device that you fully trust,
19.4. Monitoring network activityTo monitor the current network / Internet activity (over TCP and UDP) sorted byapplication and to open the Bitdefende
3. In the Settings Overview window, select Firewall.4. In the Firewall Settings window, select the Settings tab.5. Turn on Paranoid Mode by clicking t
NoteThe operation of the Intrusion Detection System is related to that of the Active VirusControl. Process exclusion rules apply to both systems.19.6.
3. Installation scenariosFresh installationThere is no older version of Bitdefender installed on the computer. In this case,proceed according to the i
20. Safepay secure online transactionsThe computer is fast becoming THE tool for shopping and banking. Paying bills,transferring money, buying pretty
● add tabs to visit multiple websites in the Bitdefender Safepay window by clicking.● navigate back and forward and refresh pages using respectively.●
2. Click the + button to add a new bookmark.3. Enter the URL and the title of the bookmark and click Create. The URL is alsoadded to the Domains list
21. Parental ControlParental Control enables you to control the access to the Internet and to specificapplications for each user holding a user accoun
3. Click the MyBitdefender button at the top of the window and select ParentalControl from the drop-down menu.4. The Parental Control dashboard will o
● The date and time when the event occurred.● The actions taken by Bitdefender.To monitor the Internet traffic, the accessed applications or the Faceb
21.3.1. Web ControlWeb control helps you block websites with inappropriate content and set timerestrictions on Internet access.To configure Web contro
2. You can check what web categories are automatically blocked / restricted for thecurrently selected age group. If you are not satisfied with the def
● uploaded photos and videos● account privacy settingsTo configure Facebook protection for a specific user account:1. Go to the Facebook tab.2. Click
22. Safego protection for social networksYou trust your online friends, but do you trust their computers? Use Safego protectionfor social networks to
4. Installing your Bitdefender productYou can install Bitdefender from the Bitdefender installation disc or using a webinstaller downloaded on your co
● sends a direct message from your account to those persons on your Follow listin whose accounts issues have been detected.● scans your private messag
23. USB ImmunizerThe Autorun feature built into Windows operating systems is a very useful tool thatallows computers to automatically execute a file f
24. Managing your computers remotelyYour MyBitdefender account allows you to manage the Bitdefender products installedon your computers remotely.Use M
Scan critical areas to detect active malwareAllows you to run a quick scan on the remote computer.Fix critical issuesAllows you to fix the issues that
Troubleshooting126Bitdefender Internet Security 2013
25. Solving common issuesThis chapter presents some problems you may encounter when using Bitdefenderand provides you with possible solutions to these
same time. For more information, please refer to “Minimum system requirements”(p. 3).● Your hard disk drives are too fragmented.File fragmentation slo
You may encounter one of these situations:● You could receive a message from Bitdefender that the program is trying to makea modification to the syste
2. Click the Settings button on the upper toolbar..3. In the Settings Overview window, select Firewall.4. In the Firewall Settings window, select the
Check for other potential causes, such as the following:● The firewall on the other computer may block file and printer sharing with yourcomputer.▶ If
Bitdefender to download the files, ensuring you are installing the very latest versionof the software.NoteDownloading the installation files can take
● If you still have a slow Internet connection, the issue may not be caused byBitdefender. You should contact your Internet Service Provider to verify
6. Click to return to the main window.7. Go to the Update panel and click Update Now.8. Select only Signatures updates and then click OK.9. Bitdefende
To troubleshoot this error, try these solutions:1. Wait a few moments and see if anything changes. The error may be temporary.2. Restart the computer
1. If you are using one of the mail clients Bitdefender integrates into, indicatedetection errors.NoteBitdefender integrates into the most commonly us
2. Go to the junk mail folder where spam messages are moved.3. Select the legitimate message incorrectly marked as [spam] by Bitdefender.4. Click the
Indicate undetected spam messagesIf you are using a supported mail client, you can easily indicate which e-mailmessages should have been detected as s
2. Click the Settings button on the upper toolbar.3. In the Settings Overview window, select Antispam.4. In the Antispam Settings window, select the S
If removal fails, some Bitdefender registry keys and files may remain in your system.Such remainders may prevent a new installation of Bitdefender. Th
b. Run the uninstall tool using administrator privileges.c. Restart your computer.3. In order to correctly uninstall the other software, go to their w
26. Removing malware from your systemMalware can affect your system in many different ways and the Bitdefender approachdepends on the type of malware
installation path, click Change and select the folder in which you would likeBitdefender to be installed.Configure Proxy SettingsBitdefender Internet
3. After the computer restarts, a menu will appear prompting you to select anoperating system. Choose Bitdefender Rescue Image and press the Enterkey
NoteWhen working in Rescue Mode, you are dealing with Linux-type partition names.Disk partitions will appear as sda1 probably corresponding to the (C:
3. Browse to the location of the infected file (check the scan log) and delete it.4. Turn on the Bitdefender real-time antivirus protection.In case th
6. Recompress the files in a new archive using an archiving application, like WinZip.7. Turn on the Bitdefender real-time antivirus protection and run
If this information was not helpful, you can contact Bitdefender for support asdescribed in section “Asking for help” (p. 150).26.5. What to do if I s
5. To turn on the System Restore, clear the Turn off System Restore checkbox on all drives, and click Apply.● For Windows Vista:1. Follow this path: S
26.8. What are the skipped items in the scan log?All files that appear as Skipped in the scan report are clean.For increased performance, Bitdefender
Contact us149Bitdefender Internet Security 2013
27. Asking for helpBitdefender strives to provide its customers with an unparalleled level of fast andaccurate support. If you experience any issue wi
b. Complete the submission form with the necessary data:i. Enter your e-mail address.ii. Enter your full name.iii. Choose your country from the corres
NoteYou can find your license key:▶ on the CD/DVD label.▶ on the product registration card.▶ in the online purchase e-mail.3. Click Register Now.● I w
28. Online resourcesSeveral online resources are available to help you solve your Bitdefender-relatedproblems and questions.● Bitdefender Support Cent
The Bitdefender Support Forum is available at http://forum.bitdefender.com, in 5different languages: English, German, French, Spanish and Romanian. Cl
29. Contact informationEfficient communication is the key to a successful business. During the past 10years BITDEFENDER has established an unquestiona
PO Box 667588Pompano Beach, Fl 33066Phone (office&sales): 1-954-776-6262Sales: [email protected] support: http://www.bitdefender.com/
Fax: +40 21 2641799Sales phone: +40 21 2063470Sales e-mail: [email protected] support: http://www.bitdefender.ro/suportWebsite: http://www
GlossaryActiveXActiveX is a model for writing programs so that other programs and the operatingsystem can call them. ActiveX technology is used with M
BrowserShort for Web browser, a software application used to locate and display Webpages. The two most popular browsers are Netscape Navigator and Mic
EventsAn action or occurrence detected by a program. Events can be user actions,such as clicking a mouse button or pressing a key, or system occurrenc
are increasingly being used by cyber-criminals for malicious purposes (forexample, to collect private data, such as login credentials and social secur
information that will be used for identity theft. The e-mail directs the user tovisit a Web site where they are asked to update personal information,
● Antifraud● Search AdvisorYou can turn the filters on or off at any time after the installation from the Bitdefenderinterface. To achieve the best le
SpamElectronic junk mail or junk newsgroup postings. Generally known as anyunsolicited e-mail.SpywareAny software that covertly gathers user informati
TrojanA destructive program that masquerades as a benign application. Unlike viruses,Trojan horses do not replicate themselves but they can be just as
2. Follow the instructions provided by the selected service to link your accountto Bitdefender.NoteBitdefender does not get access to any confidential
Getting started11Bitdefender Internet Security 2013
Bitdefender Internet Security 2013User's GuidePublication date 08/21/2012Copyright© 2012 BitdefenderLegal NoticeAll rights reserved. No part of t
5. The basicsOnce you have installed Bitdefender Internet Security 2013, your computer isprotected against all kinds of malware (such as viruses, spyw
Detected issues include important protection settings that are turned off and otherconditions that can represent a security risk. They are grouped int
● Disabled security settings. Such issues are fixed immediately, by enablingthe respective security settings.● Preventive security tasks you need to p
● Antispam● Privacy Control● Firewall● Update● SafegoEvents counters are displayed in the Bitdefender interface to allow easyidentification of areas w
● Privacy protection, provided by antiphishing and antimalware filtering for yourweb browsing.● Automatic updates.To turn the Autopilot on or off, fol
● Auto Update is turned off.● The Bitdefender toolbar in your web browser is disabled when you playbrowser-based online games.While in Game Mode, the
4. In the General Settings window, select the General tab.5. Click the Game list link.Two buttons are available at the bottom of the list:● Add game -
Bitdefender detects when your laptop has switched to battery power and itautomatically enters Laptop Mode. Likewise, Bitdefender automatically exits L
4. In the General Settings window, select the General tab.5. Turn off password protection by clicking the switch. Enter the password and thenclick OK.
6. Bitdefender interfaceBitdefender Internet Security 2013 meets the needs of computer beginners andvery technical people alike. Its graphical user in
Each man has his price BobAnd yours was pretty lowBitdefender Internet Security 2013
● Hide / Show Security Widget - enables / disables Security Widget.● Update Now - starts an immediate update. You can follow the update status inthe U
DescriptionLinkOpens a web page in your browser where you can take a shortsurvey about your experience in using the product. We relyFeedbackon your fe
● Autopilot / User Mode allows you to engage the Autopilot and enjoy completelysilent security. For detailed information, please refer to “Autopilot”
● Vulnerability Scan● Rescue ModeThe Autoscan switch allows you to turn the Autoscan feature on or off.For more information about scan tasks and how t
UpdateIn a world where cyber criminals constantly try to come up with new ways tocause harm, it is essential to keep your security solution up to date
6.3. Settings Overview windowThe Settings Overview window gives you access to the advanced settings of yourproduct. This is where you can configure Bi
● scan files or folders by dragging and dropping one or multiple items over thewidget.Security WidgetThe overall security status of your computer is d
real-time antivirus scanning activity. The taller the blue bar, the more intense is theactivity of this module.The button on the lower side of the wid
7. Registering BitdefenderIn order to be protected by Bitdefender, you must register your product with alicense key. The license key specifies how lon
Bitdefender will alert you when the expiration date of your current license isapproaching. Follow the instructions in the alert to purchase a new lice
Table of ContentsInstallation ... 11. Preparing for installation ... . . . . ...
8. MyBitdefender accountThe online features of your product and additional Bitdefender services are availableexclusively through MyBitdefender. You mu
2. Click MyBitdefender at the top of the window and then select Account settingsfrom the drop-down menu.If you have already logged in to an account, t
I already have a MyBitdefender accountIf you already have an account but you have not logged in to it yet, follow thesesteps to log in:1. Type the e-m
9. Keeping Bitdefender up-to-dateNew malware is found and identified every day. This is why it is very important tokeep Bitdefender up to date with th
You can find out when updates were initiated and information about them (whetherthey were successful or not, if they require a restart to complete the
1. Open the Bitdefender window.2. Click the Settings button on the upper toolbar.3. In the Settings Overview window, select Update.4. In the Update Se
How to38Bitdefender Internet Security 2013
10. Installation10.1. How do I install Bitdefender on a second computer?If you have purchased a license key for more than one computer, you can use th
● Bitdefender Internet Security 2013● Bitdefender Total Security 2013If you want to install another Bitdefender 2013 product on your system than theon
11. Registration11.1. What Bitdefender product am I using?To find out which Bitdefender program you have installed, follow these steps:1. Open the Bit
9.4. Adjusting update settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36How to ...
11.4. How do I register Bitdefender without an Internetconnection?If you just purchased Bitdefender and you do not have an Internet connection, youcan
4. A web page will open on your web browser where you can purchase aBitdefender license key.NoteAs an alternative, you can contact the retailer you bo
12. Scanning with Bitdefender12.1. How do I scan a file or a folder?The easiest and recommended way to scan a file or folder is to right-click the obj
You can easily configure the scanning options by adjusting the scan level. Dragthe slider along the scale to set the desired scan level.You can also c
12.5. What to do when Bitdefender detected a clean file asinfected?There are cases when Bitdefender mistakenly flags a legitimate file as being a thre
1. Open the Bitdefender window.2. Click the Events button on the upper toolbar.3. In the Events Overview window, select Antivirus.4. In the Antivirus
13. Parental Control13.1. How do I protect my children from online threats?Bitdefender Parental Control allows you to restrict access to Internet and
2. Go to: https://my.bitdefender.com3. Log in to your account using your user name and password.4. Click Parental Control to access the dashboard.5. S
If you need to restrict access to a game or an application, you can use BitdefenderParental Control even when you are not at home.To block access to a
2. Click Start, click Control Panel, and then click User Accounts.3. Click Create a new account.4. Type the name for the user. You can use the person&
16.1.2. Adjusting the real-time protection level . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6216.1.3. Configuring the real time protect
14. Privacy Control14.1. How do I make sure my online transaction is secure?To make sure your online operations remain private, you can use the browse
1. Right-click the file or folder you want to permanently delete, point to Bitdefenderand select File Shredder.2. A confirmation window will appear. C
15. Useful Information15.1. How do I automatically shut down the computer afterthe scan is over?Bitdefender offers multiple scan tasks that you can us
To manage the proxy settings, follow these steps:1. Open the Bitdefender window.2. Click the Settings button on the upper toolbar.3. In the Settings O
● For Windows Vista and Windows 7:1. Click Start.2. Locate Computer on the Start menu.3. Right-click Computer and select Properties.4. Look under Syst
2. Wait a few moments until the installed software list is displayed.3. Find the name of the program you want to remove and select Uninstall.4. Wait f
To start Windows in Safe Mode:1. Restart the computer.2. Press the F8 key several times before Windows starts in order to access the bootmenu.3. Selec
Managing your security59Bitdefender Internet Security 2013
16. Antivirus protectionBitdefender protects your computer from all kinds of malware (viruses, Trojans,spyware, rootkits and so on). The protection Bi
To protect you against unknown malicious applications, Bitdefender uses ActiveVirus Control, an advanced heuristic technology, which continuously moni
18.3. Data protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9818.3.1. About da
WarningThis is a critical security issue. We recommend you to disable real-time protectionfor as little time as possible. If real-time protection is d
● Scan options for accessed files. You can set Bitdefender to scan all accessedfiles or applications (program files) only. Scanning all accessed files
Though not recommended, you can disable e-mail, web or instant messagingantivirus scan to increase system performance. If you disable the correspondin
Files that cannot be disinfected are moved to quarantine in order to containthe infection. Quarantined files cannot be executed or opened; therefore,
16.2. On-demand scanningThe main objective for Bitdefender is to keep your computer clean of viruses. Thisis first and foremost done by keeping new vi
16.2.3. Running a Quick ScanQuick Scan uses in-the-cloud scanning to detect malware running in your system.Running a Quick Scan usually takes less tha
unresolved threats, you will be prompted to choose the actions to be taken onthem.16.2.5. Configuring a custom scanTo configure a scan for malware in
To save a recently run custom scan to the favorite scans list, follow these steps:1. Open the custom scan configuration window.a. Open the Bitdefender
system only if the infected file is extracted from the archive and executed withouthaving real-time protection enabled. However, it is recommended to
Step 1 - Perform scanBitdefender will start scanning the selected objects. You can see real-time informationabout the scan status and statistics (incl
25.5. I cannot access a device on my network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13025.6. My Internet is slow . . . . . . .
You can choose an overall action to be taken for all issues or you can select separateactions for each group of issues. One or several of the followin
Take no actionNo action will be taken on the detected files. After the scan is completed, youcan open the scan log to view information on these files.
16.3. Automatic scan of removable mediaBitdefender automatically detects when you connect a removable storage deviceto your computer and scans it in t
● In some cases, Bitdefender may not be able remove malware from specific filesdue to legal or technical constraints. Such an example are files archiv
2. Click the Settings button on the upper toolbar.3. In the Settings Overview window, select Antivirus.4. In the Antivirus Settings window, select the
a. Click the Add button, located at the top of the exclusions table.b. Enter the extensions that you want to be excluded from scanning, separatingthem
In addition, Bitdefender scans the quarantined files after each malware signatureupdate. Cleaned files are automatically moved back to their original
16.6.1. Checking detected applicationsTo check the applications detected by Active Virus Control, follow these steps:1. Open the Bitdefender window.2.
NoteAs you set the protection level higher, Active Virus Control will require fewer signsof malware-like behavior to report a process. This will lead
16.7. Fixing system vulnerabilitiesAn important step in protecting your computer against malicious persons andapplications is to keep up to date the o
Installation1Bitdefender Internet Security 2013
e. Weak passwordsYou can see the list of the Windows user accounts configured on your computerand the level of protection their password provides.Clic
ImportantTo be automatically notified about system or application vulnerabilities, keep theAutomatic Vulnerability Scan enabled.6. Choose the system v
17. AntispamSpam is a term used to describe unsolicited e-mail. Spam is a growing problem,both for individuals and for organizations. It's not pr
Friends list / Spammers listMost people communicate regularly to a group of people or even receive messagesfrom companies or organizations in the same
If the spam score exceeds the threshold level, the e-mail is considered SPAM. Thethreshhold level is defined by the antispam sensitivity level. For mo
NoteIf the e-mail is tagged as SEXUALLY EXPLICIT in the subject line, Bitdefender willconsider it SPAM.If the spam score exceeds the threshold level,
ImportantBitdefender integrates into the most commonly used mail clients through aneasy-to-use antispam toolbar. For a complete list of supported mail
4. Click the Add Friend button on the Bitdefender antispam toolbar to add thesender to the Friends list. You may need to click OK to acknowledge. You
17.4. Configuring the Friends ListThe Friends list is a list of all the e-mail addresses from which you always want toreceive messages, regardless of
17.5. Configuring the Spammers ListThe Spammers list is a list of all the e-mail addresses from which you don't wantto receive messages, regardle
Kommentare zu diesen Handbüchern