SOFTWIN Total Security 2010 Uživatelská příručka

Procházejte online nebo si stáhněte Uživatelská příručka pro Antivirový bezpečnostní software SOFTWIN Total Security 2010. Bitdefender Total Security 2010 Uživatelská příručka

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 444
  • Tabulka s obsahem
  • ŘEŠENÍ PROBLÉMŮ
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků

Shrnutí obsahu

Strany 1 - User's guide

User's guideCopyright© 2009 BitDefender

Strany 2

31. Integration into Windows Contextual Menu .. . . ... . ... . ... . ... . . 34431.1. Scan with BitDefender . . . . . . . . . . . . . . . . . . . .

Strany 3 - And yours was pretty low

Choose where to backupThe following options are available:⚫ Backup data on my computer⚫ Backup data on my USB drive⚫ Backup data on a network location

Strany 4 - Table of Contents

1. Type the FTP server name in the corresponding field.2. If the FTP server uses a different port than default port 21, type it in thecorresponding fi

Strany 5

Click Next.Step 5/5 - SummaryHere you can review the backup job settings and start the backup.SummaryYou must type a task name into the corresponding

Strany 6

NoteThe first time you create a scheduled backup job, you will be prompted to specifySet Running Userthe Windows account used to run the job.To use th

Strany 7

Welcome WindowClick Next.Step 2/4 - Choose where to Backup fromHere you can select a location where you want to restore files from.Choose where to bac

Strany 8

⚫ Restore data from my computer⚫ Restore data from a USB drive⚫ Restore data from a network location⚫ Restore data from CD/DVD⚫ Restore data from FTP

Strany 9

Step 4/4 - SummaryHere you can review the restore job settings and start the restoring process.Click Restore if you are satisfied with your settings.

Strany 10

Choose what to backupChoose what you want to back up by checking the checkbox next to each of yourimportant files and folders.NoteCommon Files and Fol

Strany 11

Choose when to backupIf you select Run scheduled backups automatically without user intervention,you can specify how often the scheduled task runs by

Strany 12 - License and Warranty

Other settingsAt the same time, you can choose to receive feedback regarding backup tasks ornot by email. Select the corresponding checkbox and type y

Strany 13

39.4.2. Many Spam Messages Are Not Detected . . . . . . . . . . . . . . . . . . . . . . . . . . . 39139.4.3. Antispam Filter Does Not Detect Any Spam

Strany 14

SummaryIf you want to start the backup immediately select the Run backup now checkbox.Click Finish to run backup or Skip Configuration to exit the wiz

Strany 15

Search for backupThe calendar displays in bold all dates on which backup tasks have been run. Byclicking a date, only backups tasks up to this date wi

Strany 16

Select what to recoverClick Next to continue or Skip Configuration to exit the wizard.Step 3/3 - Select where to restoreThis is where you can set up t

Strany 17

Select where to restoreThe default restoring location is: ?:\Programs Files\BitDefender OnlineBackup\RecoveredFiles.To set up another restoring locati

Strany 18

Restore finishedClick Open Folder to browse the default restoring location.11.5. Tuneup WizardsThe Tuneup wizards help you optimize the disk space and

Strany 19

AnalyzingWait for the Disk Defragmenter to finish the analysis. If you want to cancel theoperation, just click Cancel.Step 2/3 - View Analysis ReportA

Strany 20

Analysis ReportCheck the analysis report.If no disk volume needs defragmenting, click Close to close the window. Otherwise,select the Defragment optio

Strany 21

DefragmentingWait for the disk defragmenting to complete. You can cancel disk defragmentationat any time by clicking Abort.Step 3/3 - View Defragmenta

Strany 22

Defragmentation ReportClick Close to close the window.11.5.2. PC Cleanup WizardThis wizard removes unnecessary files from the disk, including temporar

Strany 23

Welcome WindowClick Next.Step 2/3 - Deleting Files...The cleaner will start deleting the temporary Internet files and cookies.Wizards93BitDefender Tot

Strany 24 - 1.2. Admonitions

License and WarrantyIF YOU DO NOT AGREE TO THESE TERMS AND CONDITIONS DO NOT INSTALL THESOFTWARE. BY SELECTING "I ACCEPT", "OK", &

Strany 25 - 2. Book Structure

Deleting Files...Wait for the Cleaner to delete the temporary Internet files and the cookies. If youwant to cancel the operation, just click Cancel.St

Strany 26 - 3. Request for Comments

Results SummaryYou can see statistics regarding the deleted objects.Click Close to close the window.11.5.3. Duplicate Finder WizardThis wizard helps y

Strany 27 - Installation and Removal

Search TargetClick Add Target and select a location where the Duplicate Finder should searchfor duplicate files. The path to the selected location wil

Strany 28 - 1. System Requirements

Searching...You can see the search status and statistics.Wait for the Duplicate Finder to complete the search for duplicate files. If you wantto cance

Strany 29 - System Requirements

ActionsThe duplicate files detected are organized and displayed as groups. If you clicknext to a group, you can see detailed information about the dup

Strany 30 - 2. Preparing for Installation

choose to take no action on a particular group, then the overall action will apply toall except that particular group.Click Next.Step 4/4 - View Resul

Strany 31 - 3. Installing BitDefender

StatusYou can see when the Registry Cleaner was run last and the BitDefenderrecommendation.Click Next.Step 2/4 - Scanning...The Registry Cleaner will

Strany 32 - Installing BitDefender

Scanning...You can see the last registry key scanned and the related statistics.Wait for the Registry Cleaner to complete the registry key scan. If yo

Strany 33 - 3.1. Registration Wizard

ActionsYou can see all the invalid or orphan registry keys detected. Detailed informationis provided about each registry key (name, value, priority, c

Strany 34

DescriptionCategoryRegistry keys that contain information on the locationof shared DLLs (Dynamic Link Libraries). DLLs storeShared DLLsfunctions that

Strany 35

1. The Service is made available by the Licensor to you during the period of anyfree trial of the Service, and for the period when you maintain a paid

Strany 36

Results SummaryIf you did not choose to delete all the registry keys, a warning text will be displayed.We recommend you to review the respective issue

Strany 37 - 3.2. Configuration Wizard

StatusYou can see a list of time points when the Windows Registry was cleaned. Selectthe time point to restore the Windows Registry to.If you are sure

Strany 38

ResultsClick Close to close the window.11.5.6. File Shredder WizardThis wizard helps you permanently erase files and their traces from your system.Use

Strany 39

TargetClick Add Target, select the file or folder that you want to delete and click OK. Thepath to the selected location will appear in the Path colum

Strany 40

Deleting...Wait for the file shredding operation to complete. If you want to cancel the operation,just click Cancel.Step 3/3 - View Results SummaryAft

Strany 41

Results SummaryClick Close to close the window.11.6. File Vault WizardsThe File Vault wizards help you create and manage BitDefender file vaults. A fi

Strany 42

11.6.1. Add Files to VaultThis wizard helps you create a file vault and add files to it in order to safely storethem on your computer.Step 1/6 - Selec

Strany 43

Select VaultIf you select Browse for a File Vault, you must click Browse and select the filevault. You will go either to the step 5 if the selected va

Strany 44 - 3.2.7. Step 7 - Finish

Create VaultTo complete the file vault related information follow these steps:1. Click Browse and choose a location for the bvd file.NoteRemember that

Strany 45 - 4. Upgrade

You will go to the step 5.Step 4/6 - PasswordThis is where you will be asked to enter the password for the selected vault.Enter passwordType the passw

Strany 46

in advance) for any period, the Licensor may, in addition to any other rights, atits sole discretion and without notice to you:a. (a) suspend the obli

Strany 47 - Getting Started

SummaryClick Next.Step 6/6 - ResultsThis is where you can view the vault content.Wizards114BitDefender Total Security 2010

Strany 48 - 6. Overview

ResultsClick Finish.11.6.2. Remove Vault FilesThis wizard helps you remove files from a specific file vault.Step 1/5 - Select VaultHere you can specif

Strany 49 - 6.2.1. Novice Mode

Select VaultIf you select Browse for a File Vault, you must click Browse and select the filevault. You will go either to the step 3 if the selected va

Strany 50

Enter passwordType the password into the corresponding field and click Next.Step 3/5 - Select filesThis is where you will be provided with the list of

Strany 51

Select filesSelect the files to be removed and click Next.Step 4/5 - SummaryThis is where you can review chosen operations.Wizards118BitDefender Total

Strany 52 - 6.2.2. Intermediate Mode

SummaryClick Next.Step 5/5 - ResultsThis is where you can view operation result.Wizards119BitDefender Total Security 2010

Strany 53 - 6.2.3. Expert Mode

ResultsClick Finish.11.6.3. View File VaultThis wizard helps you open a specific file vault and view the files it contains.Step 1/4 - Select VaultHere

Strany 54

Select VaultIf you select Browse for a File Vault, you must click Browse and select the filevault. You will go either to the step 3 if the selected va

Strany 55

Enter passwordType the password into the corresponding field and click Next.Step 3/4 - SummaryThis is where you can review chosen operations.Wizards12

Strany 56 - 6.3. System Tray Icon

SummaryClick Next.Step 4/4 - ResultsThis is where you can view the files of the vault.Wizards123BitDefender Total Security 2010

Strany 57 - 6.4. Scan Activity Bar

use the Software or the Service in any manner that may injure any party orproperty in any way whatsoever.6. SIGNUP INFORMATION AND PRIVACY POLICYAll u

Strany 58 - 6.5. BitDefender Manual Scan

ResultsClick Finish.11.6.4. Lock File VaultThis wizard helps you lock a specific file vault in order to protect its content.Step 1/3 - Select VaultHer

Strany 59

Select VaultIf you select Browse for a File Vault, you must click Browse and select the filevault.If you click Select an existing File Vault, then you

Strany 60 - 6.6.1. Game Mode

SummaryClick Next.Step 3/3 - ResultsThis is where you can view operation result.Wizards126BitDefender Total Security 2010

Strany 61 - 6.6.2. Laptop Mode

ResultsClick Finish.Wizards127BitDefender Total Security 2010

Strany 62

Intermediate Mode128BitDefender Total Security 2010

Strany 63

12. DashboardThe Dashboard tab provides information regarding the security status of yourcomputer and allows you to fix pending issues.DashboardThe da

Strany 64 - 7. Fixing Issues

Click the name of a module to see more details about its status and to configurestatus tracking for its components.⚫ Usage Profile - Indicates the usa

Strany 65 - Fixing Issues

13. SecurityBitDefender comes with a Security module that helps you keep your BitDefenderup to date and your computer virus free. To enter the Securit

Strany 66

Red circle with an exclamation mark: Issues affect the component.The sentences describing issues are written in red. Just click the Fix buttoncorrespo

Strany 67 - 8. Configuring Basic Settings

DescriptionIssueThe malware signatures of your BitDefender productare not being automatically updated on a regularbasis.Automatic Update isdisabledThe

Strany 68 - 8.1. User Interface Settings

Your data stored on the Service is encrypted by the Software with the intentionof protecting the privacy of that data which is accessible only to you

Strany 69 - 8.2. Security Settings

DescriptionStatusA new version of the Application is available butnot installed.Application (outdated)A user password is easy to crack by malicious pe

Strany 70 - 8.3. General Settings

Updating BitDefenderIn this window you can see the status of the update process.The update process is performed on the fly, meaning that the files to

Strany 71 - Configuring Basic Settings

DescriptionTaskScans the entire system, except for archives. In thedefault configuration, it scans for all types of malwareother than rootkits.System

Strany 72 - 9. History and Events

To configure Parental Control, click Configure Parental. A new window will appear.Configure BitDefender Parental ControlHere you can see the status of

Strany 73 - History and Events

14. Tune-UpBitDefender comes with a Tune-Up module that helps you maintain the integrity ofyour system. The maintenance tools offered are critical for

Strany 74 - Registration and My Account

The sentences describing issues are written in red. Just click the Run Now buttoncorresponding to a sentence and follow the wizard to fix the reported

Strany 75

14.2.1. Cleaning Windows RegistryThe Windows Registry is an important part of the Windows-based operating systems.It is a database that contains infor

Strany 76 - 10.2. Activating BitDefender

To detect and delete duplicate files on your computer, you can use the DuplicateFinder. In this way you can improve the management of the free space o

Strany 77

To prevent sensitive data from being recovered after you delete it, you can useBitDefender to permanently delete that data by physically removing it f

Strany 78 - 10.4. Renewing Your License

15. File StorageBitDefender comes with a File Storage module that helps you keep your data notonly safe, but confidential. To achieve this goal, backu

Strany 79 - 11. Wizards

In particular, you acknowledge that from time to time, the Service may fail or beinterrupted for a period for any number of reasons (including for exa

Strany 80

File StorageThe File Storage module consists of two sections:⚫ Status Area - Allows you to see the full list of monitored components. You canchoose wh

Strany 81

The status area in the File Storage tab offers information regarding the status ofthe following components:⚫ File Encryption monitors the status of th

Strany 82

16. NetworkThe Network module allows you to manage the BitDefender products installed onyour home computers from a single computer. To enter the Netwo

Strany 83 - 11.2. Custom Scan Wizard

⚫ Scan All - allows you to scan all managed computers at the same time.⚫ Update All allows you to update all managed computers at the same time.⚫ Regi

Strany 84

2. Type the home management password and click OK. A new window will appear.Add ComputerYou can see the list of computers in the network. The icon mea

Strany 85 - DescriptionOption

Authenticate5. Type the home management password configured on the respective computer.6. Click OK. If you have provided the correct password, the sel

Strany 86

Network MapIf you move the mouse cursor over a computer from the network map, you can seebrief information about it (name, IP address, number of issue

Strany 87 - DescriptionScan Level

Allows you to fix the issues that are affecting the security of this computer byfollowing the Fix All Issues wizard.⚫ View History/EventsAllows you ac

Strany 88

16.1.4. Scanning All ComputersTo scan all managed computers, follow these steps:1. Click Scan All. You will be prompted to provide the local home mana

Strany 89 - 11.2.5. Step 5/6 - Scanning

Enter Password2. Click OK.16.1.6. Registering All ComputersTo register all managed computers, follow these steps:1. Click Register All. You will be pr

Strany 90 - Scanning

With respect to your data which is backed up through the Service and stored asencrypted data (Data) by the Licensor or the Licensor’s Associates, apar

Strany 91

Expert Mode154BitDefender Total Security 2010

Strany 92 - Vulnerabilities

17. GeneralThe General module provides information on the BitDefender activity and the system.Here you can also change the overall behavior of BitDefe

Strany 93 - Vulnerability Check

⚫ Network Activity - Indicates the evolution of the network traffic filtered byBitDefender Firewall. The height of the bar indicates the intensity of

Strany 94

DescriptionIssueAn on demand system scan was never performedto check if files stored on your computer are malwarefree.You have never scannedyour compu

Strany 95

DescriptionStatusBitDefender does not check for potentialvulnerabilities regarding missing Windows updates,application updates or weak passwords.Vulne

Strany 96

17.1.2. StatisticsIf you want to keep an eye on the BitDefender activity, a good place to start is theStatistics section. You can see the following it

Strany 97

DescriptionItemIndicates the number of days left until the license keyexpires. If your license key expires within the followingExpires indays, please

Strany 98 - 11.4.1. Local Backup Wizard

NoteIf you are not the only person with administrative rights using this computer, it isrecommended that you protect your BitDefender settings with a

Strany 99

⚫Scan Activity BarShow the Scan Activity bar (on screen graph ofproduct activity) - displays the Scan Activity barwhenever you log on to Windows. Clea

Strany 100

System InformationThe list contains all the items loaded when starting the system as well as the itemsloaded by different applications.Three buttons a

Strany 101

COPYRIGHT. All rights, titles and interest in and to BitDefender and all copyrightrights in and to BitDefender (including but not limited to any image

Strany 102 - Step 5/5 - Summary

18. AntivirusBitDefender protects your computer from all kinds of malware (viruses, Trojans,spyware, rootkits and so on). The protection BitDefender o

Strany 103 - 11.4.2. Local Restore Wizard

Real-time ProtectionYou can see whether Real-time protection is enabled or disabled. If you want tochange the Real-time protection status, clear or se

Strany 104

DescriptionProtection levelOnly programs and incoming mail messages are scanned forviruses. Besides the classical signature-based scan, the heuristica

Strany 105

Shield SettingsThe scan options are organized as an expandable menu, very similar to those usedfor exploration in Windows. Click the box with "+&

Strany 106 - 11.4.3. Online Backup Wizard

DescriptionOption.doc; .dot; .xls; .ppt; .wbk; .wiz; .pot;.ppa; .xla; .xlt; .vbs; .vbe; .mdb; .rtf;.htm; .hta; .html; .xml; .xtp; .php;.asp; .js; .shs

Strany 107

DescriptionOptionMoves infected files into the quarantine.Quarantined files cannot be executed orMove file toquarantineopened; therefore, the risk of

Strany 108 - Step 3/4 - Other settings

DescriptionOptionScans all incoming e-mail messages.Scan incoming e-mailScans all outgoing e-mail messages.Scan outgoing e-mail⚫ Scan web (HTTP) traff

Strany 109 - Step 4/4 - Summary

BitDefender AVC AlertIf you know and trust the detected application,click Allow.If you want to immediately close the application,click OK.Select the R

Strany 110 - 11.4.4. Online Restore Wizard

ImportantKeep the Active Virus Control enabled in order to be protected against unknownviruses.If you want to be alerted and prompted for action by Ac

Strany 111 - DescriptionCriteria

⚫ Remove - remove an application from the list.⚫ Edit - edit an application rule.18.1.4. Disabling Real-time ProtectionIf you want to disable real-tim

Strany 112 - Select what to recover

BitDefender Total Security 2010User's guidePublished 2009.07.02Copyright© 2009 BitDefenderLegal NoticeAll rights reserved. No part of this book m

Strany 113

Nor does BitDefender make any representations about the performance or lack ofperformance of BitDefender either expressed or implied.Any disclaimer of

Strany 114 - 11.5. Tuneup Wizards

Antiphishing White ListYou can see the web sites that BitDefender does not currently check for phishingcontent.To add a new web site to the white list

Strany 115

There is a risk that a virus is already lodged in your system, before you even installBitDefender. This is why it's a very good idea to scan your

Strany 116

There are three categories of scan tasks:⚫ System tasks - contains the list of default system tasks. The following tasks areavailable:DescriptionDefau

Strany 117

⚫Delete - removes the selected task.NoteNot available for system tasks. You cannot remove a system task.⚫Scan Now - runs the selected task, initiating

Strany 118 - 11.5.2. PC Cleanup Wizard

NoteIn the case of system tasks, this option is replaced by Show Scan Paths, as youcan only see their scan target.⚫ Schedule - opens the Properties wi

Strany 119 - Step 2/3 - Deleting Files

OverviewHere you can see information about the task (name, last run and schedule status)and set the scan settings.Choosing Scan LevelYou can easily co

Strany 120

DescriptionProtection levelAll files and archives are scanned for viruses and spyware. Besidesthe classical signature-based scan, the heuristic analys

Strany 121

The scan options are organized as an expandable menu, very similar to those usedfor exploration in Windows. Click the box with "+" to open a

Strany 122 - Step 2/4 - Searching

DescriptionOptionwbk; wiz; pot; ppa; xla; xlt; vbs; vbe;mdb; rtf; htm; hta; html; xml; xtp; php;asp; js; shs; chm; lnk; pif; prc; url; smm;pdf; msi; i

Strany 123 - Step 3/4 - Select Action

DescriptionActionNo action will be taken on infected files. Thesefiles will appear in the report file.Take No ActionRemove the malware code from the i

Strany 124 - DescriptionAction

REQUIRING FAIL-SAFE PERFORMANCE OR OPERATION. THIS SOFTWARE IS NOT FORUSE IN THE OPERATION OF AIRCRAFT NAVIGATION, NUCLEAR FACILITIES, ORCOMMUNICATION

Strany 125 - Step 1/4 - Initiate Scanning

DescriptionActionMoves hidden files into the quarantine.Quarantined files cannot be executed or opened;therefore, the risk of getting infected disappe

Strany 126 - Step 2/4 - Scanning

– Action to take when an encrypted suspect file is found. Select theaction to be taken on suspicious files that are encrypted using Windows. Thefollow

Strany 127

Scan TargetYou can see the list of local, network and removable drives as well as the files orfolders added previously, if any. All checked items will

Strany 128 - DescriptionCategory

⚫ All Entries - to scan all drives, no matter if they are local, in the network orremovable.NoteIf you want to scan your entire computer, select the c

Strany 129

Scheduling Scan TasksWith complex tasks, the scanning process will take some time and it will work bestif you close all other programs. That is why it

Strany 130 - Important

Click OK to save the changes and close the window. To run the task, just click Scan.18.2.5. Scanning Files and FoldersBefore you initiate a scanning p

Strany 131 - Step 2/2 - View Results

Immediate ScanningTo scan your computer or part of it you can run the default scan tasks or your ownscan tasks. This is called immediate scanning.To r

Strany 132 - 11.5.6. File Shredder Wizard

Drag FileDrop FileThe Antivirus Scan wizard will appear and guide you through the scanning process.Manual ScanningManual scanning consists in directly

Strany 133

Manual ScanningClick Add Folder, select the location you want to scan and click OK. If you want toscan multiple folders, repeat this action for each a

Strany 134

ScanningYou can see the scan status and statistics (scanning speed, elapsed time, numberof scanned / infected / suspicious / hidden objects and other)

Strany 135 - 11.6. File Vault Wizards

You declare that all the data that you provide will be true and accurate andundertakes to inform BItDefender of any changes to said data. You have the

Strany 136 - 11.6.1. Add Files to Vault

Stopping or pausing the scan. You can stop scanning anytime you want byclicking Stop&Yes. You will go directly to the last step of the wizard. To

Strany 137 - Step 3/6 - Create Vault

DescriptionActionRemoves the malware code from infected files.DisinfectDeletes detected files.DeleteMoves detected files to quarantine. Quarantined fi

Strany 138

SummaryYou can see the results summary. If you want comprehensive information on thescanning process, click View log to view the scan log.ImportantIf

Strany 139 - Step 5/6 - Summary

18.2.6. Viewing Scan LogsTo see the scan results after a task has run, right-click the task and select Logs.The following window will appear:Scan Logs

Strany 140 - Step 6/6 - Results

Scan Log ExampleThe scan log contains detailed information about the logged scanning process, suchas scanning options, the scanning target, the threat

Strany 141 - 11.6.2. Remove Vault Files

NoteThe objects excluded from on-access scanning will not be scanned, no matter if theyare accessed by you or by an application.To see and manage the

Strany 142 - Step 2/5 - Password

type of scanning you want them to be excluded from, as needed. Make the necessarychanges and click OK.NoteYou can also right-click an object and use t

Strany 143 - Step 3/5 - Select files

Step 2/4 - Specify Excluded PathsExcluded PathsTo specify the paths to be excluded from scanning use either of the followingmethods:⚫ Click Browse, se

Strany 144 - Step 4/5 - Summary

Step 3/4 - Select Scanning TypeScanning TypeYou can see a table containing the paths to be excluded from scanning and the typeof scanning they are exc

Strany 145 - Step 5/5 - Results

Step 4/4 - Scan Excluded FilesScan Excluded FilesIt is highly recommended to scan the files in the specified paths to make sure thatthey are not infec

Strany 146 - 11.6.3. View File Vault

AGREEMENT TO BE LEGALLY BINDINGThe parties acknowledge that they intend to be legally bound by this Agreement,and have entered into this Agreement in

Strany 147 - Step 2/4 - Password

Step 1/4 - Select Object TypeObject TypeSelect the option of excluding extensions from scanning.Click Next.Antivirus204BitDefender Total Security 2010

Strany 148 - Step 3/4 - Summary

Step 2/4 - Specify Excluded ExtensionsExcluded ExtensionsTo specify the extensions to be excluded from scanning use either of the followingmethods:⚫ S

Strany 149 - Step 4/4 - Results

Step 3/4 - Select Scanning TypeScanning TypeYou can see a table containing the extensions to be excluded from scanning andthe type of scanning they ar

Strany 150 - 11.6.4. Lock File Vault

Step 4/4 - Select Scanning TypeScanning TypeIt is highly recommended to scan the files having the specified extensions to makesure that they are not i

Strany 151 - Step 2/3 - Summary

QuarantineThe Quarantine section displays all the files currently isolated in the Quarantinefolder. For each quarantined file, you can see its name, t

Strany 152 - Step 3/3 - Results

18.4.2. Configuring Quarantine SettingsTo configure the quarantine settings, click Settings. A new window will appear.Quarantine SettingsUsing the qua

Strany 153 - Click Finish

Automatically submit files. To automatically submit quarantined files, checkthe corresponding option. You must specify the frequency with which to sub

Strany 154 - Intermediate Mode

19. AntispamBitDefender Antispam employs remarkable technological innovations and industrystandard antispam filters to weed out spam before it reaches

Strany 155 - 12. Dashboard

Image FilterSince avoiding heuristic filter detection has become quite a challenge, nowadays'inbox folders are full with more and more messages o

Strany 156 - Dashboard

trace a certain scent. Sometimes the filter must be corrected too - prompted toadjust when it makes a wrong decision.ImportantYou can correct the Baye

Strany 157 - 13. Security

PrefaceThis guide is intended to all users who have chosen BitDefender Total Security2010 as a security solution for their personal computers. The inf

Strany 158 - Security

characteristics of SPAM. The result is that it will add a Spam score to the e-mail,too.NoteIf the e-mail is tagged as SEXUALLY EXPLICIT in the subject

Strany 159

Antispam StatusYou can see whether Antispam is enabled or disabled. If you want to change theAntispam status, clear or select the corresponding check

Strany 160 - 13.2. Quick Tasks

DescriptionProtection levelOffers protection for accounts that receive a lot oflegitimate commercial mail. The filter will let mostPermissivee-mail pa

Strany 161

Friends ListHere you can add or remove entries from the Friends list.If you want to add an e-mail address check the E-mail address option, type in the

Strany 162

You can save the Friends list to a file so that you can use it on another computer orafter reinstalling the product. To save the Friends list, click t

Strany 163

Spammers ListHere you can add or remove entries from the Spammers list.If you want to add an e-mail address check the Email address option, type in th

Strany 164 - 14. Tune-Up

from any registered user of such a service will be detected as spam. If, for example,you add yahoo.com to the Spammers list, all e-mail messages comin

Strany 165 - 14.2. Quick Tasks

Antispam SettingsThree categories of options are available (Antispam settings, Basic Antispamfilters and Advanced Antispam filters) organized like an

Strany 166

19.3.2. Basic Antispam Filters⚫ Enable Friends/Spammers lists - filter e-mail messages using theFriends/Spammers lists.▸ Automatically add recipients

Strany 167 - 14.2.4. Cleaning Up Your PC

20. Parental ControlBitDefender Parental Control enables you to control the access to the Internet andto specific applications for each user holding a

Strany 168

NoteThe note is just a short observation. Although you can omit it, the notes can providevaluable information, such as specific feature or a link to s

Strany 169 - 15. File Storage

Parental ControlYou can see information regarding the Parental Control status for each Windowsuser account. The age category is listed below each user

Strany 170 - 15.1. Status Area

Parental Control StatusTo configure the Parental Control for this user account, follow these steps:1. Enable the Parental Control for this user accoun

Strany 171 - 15.2. Quick Tasks

⚫ Web - to filter web navigation according to the rules set by you in the Websection.⚫ Applications - to block access to the applications specified by

Strany 172 - 16. Network

To set the password protection, do the following:1. Type the password in the Password field.2. Type the password again in the Retype Password field to

Strany 173

Web Filter CategoriesSelect the check box corresponding to a category you want to block and the userwill no longer be allowed to access websites match

Strany 174

⚫ Teenager Profile Categories includes content that may be considered safe forchildren between 14 and 18 years old.DescriptionCategoryWebsites used to

Strany 175

⚫ Send me an activity report via e-mail. An e-mail notification is sent everytime BitDefender Parental Control blocks an activity.⚫ Save an internet t

Strany 176

⚫ If the server uses a different port than the default port 25, type it in thecorresponding field.⚫ Sender's e-mail address - type the address yo

Strany 177

Web ControlTo enable this protection select the check box corresponding to Enable WebControl.20.3.1. Creating Web Control RulesTo allow or block acces

Strany 178

Specify Website2. Enter the website address in the Website field.Syntax:⚫*.xxx.com - the action of the rule will apply on all web sites finished with.

Strany 179

3. Request for CommentsWe invite you to help us improve the book. We have tested and verified all of theinformation to the best of our ability. Please

Strany 180 - Expert Mode

⚫ Allow all sites, except the ones in the list. Select this option to allow accessto all websites except those for which you have set the Block action

Strany 181 - 17. General

can click Block all to select all the cells and, implicitly, to block all the web access.If you click Allow all, the internet connections will be perm

Strany 182 - 17.1.1. Overall Status

20.5.1. Creating Application Control RulesTo block or restrict access to an application, follow these steps:1. Click Block Application or Restrict App

Strany 183 - DescriptionIssue

To edit a rule, select it, click the Edit button and make the necessary changes inthe configuration window. To delete a rule, select it and click the

Strany 184 - DescriptionStatus

20.6.1. Creating Keywords Control RulesTo block a word or phrase, follow these steps:1. Click Block Keyword. A new window will appear:Specify Keyword2

Strany 185 - 17.1.3. Overview

20.7. Instant Messaging (IM) ControlThe Instant Messaging (IM) Control allows you to specify the IM contacts your childrenare allowed to chat with.Not

Strany 186 - 17.2. Settings

Add IM contact2. Type the contact's name in the Name field.3. Type the e-mail address or the user name used by the IM contact in the E-mailor IM

Strany 187

21. Privacy ControlBitDefender monitors dozens of potential “hotspots” in your system where spywaremight act, and also checks any changes made to your

Strany 188 - 17.3. System Information

⚫ Identity Control - protects your confidential data by filtering all outgoing web(HTTP), e-mail (SMTP) and instant messaging traffic according to the

Strany 189

You can create rules to protect any piece of information you might consider personalor confidential, from your phone number or e-mail address to your

Strany 190 - 18. Antivirus

Installation and Removal1BitDefender Total Security 2010

Strany 191 - Antivirus

Identity ControlIf you want to use Identity Control, follow these steps:1. Select the Enable Identity Control check box.2. Create rules to protect you

Strany 192

Step 1/4 - Welcome WindowWelcome WindowClick Next.Step 2/4 - Set Rule Type and DataSet Rule Type and DataYou must set the following parameters:Privacy

Strany 193

⚫ Rule Name - type the name of the rule in this edit field.⚫ Rule Type - choose the rule type (address, name, credit card, PIN, SSN etc).⚫ Rule Data -

Strany 194

You can choose to apply the rule only if the rule data matches whole words or if therule data and the detected string case match.Specify the users for

Strany 195

To open the window where you can manage exceptions, click Exclusions.ExclusionsTo add an exception, follow these steps:1. Click the Add button to add

Strany 196

Edit RuleHere you can change the name, description and parameters of the rule (type, dataand traffic). Click OK to save the changes.21.2.4. Rules Defi

Strany 197

Registry Control keeps an eye on the Windows Registry - this is again useful fordetecting Trojan horses. It will alert you whenever a program will try

Strany 198

Registry ControlYou can see the rules created so far listed in the table.To delete a rule, select it and click the Delete button.21.4. Cookie ControlC

Strany 199

Cookie AlertYou can see the name of the application that is tryingto send the cookie file.Click Yes or No and a rule will be created, applied andliste

Strany 200 - 18.2. On-demand Scanning

Cookie ControlYou can see the rules created so far listed in the table.ImportantThe rules are listed in order of their priority starting from the top,

Strany 201 - 18.2.1. Scan Tasks

1. System RequirementsYou may install BitDefender Total Security 2010 only on computers running thefollowing operating systems:⚫ Windows XP (32/64 bit

Strany 202

Select Address, Action and DirectionYou can set the parameters:⚫ Domain address - type in the domain on which the rule should apply.⚫ Action - select

Strany 203 - 18.2.2. Using Shortcut Menu

21.5. Script ControlScripts and other codes such as ActiveX controls and Java applets, which are usedto create interactive web pages, can be programme

Strany 204 - 18.2.3. Creating Scan Tasks

Script ControlYou can see the rules created so far listed in the table.ImportantThe rules are listed in order of their priority starting from the top,

Strany 205

Select Address and ActionYou can set the parameters:⚫ Domain address - type in the domain on which the rule should apply.⚫ Action - select the action

Strany 206

22. FirewallThe Firewall protects your computer from inbound and outbound unauthorizedconnection attempts. It is quite similar to a guard at your gate

Strany 207

You can see whether the BitDefender firewall is enabled or disabled. If you want tochange the firewall status, clear or select the corresponding check

Strany 208

DescriptionDefault actionApplies the current rules and allows all traffic attemptsthat do not match any of the current rules withoutAllow Allprompting

Strany 209

NoteThis option does not automatically enable ICS on your system, but only allows thistype of connection in case you enable it from your operating sys

Strany 210

⚫ Enable Intrusion Detection (IDS) - activates the heuristic monitoring of theapplications trying to access network services or the Internet.22.2. Net

Strany 211 - Setting Scan Target

22.2.1. Changing the Trust LevelBitDefender assigns each network adapter a trust level. The trust level assigned tothe adapter indicates how trustwort

Strany 212

⚫ Yahoo Messenger 8.5⚫ Windows Live Messenger 8Antispam protection is provided for all POP3/SMTP e-mail clients. The BitDefenderAntispam toolbar howev

Strany 213

DescriptionStealth optionYour computer cannot be detected from the Internet.Local network users can ping and detect yourcomputer.Remote22.2.3. Configu

Strany 214 - Scheduling Scan Tasks

2. Select the action:⚫ Allow - to allow all traffic between your computer and the selected computer.⚫ Deny - to block all traffic between your compute

Strany 215 - Scanning Methods

through any adapter. You can manually create rules or edit existing rules to filteran application's network or Internet access through a specific

Strany 216

⚫ Action - whether the application is allowed or denied access to network or Internetunder the specified circumstances.22.3.1. Adding Rules Automatica

Strany 217

3. Click OK to add the new rule.Modifying rules. To modify an existing rule, follow these steps:1. Click the Edit rule button or double-click the rule

Strany 218 - Antivirus Scan Wizard

▸ If you want the rule to apply to UDP, select UDP.▸ If you want the rule to apply to a specific protocol, select Other. An edit fieldwill appear. Typ

Strany 219

Advanced ParametersYou can configure the following advanced parameters:⚫ Direction. Select from the menu the traffic direction the rule applies to.Des

Strany 220

▸ To filter traffic between your computer and a specific computer, clear the Anycheck box and type its IP address.▸ If you have selected TCP or UDP as

Strany 221

NoteWhen a connection attempt is made (whether incoming or outgoing), BitDefenderapplies the action of the first rule matching the respective connecti

Strany 222

You can see the total traffic sorted by application. For each application, you can seethe connections and the open ports, as well as statistics regard

Strany 223 - 18.2.6. Viewing Scan Logs

Each man has his price BobAnd yours was pretty lowBitDefender Total Security 2010

Strany 224

2. Preparing for InstallationBefore you install BitDefender Total Security 2010, complete these preparations toensure the installation will go smoothl

Strany 225

23. VulnerabilityAn important step in protecting your computer against malicious persons andapplications is to keep up to date the operating system an

Strany 226 - Step 1/4 - Select Object Type

ImportantTo be automatically notified about system or application vulnerabilities, keep theAutomatic Vulnerability Checking enabled.23.1.1. Fixing Vul

Strany 227

Automatic Vulnerability Checking SettingsSelect the check boxes corresponding to the system vulnerabilities you want to beregularly checked.⚫ Critical

Strany 228

24. BackupBitDefender comes with a Backup module that helps you make reserve copies ofany valuable data on your system. You can backup your data on yo

Strany 229

⚫ Settings - opens BitDefender Backup, which allows you to set up and executebackup operations in detail.24.1. Backup SettingsIf you need to perform m

Strany 230

There are two ways you can set up and execute backup operations. You eitheraccess the upper Menu Bar or click a certain tab from the Navigator Bar.The

Strany 231

To backup your emails only, click the Backup My Emails button and follow thethree step procedure.To backup your chat records only, click the Backup My

Strany 232

On the left, you will see a list of quick operation links, as follows:Job Management⚫ Create New Job⚫ Backup Job⚫ Scheduled Job⚫ Delete Job Schedule⚫

Strany 233 - 18.4. Quarantine Area

2. Type a name for your backup job or accept the default job name.Default job name is automatically generated when files or directories are selectedto

Strany 234

Incremental and Full Backup can also combine into a Rotation Backup. Forexample, you can set an Incremental Backup of the job while setting a FullBack

Strany 235

3. Installing BitDefenderYou can install BitDefender from the BitDefender installation CD or using theinstallation file downloaded on your computer fr

Strany 236

To encrypt data before backup, follow these steps:1. Click Encryption.2. Choose an encryption type from the drop-down menu.3. Type your password into

Strany 237 - 19. Antispam

1. Click File Filter.2. Click Filter File.3. Exclude or include specific files in the pop-up dialog box by checking theInclude only the rule-specified

Strany 238 - Bayesian Filter

NoteTo avoid being overwhelmed by information on network errors, click No errorreport is generated when network is not available.Split Backup SetThe g

Strany 239 - 19.1.2. Antispam Operation

Schedule JobThis is where you can schedule the backup job at a convenient time. You canschedule job to be executed daily, weekly, monthly or at any sp

Strany 240 - 19.2. Status

▸ Delete the task if it is not scheduled to run again.This task is useful for tasks scheduled to run only once.▸ Stop the task if it runs for:Specify

Strany 241 - Antispam

Modify Job OptionsThe selected job can be either a backup job or a burn job.For more information on how to modify backup jobs, please refer to “Backup

Strany 242

2. The Running User dialog box will appear. If you are the domain user, pleaseenter the domain password.3. Otherwise select Run as the following Windo

Strany 243

Specify whether the task should be stopped when your computer startsrunning on batteries.▸ Wake the computer to run this task.Specify whether the comp

Strany 244

2. Click Filter File.3. Exclude or include specific files in the pop-up dialog box by checking theInclude only the rule-specified files or Exclude the

Strany 245

Modify Job Properties1. Click the check box to select partitions, directories, or files to backup.When you select an item in the left side window, its

Strany 246 - 19.3. Settings

Follow these steps to install BitDefender Total Security 2010:1. Click Next. You can cancel installation anytime you want by clicking Cancel.BitDefend

Strany 247 - 19.3.1. Antispam Settings

Restore File1. Check the boxes next to the partitions, directories, or files selected to be restored.When you select an item in the left side window,

Strany 248

File Modified DateIf the option is selected, BitDefender uses the current date to indicate the datewhen the files and directories were restored. If no

Strany 249 - 20. Parental Control

Restore Options Dialog BoxThe restore options allow specifying whether the files to be restored already existat destination at restoration time, and w

Strany 250 - Parental Control

Log ViewerView LogsThe log viewing option allows tracing back your operation, and finding out the reasonof the operation failure.The description of a

Strany 251

DateThe date the log item occurred on.TimeThe local time when the logged item occurred.SourceThe source that logged the respective item, which can be

Strany 252

Import and Export LogsBitDefender Backup currently supports file import and export in two formats: .TXTand .XMLNoteWe recommend you to export and save

Strany 253 - 20.1.2. Setting Age Category

ToolboxBurn to CD/DVDTo burn data to a CD/DVD manually, follow these steps:1. Click Burn data to CD/DVD.2. Click Erase if you want to reuse a rewritab

Strany 254

2. Click Erase if you want to reuse a rewritable disk. If you want to erase it quickly,click Fast. If you need to erase the information track record c

Strany 255

⚫ Restore Time-Point Data: Restores the selected job to a certain time-point.If there are more than one selected jobs, it executes all of the selected

Strany 256

⚫ Import Logs: Imports logs from a .TXT file or an .XML file.▸ From a TXT file▸ From an XML file⚫ Options: Modifies your global backup options.▸ Gener

Strany 257 - 20.3. Web Control

ImportantWe recommend you to turn off Windows Firewall since BitDefender Total Security2010 already includes an advanced firewall. Running two firewal

Strany 258

25. EncryptionBitDefender offers encryption capabilities to protect your confidential documentsand your instant messaging conversations through Yahoo

Strany 259

Instant Messaging EncryptionBy default, IM Encryption is enabled for both Yahoo Messenger and Windows Live(MSN) Messenger. You can choose to disable I

Strany 260 - 20.4. Web Time Limiter

1. Click the Add button to open the configuration window.Adding Contacts2. Type in the edit field the user ID of your contact.3. Select the instant me

Strany 261 - 20.5. Applications Control

File VaultTo disable File Encryption, clear the File Encryption is enabled check box andclick Yes to confirm. If you disable File Vault, all file vaul

Strany 262

Create File VaultProceed as follows:1. Specify the location and the name of the vault file.⚫ Click Browse, select the location of the vault and save t

Strany 263 - 20.6. Keywords Control

25.2.2. Opening a VaultIn order to access and work with the files stored in a vault, you must open the vault.When you open the vault, a virtual disk d

Strany 264

⚫ Select the vault from the table and click Lock vault.⚫ Right-click the vault in the table and select Lock.⚫ Right-click the corresponding virtual di

Strany 265

NoteThe password must have at least 8 characters. For a strong password, use acombination of uppercase and lowercase letters, numbers and special char

Strany 266

3. Remove files or folders as you normally do in Windows (for example, right-clicka file you want to delete and select Delete).Encryption312BitDefende

Strany 267 - 21. Privacy Control

26. Tune-UpBitDefender comes with a Tune-Up module that helps you maintain the integrity ofyour system. The maintenance tools offered are critical for

Strany 268 - 21.2. Identity Control

3.1.1. Step 1/2 - Register BitDefender Total Security 2010RegistrationBitDefender Total Security 2010 comes with 30-day trial period. To continueevalu

Strany 269 - Privacy Control

⚫ Recover Registry can retrieve registry keys previously deleted from the WindowsRegistry using BitDefender Registry Cleaner.⚫ Shred Files permanently

Strany 270

Cookies are also stored on your computer when you visit a web page. Cookies aresmall files containing information about your web surfing preferences.

Strany 271 - Step 1/4 - Welcome Window

operating system, installed applications, users, preferences of your computer andothers.Many applications write keys in the Windows Registry at instal

Strany 272

To find duplicate files on your computer, follow these steps:1. In Expert Mode, click Tune-Up on the left menu.2. Click Run Now corresponding to Find

Strany 273 - 21.2.2. Defining Exclusions

27. Game / Laptop ModeThe Game / Laptop Mode module allows you to configure the special operationmodes of BitDefender:⚫ Game Mode temporarily modifies

Strany 274 - 21.2.3. Managing Rules

Game ModeAt the top of the section, you can see the status of the Game Mode. You can clickTurn On Game Mode Mode or Turn Off Game Mode to change the c

Strany 275 - 21.3. Registry Control

NoteIf you do not want BitDefender to automatically enter Game Mode, clear theAutomatic Game Mode check box.27.1.2. Managing the Game ListBitDefender

Strany 276

Adding or Editing GamesWhen you add or edit an entry from the game list, the following window will appear:Add GameClick Browse to select the applicati

Strany 277 - 21.4. Cookie Control

DescriptionOptionRun the scheduled task immediately after you exit GameMode.Postpone TaskTo automatically disable the BitDefender firewall while in Ga

Strany 278

3. Click OK to save the changes.27.2. Laptop ModeLaptop Mode is especially designed for laptop and notebook users. Its purpose is tominimize BitDefend

Strany 279 - 21.4.1. Configuration Window

3.1.2. Step 2/2 - Create a BitDefender AccountAccount CreationIf you do not want to create a BitDefender account at the moment, select Registerlater a

Strany 280

27.2.1. Configuring Laptop Mode SettingsTo configure the behaviour on scheduled tasks, use these options:⚫ Enable this module to modify Antivirus scan

Strany 281 - 21.5. Script Control

28. Home NetworkThe Network module allows you to manage the BitDefender products installed onyour home computers from a single computer.Network MapTo

Strany 282 - 21.5.1. Configuration Window

Configure Password2. Type the same password in each of the edit fields.3. Click OK.You can see the computer name appearing in the network map.28.2. Ad

Strany 283

Add ComputerYou can see the list of computers in the network. The icon meaning is as follows:⚫Indicates an online computer with no BitDefender product

Strany 284 - 22. Firewall

Authenticate5. Type the home management password configured on the respective computer.6. Click OK. If you have provided the correct password, the sel

Strany 285 - Firewall

Network MapIf you move the mouse cursor over a computer from the network map, you can seebrief information about it (name, IP address, number of issue

Strany 286

⚫ Fix all issues on this PCAllows you to fix the issues that are affecting the security of this computer byfollowing the Fix All Issues wizard.⚫ View

Strany 287

29. UpdateNew malware is found and identified every day. This is why it is very important tokeep BitDefender up to date with the latest malware signat

Strany 288 - 22.2. Network

Automatic UpdateHere you can see when the last check for updates and the last update wereperformed, as well as information about the last update perfo

Strany 289

The Update module will connect to the BitDefender update server and will verifyif any update is available. If an update was detected, depending on the

Strany 290 - 22.2.4. Network Zones

⚫ Re-type password - type in again the previously specified password.NoteOnce the account is activated, you can use the provided e-mail address andpas

Strany 291 - 22.3. Rules

Update SettingsThe update settings are grouped into 4 categories (Update Location Settings,Automatic Update Settings, Manual Update Settings and Advan

Strany 292

NoteWe recommend you to set as primary update location the local mirror and to leavethe alternate update location unchanged, as a fail-safe plan in ca

Strany 293

NoteIf BitDefender is updated while a scan is in progress, the scan process will beaborted.⚫ Don't update if game mode is on - BitDefender will n

Strany 294 - Configuring Main Parameters

on to that account. If the proxy server requires a username and a password, youmust specify them in the corresponding fields.⚫ Default Browser Proxy -

Strany 295

30. RegistrationTo find complete information on your BitDefender product and the registrationstatus, go to Registration in Expert Mode.RegistrationThi

Strany 296

RegistrationYou can see the BitDefender registration status, the current license key and howmany days are left until the license expires.To register B

Strany 297

ImportantYou must create an account within 15 days after installing BitDefender (if you registerit with a license key, the deadline is extended to 30

Strany 298 - 22.4. Connection Control

⚫ Password - type in a password for your BitDefender account. The passwordmust be between 6 and 16 characters long.⚫ Re-type password - type in again

Strany 299

activate Online Backup later. Online Backup is only available to users havingregistered to BitDefender Account.4. Optionally, BitDefender can inform y

Strany 300 - 23. Vulnerability

Integration into Windows and Third-Party Software343BitDefender Total Security 2010

Strany 301 - 23.2. Settings

4. Optionally, BitDefender can inform you about special offers and promotions usingthe e-mail address of your account. Select one of the available opt

Strany 302 - Vulnerability

31. Integration into Windows Contextual MenuThe Windows contextual menu appears whenever you right-click a file or folder onyour computer or objects o

Strany 303 - 24. Backup

2. Click Antivirus on the left-side menu.3. Click the Virus Scan tab.4. Right-click the Contextual Scan task and select Open. A window will appear.5.

Strany 304 - 24.1. Backup Settings

⚫ For a more straightforward approach, switch the user interface to Expert Mode andclick Encryption on the left-side menu. On the File Encryption tab,

Strany 305 - 24.1.1. Get Started

5. Select Format drive to format the virtual drive assigned to the vault. You mustformat the drive before you can add files to the vault.6. If you wan

Strany 306 - 24.1.2. Job Manager

5. Click Open.BitDefender will immediately inform you about the result of the operation. If an errorhas occurred, use the error message to troubleshoo

Strany 307 - Create New Job

1.Open My Computer (click the Windows Start menu and then My Computer).2. Enter the virtual disk drive corresponding to the vault. Look for the drive

Strany 308 - Backup Options Dialog Box

4. Type the new password of the vault in the New Password and Confirm NewPassword fields.NoteThe password must have at least 8 characters. For a stron

Strany 309

32. Integration into Web BrowsersBitDefender protects you against phishing attempts when you are surfing theInternet. It scans the accessed web sites

Strany 310

▸ Real-time Antiphishing Web Protection - detects and alerts you in real-timeif a web site is phished (set up to steal personal information). This opt

Strany 311

⚫ Report as Phishing - informs the BitDefender Lab that you consider therespective web site to be used for phishing. By reporting phished web sites yo

Strany 312 - Backup Job

3.2.1. Step 1 - Select Usage ProfileUsage ProfilesClick the button that best describes the activities performed on this computer (theusage profile).De

Strany 313 - Schedule Job

33. Integration into Instant Messenger ProgramsBitDefender offers encryption capabilities to protect your confidential documentsand your instant messa

Strany 314 - Modify Job Options

34. Integration into Mail ClientsBitDefender Total Security 2010 includes an Antispam module. Antispam verifiesthe e-mail messages you receive and ide

Strany 315 - Modify Options of Burn Job

34.1.1. Step 1/6 - Welcome WindowWelcome WindowClick Next.Integration into Mail Clients356BitDefender Total Security 2010

Strany 316

34.1.2. Step 2/6 - Fill in the Friends ListFill in the Friends ListHere you can see all the addresses from your Address Book. Please select thoseyou w

Strany 317

34.1.3. Step 3/6 - Delete Bayesian DatabaseDelete Bayesian DatabaseYou may find that your antispam filter has begun to lose efficiency. This may bedue

Strany 318 - Modify Job Properties

34.1.4. Step 4/6 - Train Bayesian Filter with Legitimate MailTrain Bayesian Filter with Legitimate MailPlease select a folder that contains legitimate

Strany 319 - Restore File

34.1.5. Step 5/6 - Train Bayesian Filter with SpamTrain Bayesian Filter with SpamPlease select a folder that contains spam e-mail messages. These mess

Strany 320 - Restore Options Dialog Box

34.1.6. Step 6/6 - SummarySummaryHere you can view all the settings for the configuration wizard. You can make anychanges, by returning to the previou

Strany 321 - Restore Time-Point Data

Antispam ToolbarEach button from the BitDefender toolbar will be explained below:⚫ Is Spam - sends a message to the Bayesian module indicating that th

Strany 322 - 24.1.3. Log Viewer

ImportantThe Not Spam button becomes active when you select a message marked asSPAM by BitDefender (normally these messages are located in the Spam fo

Strany 323 - View Logs

3.2.2. Step 2 - Describe ComputerComputer DescriptionSelect the options that apply to your computer:⚫ This computer is in a home network. Select this

Strany 324 - Clear Logs

⚫Spammers - opens the Spammers list that contains all the e-mail addressesfrom which you don't want to receive messages, regardless of their cont

Strany 325 - 24.1.4. Toolbox

▸ *domain* - all the received e-mail messages from domain (no matter the domainsuffixes) will be tagged as SPAM;▸ *com - all the received e-mail messa

Strany 326 - Burn ISO Image File to CD/DVD

Friends ListHere you can add or remove entries from the Friends list.If you want to add an e-mail address check the Email address option, type inthe a

Strany 327 - 24.1.5. Menu Bar

For Microsoft Outlook Express / Windows Mail a new window will appearfrom where you can select the folder that contains the e-mail addresses you wantt

Strany 328

The following options are available:▸ Move message to Deleted Items - moves the spam messages to the DeletedItems (only for Microsoft Outlook Express

Strany 329

How To369BitDefender Total Security 2010

Strany 330 - 25. Encryption

35. How to Scan Files and FoldersScanning is easy and flexible with BitDefender. There are 4 ways to set BitDefenderto scan files and folders for viru

Strany 331 - Encryption

Running Scan Tasks in Intermediate ModeIn Intermediate Mode, you can run a number of pre-configured scan tasks. You canalso configure and run custom s

Strany 332 - 25.2. File Encryption

2. Click the Virus Scan tab. Here you can find a number of default scan tasks andyou can create your own scan tasks. These are the default scan tasks

Strany 333 - 25.2.1. Creating a Vault

5. Click Continue to start the scan.6. Follow the Antivirus Scan wizard to complete the scan.What is Safe Mode?Safe Mode is a special way to start Win

Strany 334

Table of ContentsLicense and Warranty ... . ... . ... . ... . ... . . ... . ... . ... . ... . ... . ... . ... . . . xiiPreface . . ... . ... . ...

Strany 335 - 25.2.3. Locking a Vault

3.2.3. Step 3 - Select User InterfaceUser Interface View ModesClick the button that best describes your computer skills to select an appropriateuser i

Strany 336

36. How to Schedule Computer ScanScanning your computer periodically is a best practice to keep your computer freefrom malware. BitDefender allows you

Strany 337

4. Right-click the desired scan task and select Schedule. A new window will appear.5. Schedule the task to run as needed:⚫ To run the scan task one-ti

Strany 338

37. How to Back Up DataWith BitDefender Total Security 2010, you can make reserve copies of your valuabledata (documents, images etc) on various stora

Strany 339 - 26. Tune-Up

If you need more backup options, or if you want to manage the backup jobs youhave created, open BitDefender in Expert Mode, go to Backup and click Set

Strany 340 - 26.2. Cleaning Up Your PC

38. How to Restore Backed-up DataYou can easily recover lost data that you previously backed up with BitDefender.Before restoring any data, make sure

Strany 341

⚫ In Novice Mode, Protect Your PC area, click Backup and select Online Restorefrom the menu.⚫In Intermediate Mode, go to the File Storage tab, click t

Strany 342 - 26.6. Finding Duplicate Files

Troubleshooting and Getting Help380BitDefender Total Security 2010

Strany 343

39. TroubleshootingThis chapter presents some problems you may encounter when using BitDefenderand provides you with possible solutions to these probl

Strany 344 - 27. Game / Laptop Mode

Description&SolutionError2. Run the uninstall tool using administrator privileges.3. Restart your computer.4. Start the setup wizard again to inst

Strany 345 - Game / Laptop Mode

1. Clean up the system after the failed installation. If the installation fails,some BitDefender registry keys and files may remain in your system. Su

Strany 346

DescriptionModeYou can fix issues separately and choose which issuesto be monitored. Moreover, you can manage remotelythe BitDefender products install

Strany 347 - Adding or Editing Games

⚫ temporary communication errors between the BitDefender services.⚫ some of the BitDefender services are stopped.⚫ other security solutions running on

Strany 348

Unsecured Wi-Fi networks present a great security risk because your computeris connected to unknown computers. Without the proper protection provided

Strany 349 - 27.2. Laptop Mode

▸ If the Windows Firewall is used, it can be configured to allow file and printersharing as follows: open the Windows Firewall settings window, Except

Strany 350

5. Depending on the level of security you want to obtain, choose one of the followingoptions:⚫ Unsafe - to access the files and printers shared in the

Strany 351 - 28. Home Network

If you suspect the problem is with the BitDefender firewall, you can contactBitDefender for support as described in section “Support” (p. 396).39.4. A

Strany 352 - Home Network

NoteBitDefender integrates into the most commonly used mail clients through aneasy-to-use antispam toolbar. For a complete list of supported mail clie

Strany 353

4.Click the Add Friend button on the BitDefender antispam toolbar to add thesender to the Friends list. You may need to click OK to acknowledge. You w

Strany 354

8. Click Finish to start the training process.9. When training is completed, click Close.Ask for HelpIf this information was not helpful, you can cont

Strany 355

2. Go to the Inbox folder.3. Select the undetected spam messages.4. Click the Is Spam button on the BitDefender antispam toolbar (normally locatedin t

Strany 356

Retrain Learning Engine (Bayesian)Before training the Learning Engine (Bayesian), prepare a folder containing onlySPAM messages and another one contai

Strany 357 - 29. Update

2. If you are sharing your Windows user account with your children, select thecorresponding check box and type a password in the corresponding fields

Strany 358 - 29.1.1. Requesting an Update

NotePOP3 is one of the most widely used protocols for downloading e-mail messagesfrom a mail server. If you do not know the protocol that your e-mail

Strany 359 - 29.2. Update Settings

2. Run the uninstall tool using administrator privileges. The uninstall tool will removeall the files and registry keys that were not removed during t

Strany 360

40. SupportAs a valued provider, BitDefender strives to provide its customers with anunparalleled level of fast and accurate support. The BitDefender

Strany 361

40.3. Contact InformationEfficient communication is the key to a successful business. During the past 10years BITDEFENDER has established an unquestio

Strany 362 - 29.2.5. Managing Proxies

DeutschlandOffice: +49 2301 91 84 222Sales: [email protected] support: http://kb.bitdefender.deWeb: http://www.bitdefender.deUK and Ire

Strany 363

BitDefender Rescue CD399BitDefender Total Security 2010

Strany 364 - 30. Registration

41. OverviewBitDefender Total Security 2010 comes with a bootable CD (BitDefender RescueCD) capable to scan and disinfect all existing hard drives bef

Strany 365 - Registration

41.2. Included SoftwareBitDefender Rescue CD includes the following software packages.XeditThis is a text file editor.VimThis is a powerful text file

Strany 366

For more information, please refer to the Nessus homepage.IptrafIptraf is an IP Network Monitoring Software.For more information, please refer to the

Strany 367

42. BitDefender Rescue CD HowtoThis chapter contains information on how to start and stop the BitDefender RescueCD, scan your computer for malware as

Strany 368

3.2.6. Step 6 - Select the Tasks to Be RunTask SelectionSet BitDefender to perform important tasks for the security of your system. Thefollowing optio

Strany 369

The Desktop42.2. Stop BitDefender Rescue CDChoose "EXIT"You can safely shut down your computer by selecting Exitfrom the BitDefender Rescue

Strany 370 - 31.1. Scan with BitDefender

Wait for this message when shutting down42.3. How do I perform an antivirus scan?A wizard will appear when the boot process has finished and allow you

Strany 371 - 31.2. BitDefender File Vault

1. Double click the START SCANNER icon on the Desktop. This will launch theBitDefender Scanner for Unices.2. Click Scanner, a new window will appear.3

Strany 372 - 31.2.1. Create Vault

DescriptionConnectionSelect this type of connection when you are using a localarea network (LAN) to access the Internet. It is also suitablefor wirele

Strany 373 - 31.2.2. Open Vault

Update Signatures2. Do one of the following:▸ Select Cumulative to install signatures already saved on your hard disk bybrowsing your computer and loa

Strany 374 - 31.2.4. Add to File Vault

6. Press F2 to save the current file, confirm saving, and then press F10 to closeit.7. Type the command: bdscan update.42.6. How do I save my data?Let

Strany 375 - 31.2.6. Change Vault Password

Desktop Screen3. Double-click the partition where the data you want to save is located (e.g.[sda3]).NoteWhen working with BitDefender Rescue CD, you w

Strany 376 - 31.3. Shred Files

Saving Data6. Type /media/sdb1/ into the corresponding textbox and click Copy.Please be aware that depending on your computer configuration it might b

Strany 377 - Integration into Web Browsers

GlossaryActiveXActiveX is a model for writing programs so that other programs and the operatingsystem can call them. ActiveX technology is used with M

Strany 378

Internet Explorer. Both of these are graphical browsers, which means that theycan display graphics as well as text. In addition, most modern browsers

Strany 379

4. Right-click the System Scan task and select Schedule. A new window willappear.5. Change the frequency and the start time as needed.6. Click OK to s

Strany 380

Filename extensionThe portion of a filename, following the final point, which indicates the kind ofdata stored in the file.Many operating systems use

Strany 381 - Integration into Mail Clients

exists on tapes or disks. Every computer comes with a certain amount of physicalmemory, usually referred to as main memory or RAM.Non-heuristicThis me

Strany 382

Report fileA file that lists actions that have occurred. BitDefender maintains a report filelisting the path scanned, the folders, the number of archi

Strany 383

sends information back to the spyware's home base via the user's Internetconnection. Because spyware is using memory and system resources, t

Strany 384

itself over and over again is relatively easy to produce. Even such a simplevirus is dangerous because it will quickly use all available memory and br

Strany 385

4. UpgradeYou can upgrade to BitDefender Total Security 2010 if you are using BitDefenderTotal Security 2010 beta or the 2008 or 2009 version.There ar

Strany 386

5. Repairing or Removing BitDefenderIf you want to repair or remove BitDefender Total Security 2010, follow the pathfrom the Windows start menu: Start

Strany 387 - 34.2. Antispam Toolbar

Getting Started21BitDefender Total Security 2010

Strany 388

6. OverviewOnce you have installed BitDefender your computer is protected. If you have notcompleted the configuration wizard, you must open BitDefende

Strany 389

DescriptionModeYou can fix issues separately and choose which issuesto be monitored. Moreover, you can manage remotelythe BitDefender products install

Strany 390

6.6.1. Game Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 346.6.2. Laptop Mode . .

Strany 391

Novice ModeThe window is organized into three main sections:⚫ Security Status informs you of the issues that affect your computer's securityand h

Strany 392

DescriptionTaskThis wizard guides you through the process of creatinga local backup task. At the end of this process, you willLocal Backupbe able to b

Strany 393

DescriptionLinkGives you access to a help file that shows you how to useBitDefender.Help & Support6.2.2. Intermediate ModeAimed at users with aver

Strany 394

DescriptionTabDisplays the status of the BitDefender features designed toimprove your system's performance together with links totune-up tasks.Tu

Strany 395

Expert ModeOn the left side of the window there is a menu containing all security modules. Eachmodule has one or more tabs where you can configure the

Strany 396 - 35.2. Using Scan Tasks

DescriptionModuleAllows you to prevent data theft from your computer andprotect your privacy while you are online.Privacy ControlAllows you to protect

Strany 397 - How to Scan Files and Folders

DescriptionLinkAllows you to enter a new license key or to view the currentlicense key and the registration status.RegisterAllows you to contact the B

Strany 398

⚫Letter G: The product operates in Game Mode.If BitDefender is not working, the system tray icon is grayed out . This usuallyhappens when the license

Strany 399 - 35.4. Using Scan Activity Bar

specify other actions to be taken on infected files. The scanning options are standardand you cannot change them.6.4.2. Disable/Restore Scan Activity

Strany 400 - How to Schedule Computer Scan

BitDefender Manual ScanClick Add Folder, select the location you want to scan and click OK. If you want toscan multiple folders, repeat this action fo

Strany 401

11.5.6. File Shredder Wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10611.6. File Vault Wizards . . .

Strany 402 - 37. How to Back Up Data

applications work in Safe Mode. This is why most viruses are inactive when usingWindows in Safe Mode and they can be easily removed.To start Windows i

Strany 403 - How to Back Up Data

⚫ Press Ctrl+Shift+Alt+G (the default hotkey).ImportantDo not forget to turn Game Mode off when you finish. To do this, use the samemethods you did wh

Strany 404 - How to Restore Backed-up Data

2. Click the Settings button in the upper-right corner of the window.3. In the General Settings category, select the check box corresponding to Laptop

Strany 405

7. Click OK to save and apply the changes.Overview37BitDefender Total Security 2010

Strany 406

7. Fixing IssuesBitDefender uses an issue tracking system to detect and inform you about the issuesthat may affect the security of your computer and d

Strany 407 - 39. Troubleshooting

Fix All Issues WizardThe wizard displays the list of existing security vulnerabilities on your computer.All current issues are selected to be fixed. I

Strany 408 - 39.1.2. Failed Installation

⚫ System vulnerabilities. BitDefender automatically checks your system forvulnerabilities and alerts you about them. System vulnerabilities include th

Strany 409 - Troubleshooting

8. Configuring Basic SettingsYou can configure the main product settings (including changing the user interfaceview mode) from the basic settings wind

Strany 410 - Not Work

8.1. User Interface SettingsIn this area, you can switch the user interface view mode and reset the usage profile.Switching the user interface view mo

Strany 411

8.2. Security SettingsIn this area, you can enable or disable product settings that cover various aspectsof computer and data security. The current st

Strany 412

17.2. Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16017.2.1. Gene

Strany 413

DescriptionSettingdefined. Restrictions may include blockinginappropriate web sites, as well as limiting gaming andInternet access according to a spec

Strany 414

DescriptionSettingGame Mode temporarily modifies protection settingsso as to minimize their impact on system performanceduring games.Game ModeLaptop M

Strany 415 - Indicate Detection Errors

9. History and EventsThe View Logs link at the bottom of the BitDefender main window opens anotherwindow with the BitDefender history & events. Th

Strany 416

⚫ Vulnerability⚫ Backup⚫ IM encryption⚫ File Encryption⚫ Tune-Up⚫ Game/Laptop Mode⚫ Home Network⚫ Update⚫ Registration⚫ Internet LogA list of events i

Strany 417 - Ask for Help

10. Registration and My AccountBitDefender Total Security 2010 comes with 30-day trial period. During the trialperiod, the product is fully functional

Strany 418 - Add Spammers to Spammers List

RegistrationYou can see the BitDefender registration status, the current license key and howmany days are left until the license expires.To register B

Strany 419

10.2. Activating BitDefenderTo activate BitDefender, you must create or sign in to a BitDefender account. If youdid not register a BitDefender account

Strany 420

ImportantYou must create an account within 15 days after installing BitDefender (if you registerit with a license key, the deadline is extended to 30

Strany 421

If you already have an active account, but BitDefender does not detect it, followthese steps to register the product to that account:1. Select Sign in

Strany 422 - 40. Support

11. WizardsIn order to make BitDefender very easy to use, several wizards help you carry outspecific security tasks or configure more complex product

Strany 423 - 40.3. Contact Information

20.5. Applications Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23520.5.1. Creating Appli

Strany 424 - UK and Ireland

You can see the scan status and statistics (scanning speed, elapsed time, numberof scanned / infected / suspicious / hidden objects and other).Wait fo

Strany 425 - BitDefender Rescue CD

ActionsYou can see the number of issues affecting your system.The infected objects are displayed in groups, based on the malware they are infectedwith

Strany 426 - 41. Overview

DescriptionActionto search for and find such files on your computer, ifany.Please note that these hidden files are not the filesthat you deliberately

Strany 427 - 41.2. Included Software

Click Close to close the window.BitDefender Could Not Solve Some IssuesIn most cases BitDefender successfully disinfects the infected files it detects

Strany 428 - Overview

Welcome WindowIf you want to skip over this window when running this wizard in the future, selectthe Don't show this step the next time this wiza

Strany 429 - BitDefender Rescue CD Howto

Select TargetClick Add Target, select the files or folders that you want to scan and click OK.The paths to the selected locations will appear in the S

Strany 430

DescriptionOptionOnly the files with the extensions specified by the userwill be scanned. These extensions must be separatedby ";".Scan user

Strany 431

DescriptionActionMoves infected files into the quarantine. Quarantinedfiles cannot be executed or opened; therefore, therisk of getting infected disap

Strany 432

Custom Scan LevelSpecify the type of malware you want BitDefender to scan for by selecting theappropriate options:DescriptionOptionScans for known vir

Strany 433

Click OK to close the window.Click Next.11.2.4. Step 4/6 - Additional SettingsBefore scanning begins, additional options are available:Additional Sett

Strany 434

24.1.5. Menu Bar . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30125. Encryption .. . .

Strany 435 - 42.6. How do I save my data?

ScanningNoteThe scanning process may take a while, depending on the complexity of the scan.You can click the scan progress icon in the system tray to

Strany 436

SummaryYou can see the results summary. If you want comprehensive information on thescanning process, click View Log to view the scan log.ImportantIf

Strany 437

11.3.1. Step 1/6 - Select Vulnerabilities to CheckVulnerabilitiesClick Next to check the system for the selected vulnerabilities.Wizards66BitDefender

Strany 438 - Glossary

11.3.2. Step 2/6 - Checking for VulnerabilitiesVulnerability CheckWait for BitDefender to finish checking for vulnerabilities.Wizards67BitDefender Tot

Strany 439

11.3.3. Step 3/6 - Update WindowsWindows UpdatesYou can see the list of critical and non-critical Windows updates that are not currentlyinstalled on y

Strany 440

11.3.4. Step 4/6 - Update ApplicationsApplicationsYou can see the list of applications checked by BitDefender and if they are up todate. If an applica

Strany 441

11.3.5. Step 5/6 - Change Weak PasswordsUser PasswordsYou can see the list of the Windows user accounts configured on your computer andthe level of pr

Strany 442

⚫ Change user password. You must type the new password in the edit fields.Make sure to inform the user about the password change.NoteFor a strong pass

Strany 443

11.4.1. Local Backup WizardThis wizard guides you through the process of creating a local backup task. At theend of this process, you will be able to

Strany 444

Choose what to backupYou can choose either Quick Backup (your music, videos, pictures, emails,applications settings, etc.) or Full Backup (all partiti

Komentáře k této Příručce

Žádné komentáře