Bitdefender Total Security 2010 Podręcznik Użytkownika

Przeglądaj online lub pobierz Podręcznik Użytkownika dla Oprogramowanie antywirusowe Bitdefender Total Security 2010. Bitdefender total security 2010 Instrukcja obsługi

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj

Podsumowanie treści

Strona 1 - User's guide

User's guideCopyright© 2010 BitDefender

Strona 2

31.1. Scan with BitDefender . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33631.2. BitDefender File Va

Strona 3 - And yours was pretty low

AnalyzingWait for the Disk Defragmenter to finish the analysis. If you want to cancel theoperation, just click Cancel.Step 2/3 - View Analysis ReportA

Strona 4 - Table of Contents

Analysis ReportCheck the analysis report.If no disk volume needs defragmenting, click Close to close the window. Otherwise,select the Defragment optio

Strona 5

DefragmentingWait for the disk defragmenting to complete. You can cancel disk defragmentationat any time by clicking Abort.Step 3/3 - View Defragmenta

Strona 6

Defragmentation ReportClick Close to close the window.11.5.2. PC Cleanup WizardThis wizard removes unnecessary files from the disk, including temporar

Strona 7

Welcome WindowClick Next.Step 2/3 - Deleting Files...The cleaner will start deleting the temporary Internet files and cookies.Wizards85BitDefender Tot

Strona 8

Deleting Files...Wait for the Cleaner to delete the temporary Internet files and the cookies. If youwant to cancel the operation, just click Cancel.St

Strona 9

Results SummaryYou can see statistics regarding the deleted objects.Click Close to close the window.11.5.3. Duplicate Finder WizardThis wizard helps y

Strona 10

Search TargetClick Add Target and select a location where the Duplicate Finder should searchfor duplicate files. The path to the selected location wil

Strona 11

Searching...You can see the search status and statistics.Wait for the Duplicate Finder to complete the search for duplicate files. If you wantto cance

Strona 12

ActionsThe duplicate files detected are organized and displayed as groups. If you clicknext to a group, you can see detailed information about the dup

Strona 13

39.5. BitDefender Removal Failed . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38440. Support ... . .. . ... . .

Strona 14

choose to take no action on a particular group, then the overall action will apply toall except that particular group.Click Next.Step 4/4 - View Resul

Strona 15

StatusYou can see when the Registry Cleaner was run last and the BitDefenderrecommendation.Click Next.Step 2/4 - Scanning...The Registry Cleaner will

Strona 16

Scanning...You can see the last registry key scanned and the related statistics.Wait for the Registry Cleaner to complete the registry key scan. If yo

Strona 17 - 1.2. Admonitions

ActionsYou can see all the invalid or orphan registry keys detected. Detailed informationis provided about each registry key (name, value, priority, c

Strona 18 - 2. Book Structure

DescriptionCategoryRegistry keys that contain information on the locationof shared DLLs (Dynamic Link Libraries). DLLs storeShared DLLsfunctions that

Strona 19 - 3. Request for Comments

Results SummaryIf you did not choose to delete all the registry keys, a warning text will be displayed.We recommend you to review the respective issue

Strona 20 - Installation and Removal

StatusYou can see a list of time points when the Windows Registry was cleaned. Selectthe time point to restore the Windows Registry to.If you are sure

Strona 21 - 1. System Requirements

ResultsClick Close to close the window.11.5.6. File Shredder WizardThis wizard helps you permanently erase files and their traces from your system.Use

Strona 22 - System Requirements

TargetClick Add Target, select the file or folder that you want to delete and click OK. Thepath to the selected location will appear in the Path colum

Strona 23 - 2. Preparing for Installation

Deleting...Wait for the file shredding operation to complete. If you want to cancel the operation,just click Cancel.Step 3/3 - View Results SummaryAft

Strona 24 - 3. Installing BitDefender

End User Software License AgreementIF YOU DO NOT AGREE TO THESE TERMS AND CONDITIONS DO NOT INSTALL THESOFTWARE. BY SELECTING "I ACCEPT", &q

Strona 25 - Installing BitDefender

Results SummaryClick Close to close the window.11.6. File Vault WizardsThe File Vault wizards help you create and manage BitDefender file vaults. A fi

Strona 26

11.6.1. Add Files to VaultThis wizard helps you create a file vault and add files to it in order to safely storethem on your computer.Step 1/6 - Selec

Strona 27 - 3.1. Registration Wizard

Select VaultIf you select Browse for a File Vault, you must click Browse and select the filevault. You will go either to the step 5 if the selected va

Strona 28

Create VaultTo complete the file vault related information follow these steps:1. Click Browse and choose a location for the bvd file.NoteRemember that

Strona 29

You will go to the step 5.Step 4/6 - PasswordThis is where you will be asked to enter the password for the selected vault.Enter passwordType the passw

Strona 30

SummaryClick Next.Step 6/6 - ResultsThis is where you can view the vault content.Wizards106BitDefender Total Security 2010

Strona 31 - 3.2. Configuration Wizard

ResultsClick Finish.11.6.2. Remove Vault FilesThis wizard helps you remove files from a specific file vault.Step 1/5 - Select VaultHere you can specif

Strona 32

Select VaultIf you select Browse for a File Vault, you must click Browse and select the filevault. You will go either to the step 3 if the selected va

Strona 33

Enter passwordType the password into the corresponding field and click Next.Step 3/5 - Select filesThis is where you will be provided with the list of

Strona 34

Select filesSelect the files to be removed and click Next.Step 4/5 - SummaryThis is where you can review chosen operations.Wizards110BitDefender Total

Strona 35

TERM OF LICENSE. The license granted hereunder shall commence on the purchasingdate of BitDefender and shall expire at the end of the period for which

Strona 36

SummaryClick Next.Step 5/5 - ResultsThis is where you can view operation result.Wizards111BitDefender Total Security 2010

Strona 37 - 3.2.7. Step 7 - Finish

ResultsClick Finish.11.6.3. View File VaultThis wizard helps you open a specific file vault and view the files it contains.Step 1/4 - Select VaultHere

Strona 38 - 4. Upgrade

Select VaultIf you select Browse for a File Vault, you must click Browse and select the filevault. You will go either to the step 3 if the selected va

Strona 39

Enter passwordType the password into the corresponding field and click Next.Step 3/4 - SummaryThis is where you can review chosen operations.Wizards11

Strona 40 - Getting Started

SummaryClick Next.Step 4/4 - ResultsThis is where you can view the files of the vault.Wizards115BitDefender Total Security 2010

Strona 41 - 6. Overview

ResultsClick Finish.11.6.4. Lock File VaultThis wizard helps you lock a specific file vault in order to protect its content.Step 1/3 - Select VaultHer

Strona 42 - 6.2.1. Novice Mode

Select VaultIf you select Browse for a File Vault, you must click Browse and select the filevault.If you click Select an existing File Vault, then you

Strona 43

SummaryClick Next.Step 3/3 - ResultsThis is where you can view operation result.Wizards118BitDefender Total Security 2010

Strona 44

ResultsClick Finish.Wizards119BitDefender Total Security 2010

Strona 45 - 6.2.2. Intermediate Mode

Intermediate Mode120BitDefender Total Security 2010

Strona 46 - 6.2.3. Expert Mode

CONDITIONS, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OFMERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE, NONINTERFERENCE, ACCURAC

Strona 47

12. DashboardThe Dashboard tab provides information regarding the security status of yourcomputer and allows you to fix pending issues.DashboardThe da

Strona 48

Red circle with an exclamation mark: There are issues that affect thesecurity of your system. Critical issues require your immediate attention.Non-cri

Strona 49 - 6.3. System Tray Icon

13. SecurityBitDefender comes with a Security module that helps you keep your BitDefenderup to date and your computer virus free. To enter the Securit

Strona 50 - 6.4. Scan Activity Bar

Red circle with an exclamation mark: Issues affect the component.The sentences describing issues are written in red. Just click the Fix buttoncorrespo

Strona 51 - 6.5. BitDefender Manual Scan

DescriptionIssueThe malware signatures of your BitDefender productare outdated.The update has not beenperformed for x days● Firewall - BitDefender mon

Strona 52

13.2. Quick TasksThis is where you can find links to the most important security tasks:● Update Now - starts an immediate update.● System Scan - start

Strona 53 - 6.6.1. Game Mode

The update process is performed on the fly, meaning that the files to be updatedare replaced progressively. In this way, the update process will not a

Strona 54 - 6.6.2. Laptop Mode

the scanning process. For detailed information about this wizard, please refer to“Antivirus Scan Wizard” (p. 53).When you run a Custom Scan, the Custo

Strona 55

Here you can see the status of Parental Control for each Windows user account andyou can configure the Parental Control rules. This configuration wind

Strona 56

14. Tune-UpBitDefender comes with a Tune-Up module that helps you maintain the integrity ofyour system. The maintenance tools offered are critical for

Strona 57 - 7. Fixing Issues

adapt them and to prevent the unlicensed or illegal use of the product or thedamages resulting from the malware products. You accept that BitDefender

Strona 58 - Fixing Issues

To run a recommended task, click the corresponding Run Now button and followthe wizard.14.1.1. Configuring Status TrackingClick Configure Status Track

Strona 59

14.2.1. Cleaning Windows RegistryThe Windows Registry is an important part of the Windows-based operating systems.It is a database that contains infor

Strona 60 - 8. Configuring Basic Settings

To detect and delete duplicate files on your computer, you can use the DuplicateFinder. In this way you can improve the management of the free space o

Strona 61 - 8.1. User Interface Settings

To prevent sensitive data from being recovered after you delete it, you can useBitDefender to permanently delete that data by physically removing it f

Strona 62 - 8.2. Security Settings

15. File StorageBitDefender comes with a File Storage module that helps you keep your data notonly safe, but confidential. To achieve this goal, backu

Strona 63 - 8.3. General Settings

File StorageThe File Storage module consists of two sections:● Status Area - Allows you to see the full list of monitored components. You canchoose wh

Strona 64 - Configuring Basic Settings

The status area in the File Storage tab offers information regarding the status ofthe following components:● File Encryption monitors the status of th

Strona 65 - 9. History and Events

16. NetworkThe Network module allows you to manage the BitDefender products installed onyour home computers from a single computer. To enter the Netwo

Strona 66 - History and Events

● Scan All - allows you to scan all managed computers at the same time.● Update All allows you to update all managed computers at the same time.● Regi

Strona 67 - Registration and My Account

2. Type the home management password and click OK. A new window will appear.Add ComputerYou can see the list of computers in the network. The icon mea

Strona 68 - 10.2. Activating BitDefender

BitDefender’s privacy policy guarantees you the right to access, rectify, eliminateand object to the processing of data by notifying BitDefender via e

Strona 69

Authenticate5. Type the home management password configured on the respective computer.6. Click OK. If you have provided the correct password, the sel

Strona 70

Network MapIf you move the mouse cursor over a computer from the network map, you can seebrief information about it (name, IP address, number of issue

Strona 71 - 10.4. Renewing Your License

Allows you to fix the issues that are affecting the security of this computer byfollowing the Fix All Issues wizard.● View History/EventsAllows you ac

Strona 72 - 11. Wizards

16.1.4. Scanning All ComputersTo scan all managed computers, follow these steps:1. Click Scan All. You will be prompted to provide the local home mana

Strona 73

Enter Password2. Click OK.16.1.6. Registering All ComputersTo register all managed computers, follow these steps:1. Click Register All. You will be pr

Strona 74

Expert Mode146BitDefender Total Security 2010

Strona 75

17. GeneralThe General module provides information on the BitDefender activity and the system.Here you can also change the overall behavior of BitDefe

Strona 76 - 11.2. Custom Scan Wizard

● Network Activity - Indicates the evolution of the network traffic filtered byBitDefender Firewall. The height of the bar indicates the intensity of

Strona 77

DescriptionIssueAn on demand system scan was never performedto check if files stored on your computer are malwarefree.You have never scannedyour compu

Strona 78 - DescriptionOption

DescriptionStatusBitDefender does not check for potentialvulnerabilities regarding missing Windows updates,application updates or weak passwords.Vulne

Strona 79

PrefaceThis guide is intended to all users who have chosen BitDefender Total Security2010 as a security solution for their personal computers. The inf

Strona 80 - DescriptionScan Level

17.1.2. StatisticsIf you want to keep an eye on the BitDefender activity, a good place to start is theStatistics section. You can see the following it

Strona 81

DescriptionItemIndicates the number of days left until the license keyexpires. If your license key expires within the followingExpires indays, please

Strona 82 - 11.2.5. Step 5/6 - Scanning

NoteIf you are not the only person with administrative rights using this computer, it isrecommended that you protect your BitDefender settings with a

Strona 83 - Scanning

●Scan Activity BarShow the Scan Activity bar (on screen graph ofproduct activity) - displays the Scan Activity barwhenever you log on to Windows. Clea

Strona 84

System InformationThe list contains all the items loaded when starting the system as well as the itemsloaded by different applications.Three buttons a

Strona 85 - Vulnerabilities

18. AntivirusBitDefender protects your computer from all kinds of malware (viruses, Trojans,spyware, rootkits and so on). The protection BitDefender o

Strona 86 - Vulnerability Check

Real-time ProtectionYou can see whether Real-time protection is enabled or disabled. If you want tochange the Real-time protection status, clear or se

Strona 87

DescriptionProtection levelOnly programs and incoming mail messages are scanned forviruses. Besides the classical signature-based scan, the heuristica

Strona 88

Shield SettingsThe scan options are organized as an expandable menu, very similar to those usedfor exploration in Windows. Click the box with "+&

Strona 89

DescriptionOption.doc; .dot; .xls; .ppt; .wbk; .wiz; .pot;.ppa; .xla; .xlt; .vbs; .vbe; .mdb; .rtf;.htm; .hta; .html; .xml; .xtp; .php;.asp; .js; .shs

Strona 90

NoteThe note is just a short observation. Although you can omit it, the notes can providevaluable information, such as specific feature or a link to s

Strona 91 - 11.4.1. Local Backup Wizard

DescriptionOptionMoves infected files into the quarantine.Quarantined files cannot be executed orMove file toquarantineopened; therefore, the risk of

Strona 92

DescriptionOptionScans all incoming e-mail messages.Scan incoming e-mailScans all outgoing e-mail messages.Scan outgoing e-mail● Scan web (HTTP) traff

Strona 93

Active Virus Control AlertIf you know and trust the detected application,click Allow.If you want to immediately close the application,click OK.Select

Strona 94

ImportantKeep the Active Virus Control enabled in order to be protected against unknownviruses.If you want to be alerted and prompted for action by Ac

Strona 95 - Step 5/5 - Summary

Remove - remove an application from the list.Edit - edit an application rule.18.1.4. Disabling Real-time ProtectionIf you want to disable real-time pr

Strona 96 - 11.4.2. Local Restore Wizard

Antiphishing White ListYou can see the web sites that BitDefender does not currently check for phishingcontent.To add a new web site to the white list

Strona 97

There is a risk that a virus is already lodged in your system, before you even installBitDefender. This is why it's a very good idea to scan your

Strona 98

● System tasks - contains the list of default system tasks. The following tasks areavailable:DescriptionDefault TaskScans the entire system. In the de

Strona 99 - 11.5. Tuneup Wizards

When a task is scheduled to run automatically, at a later moment or regularly, theSchedule button is displayed to the right of the task. Click this bu

Strona 100

● Clone Task - duplicates the selected task. This is useful when creating new tasks,as you can modify the settings of the task duplicate.● Delete - de

Strona 101

3. Request for CommentsWe invite you to help us improve the book. We have tested and verified all of theinformation to the best of our ability. Please

Strona 102

OverviewHere you can see information about the task (name, last run and schedule status)and set the scan settings.Choosing Scan LevelYou can easily co

Strona 103 - 11.5.2. PC Cleanup Wizard

DescriptionProtection levelAll files and archives are scanned for viruses and spyware.Besides the classical signature-based scan, the heuristicanalysi

Strona 104 - Step 2/3 - Deleting Files

The scan options are organized as an expandable menu, very similar to those usedfor exploration in Windows. Click the box with "+" to open a

Strona 105

DescriptionOptionwbk; wiz; pot; ppa; xla; xlt; vbs; vbe;mdb; rtf; htm; hta; html; xml; xtp; php;asp; js; shs; chm; lnk; pif; prc; url; smm;pdf; msi; i

Strona 106

DescriptionActionNo action will be taken on infected files. Thesefiles will appear in the report file.Take No ActionRemove the malware code from the i

Strona 107 - Step 2/4 - Searching

DescriptionActionMoves hidden files into the quarantine.Quarantined files cannot be executed or opened;therefore, the risk of getting infected disappe

Strona 108 - Step 3/4 - Select Action

– Action to take when an encrypted suspect file is found. Select theaction to be taken on suspicious files that are encrypted using Windows. Thefollow

Strona 109 - DescriptionAction

Scan TargetYou can see the list of local, network and removable drives as well as the files orfolders added previously, if any. All checked items will

Strona 110 - Step 1/4 - Initiate Scanning

● All Entries - to scan all drives, no matter if they are local, in the network orremovable.NoteIf you want to scan your entire computer, select the c

Strona 111 - Step 2/4 - Scanning

Scheduling Scan TasksWith complex tasks, the scanning process will take some time and it will work bestif you close all other programs. That is why it

Strona 112

BitDefender Total Security 2010User's guidePublished 2010.04.07Copyright© 2010 BitDefenderLegal NoticeAll rights reserved. No part of this book m

Strona 113 - DescriptionCategory

Installation and Removal1BitDefender Total Security 2010

Strona 114

Click OK to save the changes and close the window. To run the task, just click Scan.18.2.5. Scanning Files and FoldersBefore you initiate a scanning p

Strona 115 - Important

Immediate ScanningTo scan your computer or part of it you can run the default scan tasks or your ownscan tasks. This is called immediate scanning.To r

Strona 116 - Step 2/2 - View Results

Drag FileDrop FileThe Antivirus Scan wizard will appear and guide you through the scanning process.Manual ScanningManual scanning consists in directly

Strona 117 - 11.5.6. File Shredder Wizard

Manual ScanningClick Add Folder, select the location you want to scan and click OK. If you want toscan multiple folders, repeat this action for each a

Strona 118

ScanningYou can see the scan status and statistics (scanning speed, elapsed time, numberof scanned / infected / suspicious / hidden objects and other)

Strona 119

Stopping or pausing the scan. You can stop scanning anytime you want byclicking Stop&Yes. You will go directly to the last step of the wizard. To

Strona 120 - 11.6. File Vault Wizards

DescriptionActionRemoves the malware code from infected files.DisinfectDeletes detected files.DeleteMoves detected files to quarantine. Quarantined fi

Strona 121 - 11.6.1. Add Files to Vault

SummaryYou can see the results summary. If you want comprehensive information on thescanning process, click View log to view the scan log.ImportantIf

Strona 122 - Step 3/6 - Create Vault

18.2.6. Viewing Scan LogsTo see the scan results after a task has run, right-click the task and select ViewLogs. The following window will appear:Scan

Strona 123

Scan Log ExampleThe scan log contains detailed information about the logged scanning process, suchas scanning options, the scanning target, the threat

Strona 124 - Step 5/6 - Summary

1. System RequirementsYou may install BitDefender Total Security 2010 only on computers running thefollowing operating systems:● Windows XP (32/64 bit

Strona 125 - Step 6/6 - Results

ExceptionsYou can see the objects (files, folders, extensions) that are excluded from scanning.For each object you can see if it is excluded from on-a

Strona 126 - 11.6.2. Remove Vault Files

You can click Discard to revert the changes made to the rule table, provided thatyou have not saved them by clicking Apply.18.3.1. Excluding Paths fro

Strona 127 - Step 2/5 - Password

Step 2/4 - Specify Excluded PathsExcluded PathsTo specify the paths to be excluded from scanning use either of the followingmethods:● Click Browse, se

Strona 128 - Step 3/5 - Select files

Step 3/4 - Select Scanning TypeScanning TypeYou can see a table containing the paths to be excluded from scanning and the typeof scanning they are exc

Strona 129 - Step 4/5 - Summary

Step 4/4 - Scan Excluded FilesScan Excluded FilesIt is highly recommended to scan the files in the specified paths to make sure thatthey are not infec

Strona 130 - Step 5/5 - Results

Step 1/4 - Select Object TypeObject TypeSelect the option of excluding extensions from scanning.Click Next.Antivirus196BitDefender Total Security 2010

Strona 131 - 11.6.3. View File Vault

Step 2/4 - Specify Excluded ExtensionsExcluded ExtensionsTo specify the extensions to be excluded from scanning use either of the followingmethods:● S

Strona 132 - Step 2/4 - Password

Step 3/4 - Select Scanning TypeScanning TypeYou can see a table containing the extensions to be excluded from scanning andthe type of scanning they ar

Strona 133 - Step 3/4 - Summary

Step 4/4 - Select Scanning TypeScanning TypeIt is highly recommended to scan the files having the specified extensions to makesure that they are not i

Strona 134 - Step 4/4 - Results

QuarantineThe Quarantine section displays all the files currently isolated in the Quarantinefolder. For each quarantined file, you can see its name, t

Strona 135 - 11.6.4. Lock File Vault

● Yahoo Messenger 8.5● Windows Live Messenger 8Antispam protection is provided for all POP3/SMTP e-mail clients. The BitDefenderAntispam toolbar howev

Strona 136 - Step 2/3 - Summary

18.4.2. Configuring Quarantine SettingsTo configure the quarantine settings, click Settings. A new window will appear.Quarantine SettingsUsing the qua

Strona 137 - Step 3/3 - Results

Automatically submit files. To automatically submit quarantined files, checkthe corresponding option. You must specify the frequency with which to sub

Strona 138 - Click Finish

19. AntispamBitDefender Antispam employs remarkable technological innovations and industrystandard antispam filters to weed out spam before it reaches

Strona 139 - Intermediate Mode

Image FilterSince avoiding heuristic filter detection has become quite a challenge, nowadays'inbox folders are full with more and more messages o

Strona 140 - 12. Dashboard

trace a certain scent. Sometimes the filter must be corrected too - prompted toadjust when it makes a wrong decision.ImportantYou can correct the Baye

Strona 141 - Dashboard

characteristics of SPAM. The result is that it will add a Spam score to the e-mail,too.NoteIf the e-mail is tagged as SEXUALLY EXPLICIT in the subject

Strona 142 - 13. Security

Antispam StatusYou can see whether Antispam is enabled or disabled. If you want to change theAntispam status, clear or select the corresponding check

Strona 143 - Security

DescriptionProtection levelOffers protection for accounts that receive a lot oflegitimate commercial mail. The filter will let mostPermissivee-mail pa

Strona 144

Friends ListHere you can add or remove entries from the Friends list.If you want to add an e-mail address check the E-mail address option, type in the

Strona 145 - 13.2. Quick Tasks

You can save the Friends list to a file so that you can use it on another computer orafter reinstalling the product. To save the Friends list, click t

Strona 146

2. Preparing for InstallationBefore you install BitDefender Total Security 2010, complete these preparations toensure the installation will go smoothl

Strona 147

Spammers ListHere you can add or remove entries from the Spammers list.If you want to add an e-mail address check the Email address option, type in th

Strona 148

from any registered user of such a service will be detected as spam. If, for example,you add yahoo.com to the Spammers list, all e-mail messages comin

Strona 149 - 14. Tune-Up

Antispam SettingsThree categories of options are available (Antispam settings, Basic Antispamfilters and Advanced Antispam filters) organized like an

Strona 150 - 14.2. Quick Tasks

19.3.2. Basic Antispam Filters● Enable Friends/Spammers lists - filter e-mail messages using theFriends/Spammers lists.▶ Automatically add recipients

Strona 151

20. Parental ControlBitDefender Parental Control enables you to control the access to the Internet andto specific applications for each user holding a

Strona 152 - 14.2.4. Cleaning Up Your PC

Parental ControlYou can see information regarding the Parental Control status for each Windowsuser account. The age category is listed below each user

Strona 153

Parental Control StatusTo configure the Parental Control for this user account, follow these steps:1. Enable the Parental Control for this user accoun

Strona 154 - 15. File Storage

● Web - to filter web navigation according to the rules set by you in the Websection.● Applications - to block access to the applications specified by

Strona 155 - 15.1. Status Area

To set the password protection, do the following:1. Type the password in the Password field.2. Type the password again in the Retype Password field to

Strona 156 - 15.2. Quick Tasks

Web Filter CategoriesSelect the check box corresponding to a category you want to block and the userwill no longer be allowed to access websites match

Strona 157 - 16. Network

3. Installing BitDefenderYou can install BitDefender from the BitDefender installation CD or using theinstallation file downloaded on your computer fr

Strona 158

● Teenager Profile Categories includes content that may be considered safe forchildren between 14 and 18 years old.DescriptionCategoryWebsites used to

Strona 159

● Send me an activity report via e-mail. An e-mail notification is sent everytime BitDefender Parental Control blocks an activity.● Save an internet t

Strona 160

● If the server uses a different port than the default port 25, type it in thecorresponding field.● Sender's e-mail address - type the address yo

Strona 161

Web ControlTo enable this protection select the check box corresponding to Enable WebControl.20.3.1. Creating Web Control RulesTo allow or block acces

Strona 162

Specify Website2. Enter the website address in the Website field.3. Select the desired action for this rule - Allow or Block.4. Click Finish to add th

Strona 163

NoteBitDefender will perform updates every hour no matter the settings of the Web TimeLimiter.To configure the Web Time Limiter for a specific user, c

Strona 164

can be blocked this way. Applications blocked in this manner are also protectedfrom modifications, and cannot be copied or moved. You can block applic

Strona 165 - Expert Mode

Specify Application2. Click Browse to locate the application to which you want to block/restrict access.3. Select the action of the rule:● Block perma

Strona 166 - 17. General

20.6. Keywords ControlKeywords Control helps you block users' access to e-mail messages, web pages andinstant messages that contain specific word

Strona 167 - 17.1.1. Overall Status

Specify Keyword2. Type the word or phrase you want to block in the edit field. If you want only wholewords to be detected, select the Match whole word

Strona 168 - DescriptionIssue

Installation StepsFollow these steps to install BitDefender Total Security 2010:1. Click Next. You can cancel installation anytime you want by clickin

Strona 169 - DescriptionStatus

NoteThe IM Control is only available for Yahoo Messenger and Windows Live (MSN)Messenger.To configure IM Control for a specific user account, click th

Strona 170 - 17.1.3. Overview

Add IM contact2. Type the contact's name in the Name field.3. Type the e-mail address or the user name used by the IM contact in the E-mailor IM

Strona 171 - 17.2. Settings

21. Privacy ControlBitDefender monitors dozens of potential “hotspots” in your system where spywaremight act, and also checks any changes made to your

Strona 172

● Identity Control - protects your confidential data by filtering all outgoing web(HTTP), e-mail (SMTP) and instant messaging traffic according to the

Strona 173 - 17.3. System Information

You can create rules to protect any piece of information you might consider personalor confidential, from your phone number or e-mail address to your

Strona 174

Identity ControlIf you want to use Identity Control, follow these steps:1. Select the Enable Identity Control check box.2. Create rules to protect you

Strona 175 - 18. Antivirus

Step 1/4 - Welcome WindowWelcome WindowClick Next.Step 2/4 - Set Rule Type and DataSet Rule Type and DataYou must set the following parameters:Privacy

Strona 176 - Antivirus

● Rule Name - type the name of the rule in this edit field.● Rule Type - choose the rule type (address, name, credit card, PIN, SSN etc).● Rule Data -

Strona 177

You can choose to apply the rule only if the rule data matches whole words or if therule data and the detected string case match.Specify the users for

Strona 178

To open the window where you can manage exceptions, click Exclusions.ExclusionsTo add an exception, follow these steps:1. Click the Add button to add

Strona 179

● Typical - to install the program immediately, using the default installationoptions. If you choose this option, skip to Step 6.● Custom - to configu

Strona 180

Edit RuleHere you can change the name, description and parameters of the rule (type, dataand traffic). Click OK to save the changes.21.2.4. Rules Defi

Strona 181

Registry Control keeps an eye on the Windows Registry - this is again useful fordetecting Trojan horses. It will alert you whenever a program will try

Strona 182

Registry ControlYou can see the rules created so far listed in the table.To delete a rule, select it and click the Delete button.21.4. Cookie ControlC

Strona 183 - Configuring Protection Level

Cookie AlertYou can see the name of the application that is tryingto send the cookie file.Click Yes or No and a rule will be created, applied andliste

Strona 184

Cookie ControlYou can see the rules created so far listed in the table.To delete a rule, select it and click the Delete button. To modify the rulepara

Strona 185 - 18.2. On-demand Scanning

Select Address, Action and DirectionYou can set the parameters:● Domain address - type in the domain on which the rule should apply.● Action - select

Strona 186 - 18.2.1. Scan Tasks

21.5. Script ControlScripts and other codes such as ActiveX controls and Java applets, which are usedto create interactive web pages, can be programme

Strona 187

Script ControlYou can see the rules created so far listed in the table.To delete a rule, select it and click the Delete button. To modify the rulepara

Strona 188 - 18.2.2. Using Shortcut Menu

Select Address and ActionYou can set the parameters:● Domain address - type in the domain on which the rule should apply.● Action - select the action

Strona 189 - 18.2.3. Creating Scan Tasks

22. FirewallThe Firewall protects your computer from inbound and outbound unauthorizedconnection attempts. It is quite similar to a guard at your gate

Strona 190

ImportantAfter completing the installation and restarting the computer, a registration wizardand a configuration wizard will appear. Complete these wi

Strona 191

You can see whether the BitDefender firewall is enabled or disabled. If you want tochange the firewall status, clear or select the corresponding check

Strona 192

DescriptionDefault actionApplies the current rules and allows all traffic attemptsthat do not match any of the current rules withoutAllow Allprompting

Strona 193

NoteThis option does not automatically enable ICS on your system, but only allows thistype of connection in case you enable it from your operating sys

Strona 194

● Enable Intrusion Detection (IDS) - activates the heuristic monitoring of theapplications trying to access network services or the Internet.22.2. Net

Strona 195

22.2.1. Changing the Trust LevelBitDefender assigns each network adapter a trust level. The trust level assigned tothe adapter indicates how trustwort

Strona 196 - Setting Scan Target

DescriptionStealth optionYour computer cannot be detected from the Internet.Local network users can ping and detect yourcomputer.Remote22.2.3. Configu

Strona 197

2. Select the action:● Allow - to allow all traffic between your computer and the selected computer.● Deny - to block all traffic between your compute

Strona 198

through any adapter. You can manually create rules or edit existing rules to filteran application's network or Internet access through a specific

Strona 199 - Scheduling Scan Tasks

● Action - whether the application is allowed or denied access to network or Internetunder the specified circumstances.22.3.1. Adding Rules Automatica

Strona 200 - Scanning Methods

3. Click OK to add the new rule.Modifying rules. To modify an existing rule, follow these steps:1. Click the Edit rule button or double-click the rule

Strona 201

3.1.1. Step 1 - Register BitDefender Total Security 2010RegistrationBitDefender Total Security 2010 comes with 30-day trial period. To continueevaluat

Strona 202

▶ If you want the rule to apply to UDP, select UDP.▶ If you want the rule to apply to a specific protocol, select Other. An edit fieldwill appear. Typ

Strona 203 - Antivirus Scan Wizard

Advanced ParametersYou can configure the following advanced parameters:● Direction. Select from the menu the traffic direction the rule applies to.Des

Strona 204

▶ To filter traffic between your computer and a specific computer, clear the Anycheck box and type its IP address.▶ If you have selected TCP or UDP as

Strona 205

NoteWhen a connection attempt is made (whether incoming or outgoing), BitDefenderapplies the action of the first rule matching the respective connecti

Strona 206

You can see the total traffic sorted by application. For each application, you can seethe connections and the open ports, as well as statistics regard

Strona 207

23. VulnerabilityAn important step in protecting your computer against malicious persons andapplications is to keep up to date the operating system an

Strona 208 - 18.2.6. Viewing Scan Logs

ImportantTo be automatically notified about system or application vulnerabilities, keep theAutomatic Vulnerability Checking enabled.23.1.1. Fixing Vul

Strona 209

Automatic Vulnerability Checking SettingsSelect the check boxes corresponding to the system vulnerabilities you want to beregularly checked.● Critical

Strona 210

24. BackupBitDefender comes with a Backup module that helps you make reserve copies ofany valuable data on your system. You can backup your data on yo

Strona 211 - Step 1/4 - Select Object Type

● a variety of backup options, such as compression, encryption, filtering files toback up or setting backup speed.● refined control when restoring fil

Strona 212

3.1.2. Step 2 - Create a BitDefender AccountAccount CreationIf you do not want to create a BitDefender account at the moment, select Registerlater and

Strona 213

● Toolbox24.1.1. Get StartedGet Started helps you easily back up e-mails, chat records and data.You can change to Get Started by doing one of the foll

Strona 214

NoteThe three step procedure is described in the “Create New Job” (p. 273) section.24.1.2. Job ManagerJob Manager is used to view and manage backup jo

Strona 215

● Scheduled Job● Delete Job Schedule● Modify Job Options● Modify Job PropertiesJob Restoration● Restore File● Restore Time-Point DataJob Control● Paus

Strona 216

NoteDo not forget to click Backup to begin or Cancel to stop.To refine your settings, click Options.Backup Options Dialog BoxThere are several sub-opt

Strona 217

This Sunday Full Backup will replace all prior backup and it will be the basis thenew Incremental Backup starts on.Catalog SetIt is used to index the

Strona 218 - 18.4. Quarantine Area

3. Type your password into the corresponding field.4. Retype your password into the corresponding field.5. Click OK.External ProgramThe job can run ot

Strona 219

3. Exclude or include specific files in the pop-up dialog box by checking theInclude only the rule-specified files or Exclude the rule-specified files

Strona 220

NoteTo avoid being overwhelmed by information on network errors, click No errorreport is generated when network is not available.Split Backup SetThe g

Strona 221

Schedule JobThis is where you can schedule the backup job at a convenient time. You canschedule job to be executed daily, weekly, monthly or at any sp

Strona 222 - 19. Antispam

▶ Delete the task if it is not scheduled to run again.This task is useful for tasks scheduled to run only once.▶ Stop the task if it runs for:Specify

Strona 223 - Bayesian Filter

Each man has his price BobAnd yours was pretty lowBitDefender Total Security 2010

Strona 224 - 19.1.2. Antispam Operation

● Re-type password - type in again the previously specified password.NoteOnce the account is activated, you can use the provided e-mail address andpas

Strona 225 - 19.2. Status

Modify Job OptionsThe selected job can be either a backup job or a burn job.For more information on how to modify backup jobs, please refer to “Backup

Strona 226 - Antispam

2. The Running User dialog box will appear. If you are the domain user, pleaseenter the domain password.3. Otherwise select Run as the following Windo

Strona 227

Specify whether the task should be stopped when your computer startsrunning on batteries.▶ Wake the computer to run this task.Specify whether the comp

Strona 228

2. Click Filter File.3. Exclude or include specific files in the pop-up dialog box by checking theInclude only the rule-specified files or Exclude the

Strona 229

Modify Job Properties1. Click the check box to select partitions, directories, or files to backup.When you select an item in the left side window, its

Strona 230

Restore File1. Check the boxes next to the partitions, directories, or files selected to be restored.When you select an item in the left side window,

Strona 231 - 19.3. Settings

File Modified DateIf the option is selected, BitDefender uses the current date to indicate the datewhen the files and directories were restored. If no

Strona 232 - 19.3.1. Antispam Settings

Restore Options Dialog BoxThe restore options allow specifying whether the files to be restored already existat destination at restoration time, and w

Strona 233

Log ViewerView LogsThe log viewing option allows tracing back your operation, and finding out the reasonof the operation failure.The description of a

Strona 234 - 20. Parental Control

DateThe date the log item occurred on.TimeThe local time when the logged item occurred.SourceThe source that logged the respective item, which can be

Strona 235 - Parental Control

3.2. Configuration WizardOnce you have completed the registration wizard, a configuration wizard will appear.This wizard helps you configure the main

Strona 236

Import and Export LogsBitDefender Backup currently supports file import and export in two formats: .TXTand .XMLNoteWe recommend you to export and save

Strona 237

ToolboxBurn to CD/DVDTo burn data to a CD/DVD manually, follow these steps:1. Click Burn data to CD/DVD.2. Click Erase if you want to reuse a rewritab

Strona 238 - 20.1.2. Setting Age Category

2. Click Erase if you want to reuse a rewritable disk. If you want to erase it quickly,click Fast. If you need to erase the information track record c

Strona 239

● Restore Time-Point Data: Restores the selected job to a certain time-point.If there are more than one selected jobs, it executes all of the selected

Strona 240

● Import Logs: Imports logs from a .TXT file or an .XML file.▶ From a TXT file▶ From an XML file● Options: Modifies your global backup options.▶ Gener

Strona 241

25. EncryptionBitDefender offers encryption capabilities to protect your confidential documentsand your instant messaging conversations through Yahoo

Strona 242 - 20.3. Web Control

Instant Messaging EncryptionBy default, IM Encryption is enabled for both Yahoo Messenger and Windows Live(MSN) Messenger. You can choose to disable I

Strona 243

1. Click the Add button to open the configuration window.Adding Contacts2. Type in the edit field the user ID of your contact.3. Select the instant me

Strona 244 - 20.4. Web Time Limiter

File VaultTo disable File Encryption, clear the File Encryption is enabled check box andclick Yes to confirm. If you disable File Vault, all file vaul

Strona 245 - 20.5. Applications Control

Create File VaultProceed as follows:1. Specify the location and the name of the vault file.● Click Browse, select the location of the vault and save t

Strona 246

DescriptionOptionClick here if this PC is used mainly for browsing andmultimedia activities.TypicalClick here if this PC is used by children and you w

Strona 247

25.2.2. Opening a VaultIn order to access and work with the files stored in a vault, you must open the vault.When you open the vault, a virtual disk d

Strona 248 - 20.6. Keywords Control

● Select the vault from the table and click Lock vault.● Right-click the vault in the table and select Lock.● Right-click the corresponding virtual di

Strona 249

NoteThe password must have at least 8 characters. For a strong password, use acombination of uppercase and lowercase letters, numbers and special char

Strona 250

3. Remove files or folders as you normally do in Windows (for example, right-clicka file you want to delete and select Delete).Encryption304BitDefende

Strona 251

26. Tune-UpBitDefender comes with a Tune-Up module that helps you maintain the integrity ofyour system. The maintenance tools offered are critical for

Strona 252 - 21. Privacy Control

● Registry Recovery can retrieve registry keys previously deleted from the WindowsRegistry using BitDefender Registry Cleaner.● File Shredder permanen

Strona 253 - 21.2. Identity Control

Cookies are also stored on your computer when you visit a web page. Cookies aresmall files containing information about your web surfing preferences.

Strona 254 - Privacy Control

operating system, installed applications, users, preferences of your computer andothers.Many applications write keys in the Windows Registry at instal

Strona 255

To find duplicate files on your computer, follow these steps:1. In Expert Mode, click Tune-Up on the left menu.2. Click Run Now corresponding to Dupli

Strona 256 - Step 1/4 - Welcome Window

27. Game / Laptop ModeThe Game / Laptop Mode module allows you to configure the special operationmodes of BitDefender:● Game Mode temporarily modifies

Strona 257

tasks are not performed, as they require more system resources and, implicitly,increase power consumption.Click Next to continue.3.2.3. Step 3 - Selec

Strona 258 - 21.2.2. Defining Exclusions

Game ModeAt the top of the section, you can see the status of the Game Mode. You can clickTurn On Game Mode Mode or Turn Off Game Mode to change the c

Strona 259 - 21.2.3. Managing Rules

NoteIf you do not want BitDefender to automatically enter Game Mode, clear theAutomatic Game Mode check box.27.1.2. Managing the Game ListBitDefender

Strona 260 - 21.3. Registry Control

Adding or Editing GamesWhen you add or edit an entry from the game list, the following window will appear:Add GameClick Browse to select the applicati

Strona 261

DescriptionOptionRun the scheduled task immediately after you exit GameMode.Postpone TaskTo automatically disable the BitDefender firewall while in Ga

Strona 262 - 21.4. Cookie Control

3. Click OK to save the changes.27.2. Laptop ModeLaptop Mode is especially designed for laptop and notebook users. Its purpose is tominimize BitDefend

Strona 263

27.2.1. Configuring Laptop Mode SettingsTo configure the behaviour on scheduled tasks, use these options:● Enable this module to modify Antivirus scan

Strona 264 - 21.4.1. Configuration Window

28. Home NetworkThe Network module allows you to manage the BitDefender products installed onyour home computers from a single computer.Network MapTo

Strona 265

Configure Password2. Type the same password in each of the edit fields.3. Click OK.You can see the computer name appearing in the network map.28.2. Ad

Strona 266 - 21.5. Script Control

Add ComputerYou can see the list of computers in the network. The icon meaning is as follows:Indicates an online computer with no BitDefender products

Strona 267 - 21.5.1. Configuration Window

5. Type the home management password configured on the respective computer.6. Click OK. If you have provided the correct password, the selected comput

Strona 268

DescriptionModeAimed at users with average computer skills, this modeextends what you can do in Novice Mode.Intermediate ModeYou can fix issues separa

Strona 269 - 22. Firewall

Allows you to remove a PC from the network.● Register BitDefender on this computerAllows you to register BitDefender on this computer by entering a li

Strona 270 - Firewall

Enter PasswordType the home management password and click OK.NoteIf you plan to run several tasks, you might want to select Don't show this messa

Strona 271

29. UpdateNew malware is found and identified every day. This is why it is very important tokeep BitDefender up to date with the latest malware signat

Strona 272

Automatic UpdateHere you can see when the last check for updates and the last update wereperformed, as well as information about the last update perfo

Strona 273 - 22.2. Network

ImportantIt may be necessary to restart the computer when you have completed the update.We recommend doing it as soon as possible.NoteIf you are conne

Strona 274

Update SettingsThe update settings are grouped into 4 categories (Update Location Settings,Automatic Update Settings, Manual Update Settings and Advan

Strona 275 - 22.2.4. Network Zones

NoteWe recommend you to set as primary update location the local mirror and to leavethe alternate update location unchanged, as a fail-safe plan in ca

Strona 276 - 22.3. Rules

NoteIf BitDefender is updated while a scan is in progress, the scan process will beaborted.● Don't update if game mode is on - BitDefender will n

Strona 277

on to that account. If the proxy server requires a username and a password, youmust specify them in the corresponding fields.● Default Browser Proxy -

Strona 278

30. RegistrationTo find complete information on your BitDefender product and the registrationstatus, go to Registration in Expert Mode.RegistrationThi

Strona 279 - Configuring Main Parameters

2. If you are sharing your Windows user account with your children, select thecorresponding check box and type a password in the corresponding fields

Strona 280

RegistrationYou can see the BitDefender registration status, the current license key and howmany days are left until the license expires.To register B

Strona 281

ImportantYou must create an account within 15 days after installing BitDefender (if you registerit with a license key, the deadline is extended to 30

Strona 282

● Password - type in a password for your BitDefender account. The passwordmust be between 6 and 16 characters long.● Re-type password - type in again

Strona 283 - 22.4. Connection Control

4. Click Sign in.5. Click Finish to complete the wizard.Registration334BitDefender Total Security 2010

Strona 284

Integration into Windows and Third-Party Software335BitDefender Total Security 2010

Strona 285 - 23. Vulnerability

31. Integration into Windows Contextual MenuThe Windows contextual menu appears whenever you right-click a file or folder onyour computer or objects o

Strona 286 - 23.2. Settings

2. Click Antivirus on the left-side menu.3. Click the Virus Scan tab.4. Right-click the Contextual Scan task and select Open. A window will appear.5.

Strona 287 - Vulnerability

● For a more straightforward approach, switch the user interface to Expert Mode andclick Encryption on the left-side menu. On the File Encryption tab,

Strona 288 - 24. Backup

5. Select Format drive to format the virtual drive assigned to the vault. You mustformat the drive before you can add files to the vault.6. If you wan

Strona 289

5. Click Open.BitDefender will immediately inform you about the result of the operation. If an errorhas occurred, use the error message to troubleshoo

Strona 290 - 24.1.1. Get Started

3.2.6. Step 6 - Select the Tasks to Be RunTask SelectionSet BitDefender to perform important tasks for the security of your system. Thefollowing optio

Strona 291 - 24.1.2. Job Manager

1.Open My Computer (click the Windows Start menu and then My Computer).2. Enter the virtual disk drive corresponding to the vault. Look for the drive

Strona 292 - Create New Job

4. Type the new password of the vault in the New Password and Confirm NewPassword fields.NoteThe password must have at least 8 characters. For a stron

Strona 293 - Backup Options Dialog Box

32. Integration into Web BrowsersBitDefender protects you against phishing attempts when you are surfing theInternet. It scans the accessed web sites

Strona 294

● Enable / Disable - enables / disables the BitDefender antiphishing protection inthe current web browser.● Settings - opens a window where you can sp

Strona 295

You can add the sites that you fully trust to the White List, so that they will notbe scanned by the antiphishing engines anymore. To add a site to th

Strona 296

33. Integration into Instant Messenger ProgramsBitDefender offers encryption capabilities to protect your confidential documentsand your instant messa

Strona 297 - Backup Job

34. Integration into Mail ClientsBitDefender Total Security 2010 includes an Antispam module. Antispam verifiesthe e-mail messages you receive and ide

Strona 298 - Schedule Job

34.1.1. Step 1/6 - Welcome WindowWelcome WindowClick Next.Integration into Mail Clients348BitDefender Total Security 2010

Strona 299 - Modify Job Options

34.1.2. Step 2/6 - Fill in the Friends ListFill in the Friends ListHere you can see all the addresses from your Address Book. Please select thoseyou w

Strona 300 - Modify Options of Burn Job

34.1.3. Step 3/6 - Delete Bayesian DatabaseDelete Bayesian DatabaseYou may find that your antispam filter has begun to lose efficiency. This may bedue

Strona 301

4. Right-click the System Scan task and select Schedule. A new window willappear.5. Change the frequency and the start time as needed.6. Click OK to s

Strona 302

34.1.4. Step 4/6 - Train Bayesian Filter with Legitimate MailTrain Bayesian Filter with Legitimate MailPlease select a folder that contains legitimate

Strona 303 - Modify Job Properties

34.1.5. Step 5/6 - Train Bayesian Filter with SpamTrain Bayesian Filter with SpamPlease select a folder that contains spam e-mail messages. These mess

Strona 304 - Restore File

34.1.6. Step 6/6 - SummarySummaryHere you can view all the settings for the configuration wizard. You can make anychanges, by returning to the previou

Strona 305 - Restore Options Dialog Box

Antispam ToolbarEach button from the BitDefender toolbar will be explained below:● Is Spam - sends a message to the Bayesian module indicating that th

Strona 306 - Restore Time-Point Data

Add SpammerSelect Don't show this message againif you don't want to be prompted forconfirmation when you add a spammer'saddress to the

Strona 307 - 24.1.3. Log Viewer

NoteAny e-mail message received from an address contained in the Spammers listwill be automatically marked as SPAM, without further processing.Spammer

Strona 308 - View Logs

WarningDo not add domains of legitimate web-based e-mail services (such as Yahoo, Gmail,Hotmail or other) to the Spammers list. Otherwise, the e-mail

Strona 309 - Clear Logs

Friends ListHere you can add or remove entries from the Friends list.If you want to add an e-mail address check the Email address option, type inthe a

Strona 310 - 24.1.4. Toolbox

For Microsoft Outlook Express / Windows Mail a new window will appearfrom where you can select the folder that contains the e-mail addresses you wantt

Strona 311 - Burn ISO Image File to CD/DVD

The following options are available:▶ Move message to Deleted Items - moves the spam messages to the DeletedItems (only for Microsoft Outlook Express

Strona 312 - 24.1.5. Menu Bar

4. UpgradeYou can upgrade to BitDefender Total Security 2010 if you are using BitDefenderTotal Security 2010 beta or the 2008 or 2009 version.There ar

Strona 313

How To361BitDefender Total Security 2010

Strona 314

35. How to Scan Files and FoldersScanning is easy and flexible with BitDefender. There are 4 ways to set BitDefenderto scan files and folders for viru

Strona 315 - 25. Encryption

Running Scan Tasks in Intermediate ModeIn Intermediate Mode, you can run a number of pre-configured scan tasks. You canalso configure and run custom s

Strona 316 - Encryption

2. Click the Virus Scan tab. Here you can find a number of default scan tasks andyou can create your own scan tasks. These are the default scan tasks

Strona 317 - 25.2. File Encryption

5. Click Continue to start the scan.6. Follow the Antivirus Scan wizard to complete the scan.What is Safe Mode?Safe Mode is a special way to start Win

Strona 318 - 25.2.1. Creating a Vault

36. How to Schedule Computer ScanScanning your computer periodically is a best practice to keep your computer freefrom malware. BitDefender allows you

Strona 319

4. Right-click the desired scan task and select Schedule. A new window will appear.5. Schedule the task to run as needed:● To run the scan task one-ti

Strona 320 - 25.2.3. Locking a Vault

37. How to Back Up DataWith BitDefender Total Security 2010, you can make reserve copies of your valuabledata (documents, images etc) on various stora

Strona 321

38. How to Restore Backed-up DataYou can easily recover lost data that you previously backed up with BitDefender.Before restoring any data, make sure

Strona 322

Troubleshooting and Getting Help370BitDefender Total Security 2010

Strona 323

5. Repairing or Removing BitDefenderIf you want to repair or remove BitDefender Total Security 2010, follow the pathfrom the Windows start menu: Start

Strona 324 - 26. Tune-Up

39. TroubleshootingThis chapter presents some problems you may encounter when using BitDefenderand provides you with possible solutions to these probl

Strona 325 - 26.2. Cleaning Up Your PC

Description&SolutionError2. Run the uninstall tool using administrator privileges.3. Restart your computer.4. Start the setup wizard again to inst

Strona 326

1. Clean up the system after the failed installation. If the installation fails,some BitDefender registry keys and files may remain in your system. Su

Strona 327 - 26.6. Finding Duplicate Files

● temporary communication errors between the BitDefender services.● some of the BitDefender services are stopped.● other security solutions running on

Strona 328

Unsecured Wi-Fi networks present a great security risk because your computeris connected to unknown computers. Without the proper protection provided

Strona 329 - 27. Game / Laptop Mode

▶ If the Windows Firewall is used, it can be configured to allow file and printersharing as follows: open the Windows Firewall settings window, Except

Strona 330 - Game / Laptop Mode

5. Depending on the level of security you want to obtain, choose one of the followingoptions:● Unsafe - to access the files and printers shared in the

Strona 331

If you suspect the problem is with the BitDefender firewall, you can contactBitDefender for support as described in section “Support” (p. 386).39.4. A

Strona 332 - Adding or Editing Games

NoteBitDefender integrates into the most commonly used mail clients through aneasy-to-use antispam toolbar. For a complete list of supported mail clie

Strona 333

4.Click the Add Friend button on the BitDefender antispam toolbar to add thesender to the Friends list. You may need to click OK to acknowledge. You w

Strona 334 - 27.2. Laptop Mode

Table of ContentsEnd User Software License Agreement ... . .. . ... . .. . ... . .. . . .. . ... . .. . xiiPreface . . ... . .. . ... . .. . ... .

Strona 335

Getting Started21BitDefender Total Security 2010

Strona 336 - 28. Home Network

8. Click Finish to start the training process.9. When training is completed, click Close.Ask for HelpIf this information was not helpful, you can cont

Strona 337 - Home Network

2. Go to the Inbox folder.3. Select the undetected spam messages.4. Click the Is Spam button on the BitDefender antispam toolbar (normally locatedin t

Strona 338

Retrain Learning Engine (Bayesian)Before training the Learning Engine (Bayesian), prepare a folder containing onlySPAM messages and another one contai

Strona 339

NotePOP3 is one of the most widely used protocols for downloading e-mail messagesfrom a mail server. If you do not know the protocol that your e-mail

Strona 340

2. Run the uninstall tool using administrator privileges. The uninstall tool will removeall the files and registry keys that were not removed during t

Strona 341

40. SupportAs a valued provider, BitDefender strives to provide its customers with anunparalleled level of fast and accurate support. The BitDefender

Strona 342 - 29. Update

40.3. Contact InformationEfficient communication is the key to a successful business. During the past 10years BITDEFENDER has established an unquestio

Strona 343 - 29.1.1. Requesting an Update

DeutschlandOffice: +49 2301 91 84 222Sales: [email protected] support: http://kb.bitdefender.deWeb: http://www.bitdefender.deUK and Ire

Strona 344 - 29.2. Update Settings

BitDefender Rescue CD389BitDefender Total Security 2010

Strona 345

41. OverviewBitDefender Total Security 2010 comes with a bootable CD (BitDefender RescueCD) capable to scan and disinfect all existing hard drives bef

Strona 346

6. OverviewOnce you have installed BitDefender your computer is protected. If you have notcompleted the configuration wizard, you must open BitDefende

Strona 347 - 29.2.5. Managing Proxies

41.2. Included SoftwareBitDefender Rescue CD includes the following software packages.XeditThis is a text file editor.VimThis is a powerful text file

Strona 348

For more information, please refer to the Nessus homepage.IptrafIptraf is an IP Network Monitoring Software.For more information, please refer to the

Strona 349 - 30. Registration

42. BitDefender Rescue CD HowtoThis chapter contains information on how to start and stop the BitDefender RescueCD, scan your computer for malware as

Strona 350 - Registration

The Desktop42.2. Stop BitDefender Rescue CDYou can safely shut down your computer by selecting Exit from the BitDefenderRescue CD contextual menu (rig

Strona 351

Wait for this message when shutting down42.3. How do I perform an antivirus scan?A wizard will appear when the boot process has finished and allow you

Strona 352

1. Double click the START SCANNER icon on the Desktop. This will launch theBitDefender Scanner for Unices.2. Click Scanner, a new window will appear.3

Strona 353

DescriptionConnectionSelect this type of connection when you are using a localarea network (LAN) to access the Internet. It is also suitablefor wirele

Strona 354

Update Signatures2. Do one of the following:▶ Select Cumulative to install signatures already saved on your hard disk bybrowsing your computer and loa

Strona 355 - 31.1. Scan with BitDefender

6. Press F2 to save the current file, confirm saving, and then press F10 to closeit.7. Type the command: bdscan update.42.6. How do I save my data?Let

Strona 356 - 31.2. BitDefender File Vault

Desktop Screen3. Double-click the partition where the data you want to save is located (e.g.[sda3]).NoteWhen working with BitDefender Rescue CD, you w

Strona 357 - 31.2.1. Create Vault

DescriptionModeYou can fix issues separately and choose which issuesto be monitored. Moreover, you can manage remotelythe BitDefender products install

Strona 358 - 31.2.2. Open Vault

Saving Data6. Type /media/sdb1/ into the corresponding textbox and click Copy.Please be aware that depending on your computer configuration it might b

Strona 359 - 31.2.4. Add to File Vault

GlossaryActiveXActiveX is a model for writing programs so that other programs and the operatingsystem can call them. ActiveX technology is used with M

Strona 360 - 31.2.6. Change Vault Password

Internet Explorer. Both of these are graphical browsers, which means that theycan display graphics as well as text. In addition, most modern browsers

Strona 361 - 31.3. Shred Files

Filename extensionThe portion of a filename, following the final point, which indicates the kind ofdata stored in the file.Many operating systems use

Strona 362 - Integration into Web Browsers

exists on tapes or disks. Every computer comes with a certain amount of physicalmemory, usually referred to as main memory or RAM.Non-heuristicThis me

Strona 363

Report fileA file that lists actions that have occurred. BitDefender maintains a report filelisting the path scanned, the folders, the number of archi

Strona 364

sends information back to the spyware's home base via the user's Internetconnection. Because spyware is using memory and system resources, t

Strona 365

itself over and over again is relatively easy to produce. Even such a simplevirus is dangerous because it will quickly use all available memory and br

Strona 366 - Integration into Mail Clients

Novice ModeThe window is organized into four main sections:● Security Status informs you of the issues that affect your computer's securityand he

Strona 367

DescriptionTaskThis wizard guides you through the process of creatinga local backup task. At the end of this process, you willLocal Backupbe able to b

Strona 368

DescriptionLinkOpens a web page where you can purchase a license key foryour BitDefender Total Security 2010 product.Buy/RenewAllows you to enter a ne

Strona 369

DescriptionTabDisplays the security status of your system and lets you resetthe usage profile.DashboardDisplays the status of the security modules (an

Strona 370

NoteExpert Mode is suited for users having above average computer skills, who know thetype of threats a computer is exposed to and how security progra

Strona 371

DescriptionModuleAllows you to protect your children against inappropriatecontent by using your customized computer access rules.Parental ControlAllow

Strona 372 - 34.2. Antispam Toolbar

DescriptionLinkOpens a web page where you can purchase a license key foryour BitDefender Total Security 2010 product.Buy/RenewAllows you to enter a ne

Strona 373

6.6.1. Game Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 346.6.2. Laptop Mode . .

Strona 374

Yellow triangle with an exclamation mark: Non-critical issues affect thesecurity of your system. You should check and fix them when you have the time.

Strona 375

The Antivirus Scan wizard will appear and guide you through the scanning process.For detailed information about this wizard, please refer to “Antiviru

Strona 376

BitDefender Manual ScanClick Add Folder, select the location you want to scan and click OK. If you want toscan multiple folders, repeat this action fo

Strona 377

applications work in Safe Mode. This is why most viruses are inactive when usingWindows in Safe Mode and they can be easily removed.To start Windows i

Strona 378

● Press Ctrl+Shift+Alt+G (the default hotkey).ImportantDo not forget to turn Game Mode off when you finish. To do this, use the samemethods you did wh

Strona 379

2. Click the Settings button in the upper-right corner of the window.3. In the General Settings category, select the check box corresponding to Laptop

Strona 380

5. On the Overview tab, configure the scanning options as needed. For moreinformation, please refer to “Configuring Scan Settings” (p. 170).6. On the

Strona 381 - 35.2. Using Scan Tasks

7. Fixing IssuesBitDefender uses an issue tracking system to detect and inform you about the issuesthat may affect the security of your computer and d

Strona 382 - How to Scan Files and Folders

Fix All Issues WizardThe wizard displays the list of existing security vulnerabilities on your computer.All current issues are selected to be fixed. I

Strona 383

● System vulnerabilities. BitDefender automatically checks your system forvulnerabilities and alerts you about them. System vulnerabilities include th

Strona 384 - 35.4. Using Scan Activity Bar

11.6.1. Add Files to Vault . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10211.6.2. Remove Vault Files

Strona 385 - How to Schedule Computer Scan

8. Configuring Basic SettingsYou can configure the main product settings (including changing the user interfaceview mode) from the basic settings wind

Strona 386

8.1. User Interface SettingsIn this area, you can switch the user interface view mode and reset the usage profile.Switching the user interface view mo

Strona 387 - 37. How to Back Up Data

8.2. Security SettingsIn this area, you can enable or disable product settings that cover various aspectsof computer and data security. The current st

Strona 388 - How to Restore Backed-up Data

DescriptionSettingdefined. Restrictions may include blockinginappropriate web sites, as well as limiting gaming andInternet access according to a spec

Strona 389

DescriptionSettingLaptop Mode temporarily modifies protection settingsso as to minimize their impact on the life of your laptopbattery.Laptop Mode Det

Strona 390 - 39. Troubleshooting

9. History and EventsThe View Logs link at the bottom of the BitDefender main window opens anotherwindow with the BitDefender history & events. Th

Strona 391 - 39.1.2. Failed Installation

● Tune-Up● Game/Laptop Mode● Home Network● Update● Registration● Internet LogA list of events is available for each category. Each event comes with th

Strona 392 - Troubleshooting

10. Registration and My AccountBitDefender Total Security 2010 comes with 30-day trial period. During the trialperiod, the product is fully functional

Strona 393 - Not Work

RegistrationYou can see the BitDefender registration status, the current license key and howmany days are left until the license expires.To register B

Strona 394

● In Novice Mode, click Fix All Issues. The wizard will help you fix all pendingissues, including activating the product.● In Intermediate Mode, go to

Strona 395

17.2.2. Virus Report Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15417.3. System Information . .

Strona 396

1. Select Create a new account.2. Type the required information in the corresponding fields. The data you providehere will remain confidential.● E-mai

Strona 397

3. Optionally, BitDefender can inform you about special offers and promotions usingthe e-mail address of your account. Select one of the available opt

Strona 398 - Indicate Detection Errors

11. WizardsIn order to make BitDefender very easy to use, several wizards help you carry outspecific security tasks or configure more complex product

Strona 399

You can see the scan status and statistics (scanning speed, elapsed time, numberof scanned / infected / suspicious / hidden objects and other).Wait fo

Strona 400 - Ask for Help

ActionsYou can see the number of issues affecting your system.The infected objects are displayed in groups, based on the malware they are infectedwith

Strona 401 - Add Spammers to Spammers List

DescriptionActionto search for and find such files on your computer, ifany.Please note that these hidden files are not the filesthat you deliberately

Strona 402

Click Close to close the window.BitDefender Could Not Solve Some IssuesIn most cases BitDefender successfully disinfects the infected files it detects

Strona 403

Welcome WindowIf you want to skip over this window when running this wizard in the future, selectthe Don't show this step the next time this wiza

Strona 404

Select TargetClick Add Target, select the files or folders that you want to scan and click OK.The paths to the selected locations will appear in the S

Strona 405 - 40. Support

DescriptionOptionOnly the files with the extensions specified by the userwill be scanned. These extensions must be separatedby ";".Scan user

Strona 406 - 40.3. Contact Information

20.5.2. Managing Application Control Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22820.6. Keywords Control . . . . . . . . . .

Strona 407 - UK and Ireland

DescriptionActionMoves infected files into the quarantine. Quarantinedfiles cannot be executed or opened; therefore, therisk of getting infected disap

Strona 408 - BitDefender Rescue CD

DescriptionOptionBitDefender detects incomplete virus bodies, too,thus removing any possible threat that could affectyour system's security.Scans

Strona 409 - 41. Overview

Additional Settings● To save the custom task you are creating for future use select the Show thistask in Intermediate UI check box and enter a name fo

Strona 410 - 41.2. Included Software

ScanningNoteThe scanning process may take a while, depending on the complexity of the scan.You can click the scan progress icon in the system tray to

Strona 411 - Overview

SummaryYou can see the results summary. If you want comprehensive information on thescanning process, click View Log to view the scan log.ImportantIf

Strona 412 - BitDefender Rescue CD Howto

11.3.1. Step 1/6 - Select Vulnerabilities to CheckVulnerabilitiesClick Next to check the system for the selected vulnerabilities.Wizards66BitDefender

Strona 413

11.3.2. Step 2/6 - Checking for VulnerabilitiesVulnerability CheckWait for BitDefender to finish checking for vulnerabilities.Wizards67BitDefender Tot

Strona 414

11.3.3. Step 3/6 - Update WindowsWindows UpdatesYou can see the list of critical and non-critical Windows updates that are not currentlyinstalled on y

Strona 415

11.3.4. Step 4/6 - Update ApplicationsApplicationsYou can see the list of applications checked by BitDefender and if they are up todate. If an applica

Strona 416

11.3.5. Step 5/6 - Change Weak PasswordsUser PasswordsYou can see the list of the Windows user accounts configured on your computer andthe level of pr

Strona 417

25. Encryption . . .. . ... . .. . ... . .. . . .. . ... . .. . ... . .. . ... . .. . . .. . ... . .. . ... 29625.1. Instant Messaging (IM) Encryption

Strona 418 - 42.6. How do I save my data?

● Change user password. You must type the new password in the edit fields.Make sure to inform the user about the password change.NoteFor a strong pass

Strona 419

11.4.1. Local Backup WizardThis wizard guides you through the process of creating a local backup task. At theend of this process, you will be able to

Strona 420

Choose what to backupYou can choose either Quick Backup (your music, videos, pictures, emails,applications settings, etc.) or Full Backup (all partiti

Strona 421 - Glossary

Choose where to backupThe following options are available:● Backup data on my computer● Backup data on my USB drive● Backup data on a network location

Strona 422

1. Type the FTP server name in the corresponding field.2. If the FTP server uses a different port than default port 21, type it in thecorresponding fi

Strona 423

Click Next.Step 5/5 - SummaryHere you can review the backup job settings and start the backup.SummaryYou must type a task name into the corresponding

Strona 424

NoteThe first time you create a scheduled backup job, you will be prompted to specifythe Windows account used to run the job.Set Running UserTo use th

Strona 425

Welcome WindowClick Next.Step 2/4 - Choose where to Backup fromHere you can select a location where you want to restore files from.Choose where to bac

Strona 426

● Restore data from my computer● Restore data from a USB drive● Restore data from a network location● Restore data from CD/DVD● Restore data from FTP

Strona 427

Step 4/4 - SummaryHere you can review the restore job settings and start the restoring process.SummaryClick Restore if you are satisfied with your set

Komentarze do niniejszej Instrukcji

Brak uwag