Bitdefender Av Userguide
Bitdefender Av Userguide
Legal Notice
All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means, electronic
or mechanical, including photocopying, recording, or by any information storage and retrieval system, without written
permission from an authorized representative of Bitdefender. The inclusion of brief quotations in reviews may be
possible only with the mention of the quoted source. The content can not be modified in any way.
Warning and Disclaimer. This product and its documentation are protected by copyright. The information in this
document is provided on an “as is” basis, without warranty. Although every precaution has been taken in the
preparation of this document, the authors will not have any liability to any person or entity with respect to any loss
or damage caused or alleged to be caused directly or indirectly by the information contained in this work.
This book contains links to third-party Websites that are not under the control of Bitdefender, therefore Bitdefender
is not responsible for the content of any linked site. If you access a third-party website listed in this document, you
will do so at your own risk. Bitdefender provides these links only as a convenience, and the inclusion of the link does
not imply that Bitdefender endorses or accepts any responsibility for the content of the third-party site.
Trademarks. Trademark names may appear in this book. All registered and unregistered trademarks in this document
are the sole property of their respective owners, and are respectfully acknowledged.
50340A34392034390AFE02048790BF8082B92FA06FA080BA74BC7CC1AE80BA996CE11D2E80BA74C7E78C2E80
82FFB239EA2080FEAAAAAAAABF800006AA3FB00000FBD5EFE73AD5009CF2544B4C3D00A6B67D616B878031FB
500EA66D0063567F854DF700E84116D29479001E1671326B0580C5FB204BC43D8067FDFBC34DB780D0D21797
1C6C00C7917C347B4580254D7859B54800EE712FF15D9700606495D7DC7D00AFBD83E36BFD8058E6B23EC589
003A89EEB31DAF00C8C91627818C001FB72BF86BFB803D6ABDBFC000809E5E6C015DFE80A54917860DD200B3
0202C06377805DE366E8361180DF05ED2359FA00AD5455C690B200A3E97B50FB728034D4AF78869180FFA96A
063B6F80D53484FF0C718046A5B3D16B298071D6D5BE608100E375ABE609FE8000DA16331D8A00FEF606A13E
AF80825B662EA68800BADF6BE52EFE80BA891646848B00BA9C21A5EE700082CC28DA84E080FEA1EC237E1780
Bitdefender Antivirus Plus
Table of Contents
Installation ................................................................ 1
1. Preparing for installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
2. System requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
2.1. Software requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
3. Installing your Bitdefender product . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
3.1. Install from Bitdefender Central . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
3.2. Install from installation disc . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
iii
Bitdefender Antivirus Plus
How to .................................................................... 44
9. Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
9.1. How do I install Bitdefender on a second device? . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
9.2. How can I reinstall Bitdefender? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
9.3. Where can I download my Bitdefender product from? . . . . . . . . . . . . . . . . . . . . . . . 46
9.4. How can I change the language of my Bitdefender product? . . . . . . . . . . . . . . . . . 47
9.5. How do I use my Bitdefender subscription after a Windows upgrade? . . . . . . . . . 47
9.6. How can I upgrade to the latest Bitdefender version? . . . . . . . . . . . . . . . . . . . . . . . 50
10. Bitdefender Central . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
10.1. How do I sign in to Bitdefender account with another account? . . . . . . . . . . . . . 51
10.2. How do I turn off Bitdefender Central help messages? . . . . . . . . . . . . . . . . . . . . . 51
10.3. I forgot the password I set for my Bitdefender account. How do I reset it? . . . . 52
10.4. How can I manage the logon sessions associated to my Bitdefender
account? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
11. Scanning with Bitdefender . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
11.1. How do I scan a file or a folder? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
11.2. How do I scan my system? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
11.3. How do I schedule a scan? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
11.4. How do I create a custom scan task? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
11.5. How do I except a folder from being scanned? . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
11.6. What to do when Bitdefender detected a clean file as infected? . . . . . . . . . . . . . 58
11.7. How do I check what threats Bitdefender detected? . . . . . . . . . . . . . . . . . . . . . . . 59
12. Privacy protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
12.1. How do I make sure my online transaction is secure? . . . . . . . . . . . . . . . . . . . . . . 60
12.2. How do I remove a file permanently with Bitdefender? . . . . . . . . . . . . . . . . . . . . . 60
12.3. How can I manually restore encrypted files when the restoration process
fails? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
13. Useful Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
13.1. How do I test my security solution? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
13.2. How do I remove Bitdefender? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
13.3. How do I remove Bitdefender VPN? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
13.4. How do I remove the Bitdefender Anti-tracker extension? . . . . . . . . . . . . . . . . . . 64
13.5. How do I automatically shut down the device after the scan is over? . . . . . . . . 65
13.6. How do I configure Bitdefender to use a proxy internet connection? . . . . . . . . . 66
13.7. Am I using a 32 bit or a 64 bit version of Windows? . . . . . . . . . . . . . . . . . . . . . . . . 67
iv
Bitdefender Antivirus Plus
v
Bitdefender Antivirus Plus
vi
Bitdefender Antivirus Plus
vii
Bitdefender Antivirus Plus
INSTALLATION
1
Bitdefender Antivirus Plus
2. SYSTEM REQUIREMENTS
You may install Bitdefender Antivirus Plus only on devices running the
following operating systems:
● Windows 7 with Service Pack 1
● Windows 8
● Windows 8.1
● Windows 10
● 2,5 GB available free hard disk space (at least 800 MB on the system drive)
● 2 GB of memory (RAM)
Important
System performance may be affected on devices that have old generation
CPUs.
Note
To find out the Windows operating system your device is running and hardware
information:
● In Windows 7, right-click My Computer on the desktop, and then select
Properties from the menu.
● In Windows 8, from the Windows Start screen, locate Computer (for example,
you can start typing "Computer" directly in the Start screen), and then
right-click its icon. In Windows 8.1, locate This PC.
Select Properties in the bottom menu. Look in the System area to find
information about your system type.
● In Windows 10, type System in the search box from the taskbar and click
its icon. Look in the System area to find information about your system
type.
System requirements 3
Bitdefender Antivirus Plus
System requirements 4
Bitdefender Antivirus Plus
Note
Downloading the installation files can take a long time, especially over slower
internet connections.
Once the installation is validated, the setup wizard appears. Follow the steps
to install Bitdefender Antivirus Plus.
Note
Alternatively, if you do not wish to perform the scan, you can simply click on
Skip.
Note
Downloading the installation files can take a long time, especially over slower
internet connections.
Once the installation is validated, the setup wizard appears. Follow the steps
to install Bitdefender Antivirus Plus.
If you do not agree to these terms, close the window. The installation process
will be abandoned and you will exit setup.
Two additional tasks can be performed at this step:
● Keep the Send product reports option enabled. By allowing this option,
reports containing information about how you use the product are sent
to the Bitdefender servers. This information is essential for improving the
product and can help us provide a better experience in the future. Note
that these reports contain no confidential data, such as your name or IP
address, and that they will not be used for commercial purposes.
● Select the language you want to install the product in.
Click INSTALL to launch the installation process of your Bitdefender product.
Note
Alternatively, if you do not wish to perform the scan, you can simply click on
Skip.
Note
Once the account is created, you can use the provided email address and
password to sign in to your account at https://central.bitdefender.com, or
in the Bitdefender Central app provided that it is installed on one of your
Android or iOS devices. To install the Bitdefender Central app on Android,
you have to access Google Play, search Bitdefender Central, and then tap
the corresponding installation option. To install the Bitdefender Central app
on iOS, you have to access App Store, search Bitdefender Central, and then
tap the corresponding installation option.
c. Check your email account, type the security code you have received,
and then click NEXT.
Alternatively, you can click Change password in the email that we
sent you.
d. Type the new password you want to set, and then type it once again.
Click SAVE.
Note
If you already have a MyBitdefender account, you can use it to sign into
your Bitdefender account. If you forgot your password, you first need to
go to https://my.bitdefender.com to reset it. Then, use the updated
credentials to sign into your Bitdefender account.
Note
Bitdefender does not get access to any confidential information such as
the password of the account you use to sign in, or the personal information
of your friends and contacts.
Note
You can find your activation code:
● on the CD/DVD label.
● on the product registration card.
● in the online purchase email.
GETTING STARTED
13
Bitdefender Antivirus Plus
4. THE BASICS
Once you have installed Bitdefender Antivirus Plus, your device is protected
against all kinds of threats (such as malware, spyware, ransomware, exploits,
botnets and trojans).
The app uses the Photon technology to enhance the speed and performance
of the threat scanning process. It works by learning the usage patterns of
your system apps to know what and when to scan, thus minimizing the
impact on system performance.
Connecting to public wireless networks belonging to airports, malls, cafés,
or hotels without protection may be dangerous for your device and data.
This is mainly because fraudsters may be watching your activity and find
the best moment to steal personal data, but also because everyone can see
your IP address, thus making your machine a victim for future cyberattacks.
To avoid such unfortunate situations, install and use the “VPN” (p. 117) app.
You can keep track of your passwords and online accounts by storing them
with “Password Manager protection for your credentials” (p. 107) in a wallet.
With a single master password you are able to protect your privacy from
intruders that may try to let you out of money.
To safeguard you from potential snoops and spies when your device is
connected to an unsecured wireless network, Bitdefender analyzes its security
level, and when necessary, comes with recommendations to boost the safety
of your online activities. For instructions on how to keep your personal data
secure, refer to “Wi-Fi Security Advisor” (p. 100).
Files encrypted by ransomware can now be recovered without having to
spend money for any requested ransom. For information on how to recover
encrypted files, refer to “Ransomware Remediation” (p. 104).
While you work, play games or watch movies, Bitdefender can offer you a
continuous user experience by postponing maintenance tasks, eliminating
interruptions and adjusting system visual effects. You can benefit from all
these by activating and configuring “Profiles” (p. 127).
Bitdefender will make most security-related decisions for you and will rarely
show pop-up alerts. Details about actions taken and information about
program operation are available in the Notifications window. For more
information, refer to “Notifications” (p. 16).
The basics 14
Bitdefender Antivirus Plus
From time to time, you should open Bitdefender and fix any existing issues.
You may have to configure specific Bitdefender components or take
preventive actions to protect your device and your data.
To use the online features of Bitdefender Antivirus Plus and manage your
subscriptions and devices, access your Bitdefender account. For more
information, refer to “Bitdefender Central” (p. 29).
The “How to” (p. 44) section is where you will find step-by-step instructions
on how to perform common tasks. If you experience issues while using
Bitdefender, check the “Solving common issues” (p. 136) section for possible
solutions to the most common problems.
The basics 15
Bitdefender Antivirus Plus
4.2. Notifications
Bitdefender keeps a detailed log of events concerning its activity on your
device. Whenever something relevant to the security of your system or data
happens, a new message is added to the Bitdefender Notifications area, in
a similar way to a new email appearing in your Inbox.
Notifications are an important tool in monitoring and managing your
Bitdefender protection. For instance, you can easily check if the update was
successfully performed, if threats or vulnerabilities were found on your device,
etc. Additionally, you can take further action if needed or change actions
taken by Bitdefender.
To access the Notifications log, click Notifications on the navigation menu
on the Bitdefender interface. Every time a critical event occurs, a counter
can be noticed on the icon.
Depending on type and severity, notifications are grouped in:
● Critical events indicate critical issues. You should check them immediately.
● Warning events indicate non-critical issues. You should check and fix them
when you have the time.
● Information events indicate successful operations.
Click each tab to find more details about the generated events. Brief details
are displayed at a single-click on each event title, namely: a short description,
the action Bitdefender took on it when it happened, and the date and time
when it occurred. Options may be provided to take further action if needed.
To help you easily manage logged events, the Notifications window provides
options to delete or mark as read all events in that section.
4.3. Profiles
Some computer activities, such as online games or video presentations,
require increased system responsiveness, high performance and no
interruptions. When your laptop is running on battery power, it is best that
unnecessary operations, which consume additional power, be postponed
until the laptop is connected back to A/C power.
Bitdefender Profiles assigns more system resources to the running apps by
temporarily modifying protection settings and adjusting system configuration.
Consequently, the system impact on your activity is minimized.
The basics 16
Bitdefender Antivirus Plus
The basics 17
Bitdefender Antivirus Plus
Important
Be sure to remember your password or keep a record of it in a safe place. If
you forget the password, you will have to reinstall the program or to contact
Bitdefender for support.
Note
To modify the password for your product, click Password change. Type your
current password, and then click OK. In the new window which appears type
the new password you want to use from now on to restrict the access to your
Bitdefender settings.
The basics 18
Bitdefender Antivirus Plus
If during the installation process you have chosen to send such reports to
the Bitdefender servers and now would like to stop the process:
1. Click Settings on the navigation menu on the Bitdefender interface.
2. Select the Advanced tab.
3. Turn off Product reports.
The basics 19
Bitdefender Antivirus Plus
5. BITDEFENDER INTERFACE
Bitdefender Antivirus Plus meets the needs of computer beginners and very
technical people alike. Its graphical user interface is designed to suit each
and every category of users.
To go through the Bitdefender interface, an introduction wizard containing
details on how to interact with the product and how to configure it is
displayed on the upper left side. Select the right angle bracket to continue
being guided, or Skip tour to close the wizard.
The Bitdefender system tray icon is available at any time, no matter whether
you want to open the main window, run a product update, or view information
about the installed version.
The main window gives you information about your security status. Based
on your device usage and needs, Autopilot displays here different types of
recommendations to help you improve your device security and performance.
Moreover, you can add quick actions that you use the most, so that you can
have them at hand whenever you need.
From the navigation menu on the left side you can access the settings area,
notifications and the Bitdefender sections for detailed configuration and
advanced administrative tasks.
From the upper part of the main interface, you can access your Bitdefender
account. Also, you can contact us for support in case you have questions
or something unexpected appears.
Note
The Bitdefender icon may not be visible at all times. To make the icon appear
permanently:
● In Windows 7, Windows 8 and Windows 8.1:
1. Click the arrow in the lower-right corner of the screen.
2. Click Customize... to open the Notification Area Icons window.
3. Select the option Show icons and notifications for the Bitdefender agent
icon.
Bitdefender interface 20
Bitdefender Antivirus Plus
● In Windows 10:
1. Right-click the taskbar and select Taskbar settings.
2. Scroll down and click the Select which icons appear on the taskbar link
under Notification area.
3. Enable the switch next to Bitdefender agent.
If you double-click this icon, Bitdefender will open. Also, by right-clicking the
icon, a contextual menu will allow you to quickly manage the Bitdefender
product.
● Show - opens the main window of Bitdefender.
● About - opens a window where you can see
information about Bitdefender, where to look for
help in case something unexpected appears,
where to access and view the Subscription
Agreement, 3rd Party Components and Privacy
Policy.
● Update Now - starts an immediate update. You
can follow the update status in the Update panel Tray Icon
of the main Bitdefender window.
The Bitdefender system tray icon informs you when issues affect your device
or how the product operates, by displaying a special symbol, as follows:
No issues are affecting the security of your system.
Critical issues are affecting the security of your system. They require your
immediate attention and must be fixed as soon as possible.
If Bitdefender is not working, the system tray icon appears on a gray
background: . This usually happens when the subscription expires. It can
also occur when the Bitdefender services are not responding or when other
errors affect the normal operation of Bitdefender.
Bitdefender interface 21
Bitdefender Antivirus Plus
● Dashboard. From here, you can quickly fix security issues, view
recommendations according to your system needs and usage patterns,
and perform quick actions.
●
● Protection. From here, you can launch and configure antivirus scans,
recover data in case it gets encrypted by a ransowmware, and configure
protection while surfing on the internet.
● Privacy. From here, you can create password managers for your online
accounts, make online payments in a safe environment, and open the VPN
app.
● Utilities. From here, you can manage profiles and access the Data
Protection feature.
5.3. Dashboard
The Dashboard window allows you to perform common tasks, quickly fix
security issues, view information about product operation and access the
panels from where you configure the product settings.
Everything is just a few clicks away.
The window is organized in three main areas:
Bitdefender interface 22
Bitdefender Antivirus Plus
5.3.2. Autopilot
To offer you an effective operation and increased protection while carrying
out different activities, Bitdefender Autopilot will act as your personal security
advisor. Depending on the activity you perform, either you work, make online
payments, watch movies, or play games Bitdefender Autopilot will come up
with contextual recommendations based on your device usage and needs.
The proposed recommendations may also be related to actions that you
need to perform to keep your product working at its full capacity.
To start using a suggested feature or make improvements into your product,
click the corresponding button.
Bitdefender interface 23
Bitdefender Antivirus Plus
1. Click the icon in the upper-right corner of the card you want to remove.
2. Point the task you want to add to the main interface, and then click ADD.
The tasks you can add to the main interface, are:
● Quick Scan. Run a quick scan to promptly detect the possible threats that
may be present on your device.
● System Scan. Run a system scan to make sure your device is clean of
threats.
● Vulnerability Scan. Scan your device for vulnerabilities to make sure that
all installed apps, along with the Operating System, are updated and
properly functioning.
● Wi-Fi Secutity Advisor. Open the Wi-Fi Security Advisor window inside the
Vulnerability module.
● Wallets. View and manage your wallets.
● Open Safepay. Open Bitdefender Safepay™ to protect your sensitive data
while performing online transactions.
● Open VPN. Open Bitdefender VPN to add an extra layer of protection while
connected to the internet.
● File Shredder. Launch the File Shredder tool to remove traces of sensitive
data from your device.
To start protecting additional devices with Bitdefender:
1. Click Install on another device.
Bitdefender interface 24
Bitdefender Antivirus Plus
5.4.1. Protection
In the Protection section you can configure your advanced security settings,
set up the Online Threat Prevention features, check and fix potential system
vulnerabilities and assess the security of the wireless networks you connect
to.
The features you can manage in the Protection section are:
ANTIVIRUS
Antivirus protection is the foundation of your security. Bitdefender
protects you in real-time and on-demand against all sorts of threats,
such as malware, trojans, spyware, adware, etc.
From the Antivirus feature you can easily access the following scan
tasks:
Bitdefender interface 25
Bitdefender Antivirus Plus
● Quick Scan
● System Scan
● Manage Scans
● Rescue Environment
For more information about scan tasks and how to configure antivirus
protection, refer to “Antivirus protection” (p. 72).
ONLINE THREAT PREVENTION
Online Threat Prevention helps you to stay protected against phishing
attacks, fraud attempts and private data leaks, while surfing on the
internet.
For more information about how to configure Bitdefender to protect your
web activity, refer to “Online Threat Prevention” (p. 93).
ADVANCED THREAT DEFENSE
Advanced Threat Defense actively protects your system against threats
such as ransomware, spyware and trojans by analyzing the behavior of
all installed apps. Suspicious processes are identified and, when
necessary, blocked.
For more information about how to keep your system protected from
threats, refer to “Advanced Threat Defense” (p. 91).
VULNERABILTY
The Vulnerability module helps you keep the operating system and the
apps you regularly use up to date and to identify the insecure wireless
networks you connect to. Click Open in the Vulnerability module to acces
its features.
The Vulnerability Scan feature allows you to identify critical Windows
updates, app updates, weak passwords belonging to Windows accounts
and wireless networks that are not secure. Click Start Scan to perform
a scan on your device.
Click on Wi-Fi Security Advisor to view the list of the wireless networks
you connect to, along with our reputation assessment for each of them
and the actions you can take to stay safe from potential snoops.
For more information on configuring vulnerability protection, refer to
“Vulnerability” (p. 96).
Bitdefender interface 26
Bitdefender Antivirus Plus
RANSOMWARE REMEDIATION
The Ransomware Remediation feature helps you recover files in case
they get encrypted by ransomware.
For more information about how to recover encrypted files, refer to
“Ransomware Remediation” (p. 104).
5.4.2. Privacy
In the Privacy section you can open the Bitdefender VPN app, protect your
online transactions and keep your browsing experience secure.
The features you can manage in the Privacy section are:
VPN
VPN secures your online activity and hides your IP address each time
you connect to unsecured wireless networks while in airports, malls,
cafés, or hotels. Additional, you can access content that normally is
restricted in certain areas.
For more information about this feature, refer to “VPN” (p. 117).
PASSWORD MANAGER
Bitdefender Password Manager helps you keep track of your passwords,
protects your privacy and provides a secure browsing experience.
For more information about configuring Password Manager, refer to
“Password Manager protection for your credentials” (p. 107).
SAFEPAY
The Bitdefender Safepay™ browser helps you to keep your online banking,
e-shopping and any other type of online transaction private and secure.
For more information about Bitdefender Safepay™, refer to “Safepay
security for online transactions” (p. 120).
ANTI-TRACKER
The Anti-tracker feature helps you avoid tracking, so that your data
remains private while you browse online, while also reducing the time it
takes for websites to load.
For more information about the Anti-tracker feature, refer to “Anti-tracker”
(p. 114).
Bitdefender interface 27
Bitdefender Antivirus Plus
5.4.3. Utilities
Data Protection
The Bitdefender File Shredder helps you permanently delete data by
physically removing it from your hard disk.
For more information about it, refer to “Data Protection” (p. 134).
Profiles
Daily job activities, watching movies or playing games may cause system
slow down, especially if they are running simultaneously with Windows
update processes and maintenance tasks.
With Bitdefender, you can now choose and apply your preferred profile,
which makes system adjustments suited to increase the performance
of specific installed apps.
For more information about this feature, refer to “Profiles” (p. 127).
Bitdefender interface 28
Bitdefender Antivirus Plus
6. BITDEFENDER CENTRAL
Bitdefender Central is the platform where you have access to the product's
online features and services and can remotely perform important tasks on
devices Bitdefender is installed on. You can sign in to your Bitdefender
account from any device connected to the internet by going to
https://central.bitdefender.com, or directly from the Bitdefender Central app
on Android and iOS devices.
To install the Bitdefender Central app on your devices:
● On Android - search Bitdefender Central on Google Play, and then download
and install the app. Follow the required steps to complete the installation.
● On iOS - search Bitdefender Central on App Store, and then download and
install the app. Follow the required steps to complete the installation.
Once you are signed in, you can start doing the following:
● Download and install Bitdefender on Windows, macOS, iOS and Android
operating systems. The products available for download are:
● Bitdefender Antivirus Plus
● Bitdefender Antivirus for Mac
● Bitdefender Mobile Security for Android
● Bitdefender Mobile Security for iOS
● Manage and renew your Bitdefender subscriptions.
● Add new devices to your network and manage them wherever you are.
Bitdefender Central 29
Bitdefender Antivirus Plus
Note
In this material you are provided with the options and instructions available
on the web platform.
Bitdefender Central 30
Bitdefender Antivirus Plus
If you would like to use an authenticator app, but you are not sure what
to choose, a list with the authentication apps we recommend is
available.
a. Click USE AUTHENTICATOR APP to start.
b. To sign in on an Android or iOS-based device, use your device to scan
the QR code.
To sign in on a laptop or a desktop, you can add manually the
displayed code.
Click CONTINUE.
c. Insert the code provided by the app or the one displayed at the
previous step, and then click ACTIVATE.
● E-mail - each time you sign in to your Bitdefender account, a verification
code will be sent to your email inbox. Check your email account, and
then type in the code you have received.
a. Click USE EMAIL to start.
b. Check your email account and type in the provided code.
Note that you have five minutes to check your email account and
type in the generated code. If the time expires, you will have to
generate a new code by following the same steps.
c. Click ACTIVATE.
d. You are provided with ten activation codes. You can either copy,
download, or print the list and use it in case you lose your email
address or will not be able to sign in. Each code can only be used
once.
e. Click DONE.
In case you want to stop using 2-Factor Authentication:
1. Click TURN OFF 2-FACTOR AUTHENTICATION.
2. Check your app or email account and type in the code you have received.
In case you have choosen to receive the authentication code via email,
you have five minutes to check your email account and type in the
generated code. If the time expires, you will have to generate a new code
by following the same steps.
3. Confirm your choice.
Bitdefender Central 31
Bitdefender Antivirus Plus
6.3. My Subscriptions
The Bitdefender Central platform gives you the possibility to easily manage
the subscriptions you have for all your devices.
Note
You can have one or more subscriptions on your account provided that they
are for different platforms (Windows, macOS, iOS or Android).
Bitdefender Central 32
Bitdefender Antivirus Plus
Bitdefender Central 33
Bitdefender Antivirus Plus
6.4. My Devices
The My Devices area in Bitdefender Central gives you the possibility to install,
manage and take remote actions on your Bitdefender product on any device,
provided that it is turned on and connected to the internet. The device cards
display the device name, protection status and if there are security risks
affecting the protection of your devices.
To view a list of your devices sorted according to their status or users, click
the drop-down arrow in the upper-right corner of the screen.
To easily identify your devices, you can customize the device name:
1. Access Bitdefender Central.
2. Select the My Devices panel.
3. Click the desired device card, and then the icon in the upper-right
corner of the screen.
4. Select Settings.
5. Type in a new name in the Device name field, then click SAVE.
Bitdefender Central 34
Bitdefender Antivirus Plus
You can create and assign an owner to each of your devices for better
management:
1. Access Bitdefender Central.
2. Select the My Devices panel.
3. Click the desired device card, and then the icon in the upper-right
corner of the screen.
4. Select Profile.
5. Click Add owner, then fill in the corresponding fields. Customize the profile
by adding a photo and selecting a date of birth.
6. Click ADD to save the profile.
7. Select the desired owner from the Device owner list, then click ASSIGN.
To remotely update Bitdefender on a Windows device:
1. Access Bitdefender Central.
2. Select the My Devices panel.
3. Click the desired device card, and then the icon in the upper-right
corner of the screen.
4. Select Update.
For more remote actions and information regarding your Bitdefender product
on a specific device, click the desired device card.
Once you click on a device card, the following tabs are available:
● Dashboard. In this window you can view details about the selected device,
check its protection status, the status of Bitdefender VPN and how many
threats have been blocked in the last seven days. The protection status
can be green, when there is no issue affecting your device, yellow when
the device needs your attention or red when the device is at risk. When
there are issues affecting your device, click the drop-down arrow in the
upper status area to find out more details. From here you can manually
fix issues that are affecting the security of your devices.
● Protection. From this window you can remotely run a Quick or a System
Scan on your devices. Click the SCAN button to start the process. You can
also check when the last scan was performed on the device and a report
of the latest scan with the most important information is available. For
Bitdefender Central 35
Bitdefender Antivirus Plus
more information about these two scan processes, refer to Section 14.2.3,
“Running a System Scan” and to “Running a Quick Scan” (p. 77).
● Vulnerability. To check a device for any vulnerabilities such as missing
Windows updates, outdated apps, or weak passwords click the SCAN
button in the Vulnerability tab. Vulnerabilities cannot be fixed remotely.
In case any vulnerability is found, you need to run a new scan on the device
and then take the recommended actions. Click More details to access a
detailed report about the found issues. For more details about this feature,
refer to “Vulnerability” (p. 96).
6.5. Activity
In the Activity area you have access to information on the devices that have
Bitdefender installed.
Once you access the Activity window, the following cards are available:
● My Devices. Here you can view the number of the connected devices along
with their protection status. To fix issues remotely on the detected devices,
click Fix issues, and then click SCAN AND FIX ISSUES.
To view details about the detected issues, click View issues.
Information about detected threats cannot be retrieved from iOS-based
devices.
● Threats blocked. Here you can view a graph showing an overall statistic
including information about the threats blocked in the last 24 hours and
seven days. The displayed information is retrieved depending on the
malicious behavior detected on accessed files, apps and URLs.
● Top users with threats blocked. Here you can view a top with the users
were the most threats have been found.
● Top devices with threats blocked. Here you can view a top with the devices
were the most threats have been found.
6.6. Notifications
To help you stay informed about what is happening on the devices associated
to your account, the icon is at hand. Once you click it you have an overall
image consisting of information about the activity of the Bitdefender products
installed on your devices.
Bitdefender Central 36
Bitdefender Antivirus Plus
Important
To be protected against the latest threats keep Automatic Update turned on.
To start an update, right-click the Bitdefender icon in the system tray, and
then select Update Now.
The Update feature will connect to the Bitdefender update server and it will
check for updates. If an update is detected, you will be asked to confirm it
or the update will be performed automatically, depending on the update
settings.
Important
It may be necessary to restart the device when you have completed the update.
We recommend doing it as soon as possible.
You can also perform updates remotely on your devices, provided that they
are turned on and connected to the internet.
To remotely update Bitdefender on a Windows device:
1. Access Bitdefender Central.
2. Select the My Devices panel.
3. Click the desired device card, and then the icon in the upper-right
corner of the screen.
4. Select Update.
Warning
This is a critical security issue. We recommend you to disable automatic
update for as little time as possible. If Bitdefender is not updated regularly, it
will not be able to protect you against the latest threats.
Update frequency
Bitdefender is configured to check for updates every hour. To change the
update frequency, drag the slider along the scale to set the desired period
of time when the update should occur.
customized settings are saved, and the uninstall and reinstall procedure is
skipped.
These updates require a system restart to initiate the installation of new
files. When a product update is completed, a pop-up window will inform you
to restart the system. If you miss this notification, you can either click
RESTART NOW in the Notifications window where the most recent update
is mentioned, or manually restart the system.
Note
The updates including new features and improvements will be delivered only
to users who have Bitdefender 2020 installed.
Run a quick scan on my [device type]. (As device type you can say laptop
or computer).
HOW TO
44
Bitdefender Antivirus Plus
9. INSTALLATION
9.1. How do I install Bitdefender on a second device?
If the subscription you have purchased covers more than one device, you
can use your Bitdefender account to activate a second PC.
To install Bitdefender on a second device:
1. Click Install on another device on the lower-left corner of the Bitdefender
interface.
A new window appears on your screen.
2. Click SHARE DOWNLOAD LINK.
3. Follow the on-screen instructions to install Bitdefender.
The new device on which you have installed the Bitdefender product will
appear in the Bitdefender Central dashboard.
Installation 45
Bitdefender Antivirus Plus
Note
By following this reinstall procedure, customized settings are saved and
available in the new installed product. Other settings may be switched back
to their default configuration.
Note
Before running the kit, it is recommended to remove any security solution
installed on your system. When you use more than one security solution on
the same device, the system becomes unstable.
Installation 46
Bitdefender Antivirus Plus
Select this option, and then select the owner of the device. If the device
belongs to someone else, click the corresponding button.
● Protect other devices
Select this option, and then select the owner of the device. If the device
belongs to someone else, click the corresponding button.
Click SEND DOWNLOAD LINK. Type an email address in the
corresponding field, and click SEND EMAIL. Note that the generated
download link is valid for the next 24 hours only. If the link expires, you
will have to generate a new one by following the same steps.
On the device you want to install your Bitdefender product, check the
email account that you typed in, and then click the corresponding
download button.
4. Run the Bitdefender product you have downloaded.
Installation 47
Bitdefender Antivirus Plus
Installation 48
Bitdefender Antivirus Plus
Note
By following this reinstall procedure, customized settings are saved and
available in the new installed product. Other settings may be switched back
to their default configuration.
● You changed your system and you want to continue using the Bitdefender
protection. Therefore, you need to reinstall the product using the latest
version.
To solve this situation:
1. Download the installation file:
a. Access Bitdefender Central.
b. Select the My Devices panel, and then click INSTALL PROTECTION.
c. Choose one of the two available options:
● Protect this device
Select this option, and then select the owner of the device. If the
device belongs to someone else, click the corresponding button.
● Protect other devices
Select this option, and then select the owner of the device. If the
device belongs to someone else, click the corresponding button.
Click SEND DOWNLOAD LINK. Type an email address in the
corresponding field, and click SEND EMAIL. Note that the generated
download link is valid for the next 24 hours only. If the link expires,
you will have to generate a new one by following the same steps.
Installation 49
Bitdefender Antivirus Plus
Installation 50
Bitdefender Antivirus Plus
Note
The Bitdefender product from your device automatically changes according
to the subscription associated to the new Bitdefender account.
If there is no available subscription associated to the new Bitdefender account,
or you wish to transfer it from the previous account, you can contact
Bitdefender for support as described in section “Asking for help” (p. 156).
Bitdefender Central 51
Bitdefender Antivirus Plus
Bitdefender Central 52
Bitdefender Antivirus Plus
Bitdefender Central 53
Bitdefender Antivirus Plus
3. Click next to the scan type that you want to schedule, System Scan
or Quick Scan, in the lower part of the interface, then select Edit.
Alternatively, you can create a scan type to suit your needs by clicking
+Create Scan next to Manage Scans.
4. Customize the scan according to your needs, then click Next.
5. Check the box next to Choose when to schedule this task.
Select one of the corresponding options to set a schedule:
● At system startup
● Daily
● Weekly
● Monthly
If you choose Daily, Monthly, or Weekly, drag the slider along the scale to
set the desired period of time when the scheduled scan should start.
If you choose to create a new custom scan, the Scan task window appears.
From here you can select the locations you want to be scanned.
● Scan task priority. You can choose the impact a scan process should
have on your system performance.
● Auto - The priority of the scan process will depend on the system
activity. To make sure that the scan process will not affect the system
activity, Bitdefender will decide whether the scan process should be
run with high or low priority.
● High - The priority of the scan process will be high. By choosing this
option, you will allow other programs to run slower and decrease the
time needed for the scan process to finish.
● Low - The priority of the scan process will be low. By choosing this
option, you will allow other programs to run faster and increase the
time needed for the scan process to finish.
● Post scan actions. Choose what action Bitdefender should take in case
no threats are found:
● Show Summary window
● Shutdown device
● Close Scan window
5. If you want to configure the scanning options in detail, click Show
advanced options.
Click Next.
6. You can enable the Schedule scan task option, if you wish, then choose
when the custom scan you created should start.
● At system startup
● Daily
● Monthly
● Weekly
If you choose Daily, Monthly, or Weekly, drag the slider along the scale to
set the desired period of time when the scheduled scan should start.
7. Click Save to save the settings and close the configuration window.
Depending on the locations to be scanned, the scan may take a while. If
threats will be found during the scanning process, you will be prompted
to choose the actions to be taken on the detected files.
If you want to, you can quickly rerun a previous custom scan by clicking the
corresponding entry in the available list.
Privacy protection 60
Bitdefender Antivirus Plus
Privacy protection 61
Bitdefender Antivirus Plus
Useful Information 62
Bitdefender Antivirus Plus
1. From the Windows Start screen, locate Control Panel (for example, you
can start typing "Control Panel" directly in the Start screen), and then
click its icon.
2. Click Uninstall a program or Programs and Features.
3. Find Bitdefender Antivirus Plus and select Uninstall.
4. Click REMOVE in the window that appears.
5. Wait for the uninstall process to complete, and then reboot your system.
● In Windows 10:
1. Click Start, then click Settings.
2. Click the System icon in the Settings area, then select Apps.
3. Find Bitdefender Antivirus Plus and select Uninstall.
4. Click Uninstall again to confirm your choice.
5. Click REMOVE in the window that appears.
6. Wait for the uninstall process to complete, and then reboot your system.
Note
This reinstall procedure will permanently delete the customized settings.
Useful Information 63
Bitdefender Antivirus Plus
1. Click next to the search bar, and then select Manage add-ons.
A list with the installed extensions appears.
2. Click Bitdefender Anti-tracker.
3. Click Disable at the bottom right.
● Google Chrome
Useful Information 64
Bitdefender Antivirus Plus
3. In the Scans window, click next to Quick Scan or System Scan and
select Edit.
4. Customize the scan according to your needs and click Next.
5. Check the box next to Choose when to schedule this task, and then choose
when the task should start.
If you choose Daily, Monthly, or Weekly, drag the slider along the scale to
set the desired period of time when the scheduled scan should start.
6. Click Save.
To shut down the device when a custom scan is over:
Useful Information 65
Bitdefender Antivirus Plus
4. Click Save.
If no threats are found, the device will shut down.
If there remain unresolved threats, you will be prompted to choose the actions
to be taken on them. For more information, refer to “Antivirus Scan Wizard”
(p. 81).
Important
Home internet connections do not normally use a proxy server. As a rule of
thumb, check and configure the proxy connection settings of your Bitdefender
program when updates are not working. If Bitdefender can update, then it is
properly configured to connect to the internet.
Note
Bitdefender can import proxy settings from the most popular browsers,
including the latest versions of Microsoft Edge, Internet Explorer, Mozilla
Firefox and Google Chrome.
● Custom proxy settings - proxy settings that you can configure yourself.
The following settings must be specified:
Useful Information 66
Bitdefender Antivirus Plus
Useful Information 67
Bitdefender Antivirus Plus
Useful Information 68
Bitdefender Antivirus Plus
If you did not remove the other security solutions during the initial installation:
● In Windows 7:
1. Click Start, go to Control Panel and double-click Programs and Features.
2. Wait a few moments until the installed software list is displayed.
3. Find the name of the program you want to remove and select Uninstall.
4. Wait for the uninstall process to complete, and then reboot your system.
● In Windows 8 and Windows 8.1:
1. From the Windows Start screen, locate Control Panel (for example, you
can start typing "Control Panel" directly in the Start screen), and then
click its icon.
2. Click Uninstall a program or Programs and Features.
3. Wait a few moments until the installed software list is displayed.
4. Find the name of the program you want to remove and select Uninstall.
5. Wait for the uninstall process to complete, and then reboot your system.
● In Windows 10:
1. Click Start, then click Settings.
2. Click the System icon in the Settings area, then select Apps.
3. Find the name of the program you want to remove and select Uninstall.
4. Click Uninstall again to confirm your choice.
5. Wait for the uninstall process to complete, and then reboot your system.
If you fail to remove the other security solution from your system, get the
uninstall tool from the vendor website or contact them directly to provide
you with the uninstall guidelines.
Useful Information 69
Bitdefender Antivirus Plus
are inactive when using Windows in Safe Mode and they can be easily
removed.
To start Windows in Safe Mode:
● In Windows 7:
1. Restart the device.
2. Press the F8 key several times before Windows starts to access the
boot menu.
3. Select Safe Mode in the boot menu or Safe Mode with Networking if
you want to have internet access.
4. Press Enter and wait while Windows loads in Safe Mode.
5. This process ends with a confirmation message. Click OK to
acknowledge.
6. To start Windows normally, simply reboot the system.
● In Windows 8, Windows 8.1 and Windows 10:
1. Launch System Configuration in Windows by simultaneously pressing
the Windows + R keys on your keyboard.
2. Write msconfig in the Open dialog box, then click OK.
3. Select the Boot tab.
4. In the Boot options area, select the Safe boot check box.
5. Click Network, and then OK.
6. Click OK in the System Configuration window which informs you that
the system needs to be restarted to be able to make the changes you
set.
Your system is restarting in Safe Mode with Networking.
To reboot in normal mode, switch back the settings by launching again
the System Operation and clearing the Safe boot check box. Click OK, and
then Restart. Wait for the new settings to be applied.
Useful Information 70
Bitdefender Antivirus Plus
71
Bitdefender Antivirus Plus
Important
To prevent threats from infecting your device, keep on-access scanning
enabled.
Antivirus protection 72
Bitdefender Antivirus Plus
Warning
This is a critical security issue. We recommend you to disable real-time
protection for as little time as possible. If real-time protection is disabled,
you will not be protected against threats.
Antivirus protection 73
Bitdefender Antivirus Plus
● Scan only applications. You can set Bitdefender to scan only accessed
apps.
● Scan potentially unwanted applications. Select this option to scan for
unwanted applications. A potentially unwanted application (PUA) or
potentially unwanted program (PUP) is a software that usually comes
bundled with freeware software and will display pop-ups or install a toolbar
in the default browser. Some of them will change the homepage or the
search engine, others will run several processes in the background slowing
down the PC or will display numerous ads. These programs can be installed
without your consent (also called adware) or will be included by default
in the express installation kit (ad-supported).
● Scan scripts. The Scan scripts feature allows Bitdefender to scan
powershell scripts and office documents that could contain script-based
malware.
● Scan network shares. To safely access a remote network from your device,
we recommend you to keep the Scan network shares option enabled.
● Scan archives. Scanning inside archives is a slow and resource-intensive
process, which is therefore not recommended for real-time protection.
Archives containing infected files are not an immediate threat to the
security of your system. The threat can affect your system only if the
infected file is extracted from the archive and executed without having
real-time protection enabled.
If you decide on using this option, turn it on, and then drag the slider along
the scale to exclude from scanning archives that are bigger than a given
value in MB (Megabytes).
● Scan boot sectors. You can set Bitdefender to scan the boot sectors of
your hard disk. This sector of the hard disk contains the necessary
computer code to start the boot process. When a threat infects the boot
sector, the drive may become inaccessible and you may not be able to
start your system and access your data.
● Scan only new and modified files. By scanning only new and modified
files, you may greatly improve overall system responsiveness with a
minimum trade-off in security.
● Scan keyloggers. Select this option to scan your system for keylogger
apps. Keyloggers record what you type on your keyboard and send reports
over the internet to a malicious person (hacker). The hacker can find out
Antivirus protection 74
Bitdefender Antivirus Plus
sensitive information from the stolen data, such as bank account numbers
and passwords, and use it to gain personal benefits.
● Early boot scan. Select the Early boot scan option to scan your system
at startup as soon as all its critical services are loaded. The mission of
this feature is to improve threat detection at system startup and the boot
time of your system.
Important
For particular types of threats, disinfection is not possible because the
detected file is entirely malicious. In such cases, the infected file is
deleted from the disk.
Antivirus protection 75
Bitdefender Antivirus Plus
Antivirus protection 76
Bitdefender Antivirus Plus
Antivirus protection 77
Bitdefender Antivirus Plus
Note
Because System Scan performs a thorough scan of the entire system, the
scan may take a while. Therefore, it is recommended to run this task when
you are not using your device.
Antivirus protection 78
Bitdefender Antivirus Plus
Antivirus protection 79
Bitdefender Antivirus Plus
● At system startup
● Daily
● Monthly
● Weekly
If you choose Daily, Monthly, or Weekly, drag the slider along the scale to
set the desired period of time when the scheduled scan should start.
8. Click Save to save the settings and close the configuration window.
Depending on the locations to be scanned, the scan may take a while. If
threats will be found during the scanning process, you will be prompted
to choose the actions to be taken on the detected files.
Antivirus protection 80
Bitdefender Antivirus Plus
Note
Scanning archived files increases the overall scanning time and requires
more system resources.
● Scan only new and modified files. By scanning only new and modified
files, you may greatly improve overall system responsiveness with a
minimum trade-off in security.
● Scan boot sectors. You can set Bitdefender to scan the boot sectors of
your hard disk. This sector of the hard disk contains the necessary
computer code to start the boot process. When a threat infects the boot
sector, the drive may become inaccessible and you may not be able to
start your system and access your data.
● Scan memory. Select this option to scan programs running in your
system's memory.
● Scan registry. Select this option to scan registry keys. Windows Registry
is a database that stores configuration settings and options for the
Windows operating system components, as well as for installed apps.
● Scan cookies. Select this option to scan the cookies stored by browsers
on your device.
● Scan keyloggers. Select this option to scan your system for keylogger
apps. Keyloggers record what you type on your keyboard and send reports
over the internet to a malicious person (hacker). The hacker can find out
sensitive information from the stolen data, such as bank account numbers
and passwords, and use it to gain personal benefits.
Note
If the scan wizard does not appear, the scan may be configured to run silently,
in the background. Look for the scan progress icon in the system tray. You
can click this icon to open the scan window and to see the scan progress.
Antivirus protection 81
Bitdefender Antivirus Plus
Note
When you run a quick scan or a system scan, Bitdefender will automatically
take the recommended actions on detected files during the scan. If there
remain unresolved threats, you will be prompted to choose the actions to be
taken on them.
Antivirus protection 82
Bitdefender Antivirus Plus
The infected objects are displayed in groups, based on the threats they are
infected with. Click the link corresponding to a threat to find out more
information about the infected objects.
You can choose an overall action to be taken for all issues or you can select
separate actions for each group of issues. One or several of the following
options can appear on the menu:
Take proper actions
Bitdefender will take the recommended actions depending on the type
of detected file:
● Infected files. Files detected as infected match a piece of threat
information found in the Bitdefender Threat Information Database.
Bitdefender will automatically attempt to remove the malicious code
from the infected file and reconstruct the original file. This operation
is referred to as disinfection.
Files that cannot be disinfected are moved to quarantine to contain
the infection. Quarantined files cannot be executed or opened;
therefore, the risk of getting infected disappears. For more information,
refer to “Managing quarantined files” (p. 89).
Important
For particular types of threats, disinfection is not possible because the
detected file is entirely malicious. In such cases, the infected file is
deleted from the disk.
Antivirus protection 83
Bitdefender Antivirus Plus
Step 3 - Summary
When Bitdefender finishes fixing the issues, the scan results will appear in
a new window. If you want comprehensive information on the scanning
process, click SHOW LOG to view the scan log.
Important
In most cases Bitdefender successfully disinfects the infected files it detects
or it isolates the infection. However, there are issues that cannot be solved
automatically. If required, restart your system to complete the cleaning
process. For more information and instructions on how to remove a threat
manually, refer to “Removing threats from your system” (p. 148).
Antivirus protection 84
Bitdefender Antivirus Plus
2. In the All tab, select the notification regarding the latest scan.
This is where you can find all threat scan events, including threats detected
by on-access scanning, user-initiated scans and status changes for
automatic scans.
3. In the notifications list, you can check what scans have been performed
recently. Click a notification to view details about it.
4. To open the scan log, click View log.
Antivirus protection 85
Bitdefender Antivirus Plus
Note
Take into account that no action can be taken on infected or suspicious files
detected on CDs/DVDs. Similarly, no action can be taken on infected or
suspicious files detected on mapped network drives if you do not have the
appropriate privileges.
Antivirus protection 86
Bitdefender Antivirus Plus
Note
Exceptions will NOT apply for contextual scanning. Contextual scanning is a
type of on-demand scanning: you right-click the file or folder you want to scan
and select Scan with Bitdefender.
Antivirus protection 87
Bitdefender Antivirus Plus
5. Enter the path of the folder you want to except from scanning in the
corresponding field.
Alternatively, you can navigate to the folder by clicking the browse button
in the right side of the interface, select it and click on OK.
6. Turn on the switch next to the protection feature that should not scan the
folder. There are three options:
● Antivirus
● Online Threat Prevention
● Advanced Threat Defense
7. Click Save to save the changes and close the window.
Important
Use caution when excepting extensions from scanning because such
exceptions can make your device vulnerable to threats.
Antivirus protection 88
Bitdefender Antivirus Plus
● To remove an entry from the list, click the button next to it.
● To edit an entry from the table, click the Edit button next to it. A new
window appears where you can change the extension or the path to be
excepted and the security feature you want them to be excepted from,
as needed. Make the necessary changes, then click MODIFY.
Antivirus protection 89
Bitdefender Antivirus Plus
Antivirus protection 90
Bitdefender Antivirus Plus
Note
To keep your system protected from ransomware and other threats, we
recommend you to disable Advanced Threat Defense for as little time as
possible.
Note
The Exploit detection option is enabled by default.
● Facebook
● Twitter
● Encrypted web scan.
More sophisticated attacks might use secure web traffic to mislead their
victims. Therefore, we recommend you to keep enabled the Encrypted web
scan option.
● Fraud protection.
● Phishing protection.
Scroll down and you will reach the Network threat prevention section. Here
you have the Network threat prevention option. To keep your device away
from attacks made by complex malware (such as ransomware) through the
exploitation of vulnerabilities, keep this option enabled.
You can create a list of websites, domains, and IP addresses that will not be
scanned by the Bitdefender anti-threat, antiphishing, and antifraud engines.
The list should contain only websites, domains, and IP addresses that you
fully trust.
To configure and manage websites, domains, and IP addresses using the
Online Threat Prevention feature provided by Bitdefender:
1. Click Protection on the navigation menu on the Bitdefender interface.
2. In the ONLINE THREAT PREVENTION pane, click Settings.
3. Click Manage exceptions.
4. Click +Add an Exception.
5. Type in the corresponding field the name of the website, the name of the
domain, or the IP address you want to add to exceptions.
6. Click the switch next to Online Threat Prevention.
7. To remove an entry from the list, click the button next to it.
Click Save to save the changes and close the window.
The page contains information such as the website URL and the detected
threat.
You have to decide what to do next. The following options are available:
● Navigate away from the website by clicking TAKE ME BACK TO SAFETY.
● Proceed to the website, despite the warning, by clicking I understand the
risks, take me there anyway.
● If you are sure that the detected website is safe, click SUBMIT to add it to
exceptions. We recommend you to add only websites that you fully trust.
17. VULNERABILITY
An important step in protecting your device against malicious actions and
apps is to keep the operating system and the apps you regularly use up to
date. Moreover, to prevent unauthorized physical access to your device,
strong passwords (passwords that cannot be easily guessed) must be
configured for each Windows user account and for the Wi-Fi networks you
connect to as well.
Bitdefender provides two easy ways to fix the vulnerabilities of your system:
● You can scan your system for vulnerabilities and fix them step by step
using the Vulnerability Scan option.
● Using automatic vulnerability monitoring, you can check and fix detected
vulnerabilities in the Notifications window.
You should check and fix system vulnerabilities every one or two weeks.
Vulnerability 96
Bitdefender Antivirus Plus
Vulnerability 97
Bitdefender Antivirus Plus
Vulnerability 98
Bitdefender Antivirus Plus
Important
To be automatically notified about system or app vulnerabilities, keep the
Vulnerability option enabled.
Vulnerability 99
Bitdefender Antivirus Plus
Note
If you turn off monitoring of a specific vulnerability, related issues will no
longer be recorded in the Notifications window.
Vulnerability 100
Bitdefender Antivirus Plus
Vulnerability 101
Bitdefender Antivirus Plus
Vulnerability 102
Bitdefender Antivirus Plus
Wi-Fi is secure - indicates that the network you use is secure. In this
case, you can use sensitive data for making online operations.
By clicking the View details link in the area of each network, the following
details are displayed:
● Secured - here you can view if the selected network is secured or not.
Unencrypted networks can leave the data you use exposed.
● Encryption type - here you can view the encryption type used by the
selected network. Some encryption types may not be secure. Therefore,
we strongly recommend you to check information about the displayed
encryption type to be sure that you are protected while surfing the web.
● Channel/Frequency - here you can view the channel frequency used by
the selected network.
● Password strength - here you can view how strong the password is. Note
that the networks that have set weak passwords represent a target to
cyber criminals.
● Type of sign in - here you can view if the selected network is protected
using a password or not. It is highly recommended to connect only to
networks that have set strong passwords.
● Authentication type - here you can view the authentication type used by
the selected network.
Vulnerability 103
Bitdefender Antivirus Plus
Note
To ensure that your files are protected against ransomware, we recommend
you to keep Ransomware Remediation enabled.
2. In the All tab, select the notification regarding the latest ransomware
behavior remediated, and then click Restored Files.
The list with the restored files is displayed. Here you can also view the
location where your files have been restored.
8. Click Import.
9. Select the programs you want the Wallet to import credentials from, and
then the Finish button.
4. Click the icon on the desired wallet, and then select Export.
5. Browse to the location on your device where you want to save the wallet
database and then choose a name for it.
6. Click Save.
Note
The Wallet needs to be opened in order for the Export option to be available.
If the wallet you need to export is locked, click Activate wallet, and then type
in the password assigned when it was created in the first place.
4. Click the icon on the desired wallet, and then select Settings.
5. Choose the desired option in the window that appears, then click Save.
Note
The Wallet needs to be opened in order for the Export option to be available.
If the wallet you need to synchronize is locked, click ACTIVATE WALLET, and
then type in the password assigned when it was created in the first place.
Important
Be sure to remember your master password or keep a record of it in a safe
place. If you forget the password, you will have to reinstall the program or
contact Bitdefender for support.
● Google Chrome
● Safepay
20. ANTI-TRACKER
Many websites you visit are using trackers to collect information about your
behavior, either to share it with third-party companies or to show ads that
are more relevant for you. Hereby, websites owners are making money to be
able to provide you content for free or continue operating. Besides collecting
information, trackers can slow down your browsing experience or waste your
bandwidth.
With Bitdefender Anti-tracker extension activated in your web browser, you
avoid to be tracked so that your data remains private while you browse online
and you speed up the time websites need to load.
The Bitdefender extension is compatible with the following web browsers:
● Internet Explorer
● Google Chrome
● Mozilla Firefox
The trackers we detect are grouped in the following categories:
● Advertising - used to analyze website traffic, user behavior or visitors’
traffic patterns.
● Customer Interaction - used to measure user interaction with different
input forms such as chat or support.
● Essential - used to monitor critical webpage functionalities.
● Site Analytics - used to gather data regarding webpage usage.
● Social Media - used to monitor social audience, activity and user
engagement with different social media platforms.
Anti-tracker 114
Bitdefender Antivirus Plus
detected trackers belong. To view the list of the websites that are tracking,
click the desired category.
To disable Bitdefender from blocking trackers on the website you are currently
visiting, click Pause protection on this website. This setting applies only as
long you have the website open and will be reverted to the initial state when
you close the website.
To allow trackers from a specific category to monitor your activity, click the
desired activity, and then click the corresponding button. If you change your
mind, click the same button once again.
2. Click the icon next to the address bar in your web browser.
Anti-tracker 115
Bitdefender Antivirus Plus
4. If you are on the website you want to add to exceptions, click Add current
website to the list.
If you would like to add another website, type its address in the
corresponding field, and then click .
Anti-tracker 116
Bitdefender Antivirus Plus
21. VPN
The VPN app may be installed from your Bitdefender product and used every
time you want to add an extra layer of protection to your connection. The
VPN serves as a tunnel between your device and the network you connect
to securing your connection, encrypting the data using bank-grade encryption,
and hiding your IP address wherever you are. Your traffic is redirected through
a separate server; thus making your device almost impossible to be identified
through the myriad of other devices that are using our services. Moreover,
while connected to the internet via Bitdefender VPN, you are able to access
content that is normally restricted in specific areas.
Note
Some countries practice internet censorship and therefore the usage of VPNs
on their territory has been banned by law. To avoid legal consequences, a
warning message can appear when you try to use the Bitdefender VPN app
for the first time. By continuing using the app, you confirm that you are aware
of the applicable country regulations and the risks to which you might be
exposed.
VPN 117
Bitdefender Antivirus Plus
VPN 118
Bitdefender Antivirus Plus
21.3. Subscriptions
Bitdefender VPN offers for free a daily 200 MB traffic quota per device to
secure your connection every time you need, and connects you automatically
to the optimal server location.
To get unlimited traffic and unrestricted access to content worldwide by
choosing a server location at your will, upgrade to the premium version.
You can upgrade to the Bitdefender Premium VPN version anytime by clicking
the Upgrade button available in the product interface.
The Bitdefender Premium VPN subscription is independent from the
Bitdefender Antivirus Plus subscription, meaning you will be able to use it
for its entire availability, regardless of the state of the security solution
subscription. In case the Bitdefender Premium VPN subscription expires,
but the one for Bitdefender Antivirus Plus is still active, you will be reverted
to the free plan.
Bitdefender VPN is a cross-platform product, available in Bitdefender products
compatible with Windows, macOS, Android and iOS. Once you upgrade to
the premium plan, you will be able to use your subscription on all products,
provided that you sign in with the same Bitdefender account.
VPN 119
Bitdefender Antivirus Plus
by clicking .
Note
To switch between Bitdefender Safepay™ and Windows desktop, press the
Alt+Tab keys, or click the Switch to Desktop option on the upper left side of
the window.
To add a site to the list, provide its address in the corresponding field
and click ADD DOMAIN.
To remove a website from the list, select the X corresponding to the
desired entry.
Manage Plugins
You can choose whether you wish to enable or disable specific plugins
in Bitdefender Safepay™.
Manage certificates
You can import certificates from your system to a certificate store.
Click IMPORT and follow the wizard to use the certificates in Bitdefender
Safepay™.
Use Virtual Keyboard
The Virtual Keyboard will automatically appear when a password field
is selected.
Use the corresponding switch to enable or disable the feature.
Printing confirmation
Enable this option if you want to give your confirmation before the
printing process starts.
Note
The Bookmarks page is opened by default when you start Bitdefender
Safepay™.
page to open with Bitdefender Safepay™ each time you access it. The URL
is also added to the Domains list on the settings page.
Note
If the drive has already been immunized, the message The USB device is
protected against autorun-based threat will appear instead of the Immunize
option.
UTILITIES
126
Bitdefender Antivirus Plus
24. PROFILES
Daily job activities, watching movies or playing games may cause system
slow down, especially if they are running simultaneously with Windows
update processes and maintenance tasks. With Bitdefender, you can now
choose and apply your preferred profile, which makes system adjustments
suited to increase the performance of specific installed apps.
Bitdefender provides the following profiles:
● Work Profile
● Movie Profile
● Game Profile
● Public Wi-Fi Profile
● Battery Mode Profile
If you decide to not use Profiles, a default profile called Standard is enabled
and it brings no optimization to your system.
According to your activity, the following product settings are applied when
Work, Movie or Game profiles are activated:
● All Bitdefender alerts and pop-ups are disabled.
● Automatic Update is postponed.
● Scheduled scans are postponed.
● Search Advisor is disabled.
● Special offers notifications are disabled.
According to your activity, the following system settings are applied when
Work, Movie or Game profiles are activated:
● Windows Automatic Updates are postponed.
● Windows alerts and pop-ups are disabled.
● Unnecessary background programs are suspended.
● Visual effects are adjusted for best performance.
● Maintenance tasks are postponed.
● Power plan settings are adjusted.
Profiles 127
Bitdefender Antivirus Plus
While running in the Public Wi-Fi profile, Bitdefender Antivirus Plus is set to
automatically accomplish the following program settings:
● Advanced Threat Defense is turned on
● The following settings from Online Threat Prevention are turned on:
● Encrypted web scan
● Protection against fraud
● Protection against phishing
Profiles 128
Bitdefender Antivirus Plus
Profiles 129
Bitdefender Antivirus Plus
Profiles 130
Bitdefender Antivirus Plus
Profiles 131
Bitdefender Antivirus Plus
Profiles 132
Bitdefender Antivirus Plus
Profiles 133
Bitdefender Antivirus Plus
TROUBLESHOOTING
135
Bitdefender Antivirus Plus
If your machine does not meet the system requirements, the device will
become sluggish, especially when multiple apps are running at the same
time. For more information, refer to “System requirements” (p. 3).
● You have installed apps that you do not use.
Any device has programs or apps that you do not use. And many unwanted
programs run in the background taking up disk space and memory. If you
do not use a program, uninstall it. This is also valid for any other
pre-installed software or trial app you forgot to remove.
Important
If you suspect a program or an app to be an essential part of your operating
system, do not remove it and contact Bitdefender Customer Care for
assistance.
Note
By following this reinstall procedure, customized settings are saved and
available in the new installed product. Other settings may be switched back
to their default configuration.
● In Windows 7:
a. Click Start, go to Control Panel and double-click Programs and
Features.
b. Find Bitdefender Antivirus Plus and select Uninstall.
c. Click REINSTALL in the window that appears.
d. Wait for the reinstall process to complete, and then reboot your
system.
● In Windows 8 and Windows 8.1:
a. From the Windows Start screen, locate Control Panel (for example,
you can start typing "Control Panel" directly in the Start screen),
and then click its icon.
b. Click Uninstall a program or Programs and Features.
c. Find Bitdefender Antivirus Plus and select Uninstall.
d. Click REINSTALL in the window that appears.
e. Wait for the reinstall process to complete, and then reboot your
system.
● In Windows 10:
a. Click Start, then click Settings.
b. Click the System icon in the Settings area, then select Installed
apps.
c. Find Bitdefender Antivirus Plus and select Uninstall.
d. Click Uninstall again to confirm your choice.
e. Click REINSTALL in the window that appears.
f. Wait for the reinstall process to complete, and then reboot your
system.
Note
By following this reinstall procedure, customized settings are saved and
available in the new installed product. Other settings may be switched
back to their default configuration.
If this information was not helpful, you can contact Bitdefender for support
as described in section “Asking for help” (p. 156).
Note
The add-on will be enabled after you restart your web browser.
Now check if the autofill feature in Wallet works for your online accounts.
If this information was not helpful, you can contact Bitdefender for support
as described in section “Asking for help” (p. 156).
c. Find the name of the program you want to remove and select
Remove.
d. Wait for the uninstall process to complete, and then reboot your
system.
● In Windows 10:
a. Click Start, then click Settings.
b. Click the System icon in the Settings area, then select Installed
apps.
c. Find the name of the program you want to remove and select
Uninstall.
d. Wait for the uninstall process to complete, and then reboot your
system.
To correctly uninstall the other software, go to their website and run
their uninstall tool or contact them directly to provide you with the
uninstall guidelines.
3. Reboot your system in normal mode and reinstall Bitdefender.
You have already followed the steps above and the situation is not solved.
To solve this:
1. Reboot your system and enter in Safe Mode. To find out how to do this,
refer to “How do I restart in Safe Mode?” (p. 69).
2. Use the System Restore option from Windows to restore the device to
an earlier date before installing the Bitdefender product.
3. Reboot the system in normal mode and contact our support
representatives for help as described in section “Asking for help” (p. 156).
Warning
If you suspect the file is part of the Windows operating system or that it is
not an infected file, do not follow these steps and contact Bitdefender
Customer Care as soon as possible.
If the selected action could not be taken and the scan log reveals an infection
which could not be deleted, you have to remove the file(s) manually:
The first method can be used in normal mode:
Note
It's important to note that a threat stored in an archive is not an immediate
threat to your system, since the threat has to be decompressed and executed
to infect your system.
If this information was not helpful, you can contact Bitdefender for support
as described in section “Asking for help” (p. 156).
CONTACT US
155
Bitdefender Antivirus Plus
If your Bitdefender product does not operate well, if it cannot remove specific
threats from your device or if you have questions about the way it works,
post your problem or question on the forum.
Bitdefender support technicians monitor the forum for new posts to assist
you. You may also get an answer or a solution from a more experienced
Bitdefender user.
Before posting your problem or question, search the forum for a similar or
related topic.
The Bitdefender Support Forum is available at https://forum.bitdefender.com,
in 5 different languages: English, German, French, Spanish and Romanian.
Click the Home & Home Office Protection link to access the section dedicated
to consumer products.
U.S.A
Bitdefender, LLC
6301 NW 5th Way, Suite 4300
Fort Lauderdale, Florida 33309
Phone (office&sales): 1-954-776-6262
Sales: [email protected]
Technical support: https://www.bitdefender.com/support/consumer.html
Web: https://www.bitdefender.com
UK and Ireland
BITDEFENDER LTD
C/O Howsons Winton House, Stoke Road, Stoke on Trent
Staffordshire, United Kindon, ST4 2RW
Email: [email protected]
Phone: (+44) 2036 080 456
Sales: [email protected]
Technical support: https://www.bitdefender.co.uk/support/
Web: https://www.bitdefender.co.uk
Germany
Bitdefender GmbH
TechnoPark Schwerte
Lohbachstrasse 12
D - 58239 Schwerte
Office: +49 2304 9 45 - 162
Fax: +49 2304 9 45 - 169
Sales: [email protected]
Technical support: https://www.bitdefender.de/support/consumer.html
Web: https://www.bitdefender.de
Denmark
Bitdefender APS
Agern Alle 24, 2970 Hørsholm, Denmark
Office: +45 7020 2282
Technical support: http://bitdefender-antivirus.dk/
Web: http://bitdefender-antivirus.dk/
Spain
Bitdefender España, S.L.U.
C/Bailén, 7, 3-D
08010 Barcelona
Fax: +34 93 217 91 28
Phone: +34 902 19 07 65
Sales: [email protected]
Technical support: https://www.bitdefender.es/support/consumer.html
Website: https://www.bitdefender.es
Romania
BITDEFENDER SRL
Orhideea Towers Building, 15A Orhideelor Street, 11th fllor, district 6
Bucharest
Fax: +40 21 2641799
Sales phone: +40 21 2063470
Sales email: [email protected]
Technical support: https://www.bitdefender.ro/support/consumer.html
Website: https://www.bitdefender.ro
Glossary
Activation code
Is a unique key that can be bought from retail and used to activate a
specific product or service. An activation code enables the activation of
a valid subscription for a certain period of time and number devices and
can also be used to extend a subscription with the condition to be
generated for the same product or service.
ActiveX
ActiveX is a model for writing programs so that other programs and the
operating system can call them. ActiveX technology is used with
Microsoft Internet Explorer to make interactive webpages that look and
behave like computer programs, rather than static pages. With ActiveX,
users can ask or answer questions, use push buttons, and interact in
other ways with the webpage. ActiveX controls are often written using
Visual Basic.
Active X is notable for a complete lack of security controls; computer
security experts discourage its use over the internet.
Adware
Adware is often combined with a host app that is provided at no charge
as long as the user agrees to accept the adware. Because adware apps
are usually installed after the user has agreed to a licensing agreement
that states the purpose of the app, no offense is committed.
However, pop-up advertisements can become an annoyance, and in
some cases degrade system performance. Also, the information that
Glossary 163
Bitdefender Antivirus Plus
some of these apps collect may cause privacy concerns for users who
were not fully aware of the terms in the license agreement.
Archive
A disk, tape, or directory that contains files that have been backed up.
A file that contains one or more files in a compressed format.
Backdoor
A hole in the security of a system deliberately left in place by designers
or maintainers. The motivation for such holes is not always sinister;
some operating systems, for example, come out of the box with privileged
accounts intended for use by field service technicians or the vendor's
maintenance programmers.
Boot sector
A sector at the beginning of each disk that identifies the disk's
architecture (sector size, cluster size, and so on). For startup disks, the
boot sector also contains a program that loads the operating system.
Boot virus
A threat that infects the boot sector of a fixed or floppy disk. An attempt
to boot from a diskette infected with a boot sector virus will cause the
threat to become active in memory. Every time you boot your system
from that point on, you will have the threat active in memory.
Botnet
The term “botnet” is composed of the words “robot” and “network”.
Botnets are internet-connected devices infected with threats and can
be used to send spam emails, steal data, remotely control vulnerable
devices, or spread spyware, ransomware, and other kinds of threats.
Their objective is to infect as many connected devices as possible, such
as PCs, servers, mobile or IoT devices belonging to big companies or
industries.
Browser
Short for web browser, a software app used to locate and display
webpages. Popular browsers include Microsoft Internet Explorer, Mozilla
Firefox and Google Chrome. These are graphical browsers, which means
that they can display graphics as well as text. In addition, most modern
Glossary 164
Bitdefender Antivirus Plus
Command line
In a command line interface, the user types commands in the space
provided directly on the screen using command language.
Cookie
Within the internet industry, cookies are described as small files
containing information about individual computers that can be analyzed
and used by advertisers to track your online interests and tastes. In this
realm, cookie technology is still being developed and the intention is to
target ads directly to what you've said your interests are. It's a
double-edge sword for many people because on one hand, it's efficient
and pertinent as you only see ads about what you're interested in. On
the other hand, it involves actually "tracking" and "following" where you
go and what you click. Understandably so, there is a debate over privacy
and many people feel offended by the notion that they are viewed as a
"SKU number" (you know, the bar code on the back of packages that
gets scanned at the grocery check-out line). While this viewpoint may
be extreme, in some cases it is accurate.
Cyberbullying
When peers or strangers are committing abusive acts against children
on purpose to physically hurt them. To damage emotionally, the
assaulters are sending mean messages or unflattering photos, thus
making their victims isolate from others or feel frustrated.
Dictionary Attack
Password guessing attacks used to break into a computer system by
entering a combination of common words to generate potential
passwords. The same method is used to guess decryption keys of
encrypted messages or documents. Dictionary attacks succeed because
many people incline to choose short and single words passwords that
are easy to be guessed.
Glossary 165
Bitdefender Antivirus Plus
Disk drive
It's a machine that reads data from and writes data onto a disk.
A hard disk drive reads and writes hard disks.
A floppy drive accesses floppy disks.
Disk drives can be either internal (housed within a computer) or external
(housed in a separate box that connects to the computer).
Download
To copy data (usually an entire file) from a main source to a peripheral
device. The term is often used to describe the process of copying a file
from an online service to one's own computer. Downloading can also
refer to copying a file from a network file server to a computer on the
network.
Email
Electronic mail. A service that sends messages on computers via local
or global networks.
Events
An action or occurrence detected by a program. Events can be user
actions, such as clicking a mouse button or pressing a key, or system
occurrences, such as running out of memory.
Exploits
A way to take advantage of different bugs or vulnerabilities that are
present in a computer (software or hardware). Thus, hackers may gain
the control of computers or networks.
False positive
Occurs when a scanner identifies a file as infected when in fact it is not.
Filename extension
The portion of a filename, following the final point, which indicates the
kind of data stored in the file.
Many operating systems use filename extensions, e.g. Unix, VMS, and
MS-DOS. They are usually from one to three letters (some sad old OSes
support no more than three). Examples include "c" for C source code,
"ps" for PostScript, "txt" for arbitrary text.
Glossary 166
Bitdefender Antivirus Plus
Heuristic
A rule-based method of identifying new threats. This method of scanning
does not rely on specific threat information database. The advantage of
the heuristic scan is that it is not fooled by a new variant of an existing
threat. However, it might occasionally report suspicious code in normal
programs, generating the so-called "false positive".
Honeypot
A decoy computer system set to attract hackers to study the way they
act and identify the heretical methods they use to collect system
information. Companies and corporations are more interested in
implementing and using honeypots to improve their overall state of
security.
IP
Internet Protocol - A routable protocol in the TCP/IP protocol suite that
is responsible for IP addressing, routing, and the fragmentation and
reassembly of IP packets.
Java applet
A Java program which is designed to run only on a webpage. To use an
applet on a webpage, you would specify the name of the applet and the
size (length and width, in pixels) that the applet can utilize. When the
webpage is accessed, the browser downloads the applet from a server
and runs it on the user's machine (the client). Applets differ from apps
in that they are governed by a strict security protocol.
For example, even though applets run on the client, they cannot read or
write data onto the client's machine. Additionally, applets are further
restricted so that they can only read and write data from the same domain
that they are served from.
Keylogger
A keylogger is an app that logs anything you type.
Keyloggers are not malicious in nature. They can be used for legitimate
purposes, such as monitoring employees or children activity. However,
they are increasingly being used by cyber-criminals for malicious
purposes (for example, to collect private data, such as login credentials
and social security numbers).
Glossary 167
Bitdefender Antivirus Plus
Macro virus
A type of computer threat that is encoded as a macro embedded in a
document. Many apps, such as Microsoft Word and Excel, support
powerful macro languages.
These apps allow you to embed a macro in a document, and have the
macro execute each time the document is opened.
Mail client
An email client is an app that enables you to send and receive email.
Memory
Internal storage areas in the computer. The term memory identifies data
storage that comes in the form of chips, and the word storage is used
for memory that exists on tapes or disks. Every computer comes with a
certain amount of physical memory, usually referred to as main memory
or RAM.
Non-heuristic
This method of scanning relies on specific threat information database.
The advantage of the non-heuristic scan is that it is not fooled by what
might seem to be a threat, and does not generate false alarms.
Online predators
Individuals who seek to attract minors or adolescents into conversations
on purpose to involve them into illegal sexual activities. Social networks
are the ideal place where vulnerable children can easily be hunted and
seduced into committing sexual activities, online or face-to-face.
Packed programs
A file in a compression format. Many operating systems and apps contain
commands that enable you to pack a file so that it takes up less memory.
For example, suppose you have a text file containing ten consecutive
space characters. Normally, this would require ten bytes of storage.
However, a program that packs files would replace the space characters
by a special space-series character followed by the number of spaces
being replaced. In this case, the ten spaces would require only two bytes.
This is just one packing technique - there are many more.
Glossary 168
Bitdefender Antivirus Plus
Path
The exact directions to a file on a computer. These directions are usually
described by means of the hierarchical filing system from the top down.
The route between any two points, such as the communications channel
between two computers.
Phishing
The act of sending an email to a user falsely claiming to be an established
legitimate enterprise in an attempt to scam the user into surrendering
private information that will be used for identity theft. The email directs
the user to visit a website where they are asked to update personal
information, such as passwords and credit card, social security, and
bank account numbers, that the legitimate organization already has.
The website, however, is bogus and set up only to steal the user’s
information.
Photon
Photon is an innovative non-intrusive Bitdefender technology, designed
to minimize the performance impact of your security solution. By
monitoring your PC’s activity in the background, it creates usage patterns
that help optimize booting and scanning processes.
Polymorphic virus
A threat that changes its form with each file it infects. Since they have
no consistent binary pattern, such threats are hard to identify.
Port
An interface on a computer to which you can connect a device. Personal
computers have various types of ports. Internally, there are several ports
for connecting disk drives, display screens, and keyboards. Externally,
personal computers have ports for connecting modems, printers, mice,
and other peripheral devices.
In TCP/IP and UDP networks, an endpoint to a logical connection. The
port number identifies what type of port it is. For example, port 80 is
used for HTTP traffic.
Ransomware
Ransomware is a malicious program that tries to make money from
users by locking their vulnerable systems. CryptoLocker, CryptoWall,
Glossary 169
Bitdefender Antivirus Plus
and TeslaWall, are only some variants that hunt personal systems of
users.
The infection can be spread by accessing spam emails, downloading
email attachments, or installing apps, without letting the user know
about what is happening on his system. Daily users and companies are
targeted by ransomware hackers.
Report file
A file that lists actions that have occurred. Bitdefender maintains a report
file listing the path scanned, the folders, the number of archives and files
scanned, how many infected and suspicious files were found.
Rootkit
A rootkit is a set of software tools which offer administrator-level access
to a system. The term was first used for the UNIX operating systems
and it referred to recompiled tools which provided intruders
administrative rights, allowing them to conceal their presence so as not
to be seen by the system administrators.
The main role of rootkits is to hide processes, files, logins and logs. They
may also intercept data from terminals, network connections or
peripherals, if they incorporate the appropriate software.
Rootkits are not malicious in nature. For example, systems and even
some apps hide critical files using rootkits. However, they are mostly
used to hide threats or to conceal the presence of an intruder into the
system. When combined with threats, rootkits pose a great threat to the
integrity and the security of a system. They can monitor traffic, create
backdoors into the system, alter files and logs and avoid detection.
Script
Another term for macro or batch file, a script is a list of commands that
can be executed without user interaction.
Spam
Electronic junk mail or junk newsgroup postings. Generally known as
any unsolicited email.
Spyware
Any software that covertly gathers user information through the user's
internet connection without his or her knowledge, usually for advertising
Glossary 170
Bitdefender Antivirus Plus
Startup items
Any files placed in this folder will open when the computer starts. For
example, a startup screen, a sound file to be played when the computer
first starts, a reminder calendar, or apps can be startup items. Normally,
an alias of a file is placed in this folder rather than the file itself.
Subscription
Purchase agreement that gives the user the right to use a particular
product or service on a specific number of devices and for a certain
period of time. An expired subscription can be automatically renewed
using the information provided by the user at the first purchase.
System tray
Introduced with Windows 95, the system tray is located in the Windows
taskbar (usually at the bottom next to the clock) and contains miniature
icons for easy access to system functions such as fax, printer, modem,
volume, and more. Double click or right-click an icon to view and access
the details and controls.
Glossary 171
Bitdefender Antivirus Plus
TCP/IP
Transmission Control Protocol/Internet Protocol - A set of networking
protocols widely used on the internet that provides communications
across interconnected networks of computers with diverse hardware
architectures and various operating systems. TCP/IP includes standards
for how computers communicate and conventions for connecting
networks and routing traffic.
Threat
A program or piece of code that is loaded onto your computer without
your knowledge and runs against your will. Most threats can also
replicate themselves. All computer threats are manmade. A simple threat
that can copy itself over and over again is relatively easy to produce.
Even such a simple threat is dangerous because it will quickly use all
available memory and bring the system to a halt. An even more
dangerous type of threat is one capable of transmitting itself across
networks and bypassing security systems.
Trojan
A destructive program that masquerades as a benign app. Unlike
malicious software programs and worms, Trojans do not replicate
themselves but they can be just as destructive. One of the most insidious
types of Trojan horse threats is a program that claims to rid your
computer of threats but instead introduces threats onto your computer.
The term comes from a story in Homer's Iliad, in which the Greeks give
a giant wooden horse to their foes, the Trojans, ostensibly as a peace
offering. But after the Trojans drag the horse inside their city walls, Greek
soldiers sneak out of the horse's hollow belly and open the city gates,
allowing their compatriots to pour in and capture Troy.
Update
A new version of a software or hardware product designed to replace an
older version of the same product. In addition, the installation routines
for updates often check to make sure that an older version is already
installed on your computer; if not, you cannot install the update.
Glossary 172
Bitdefender Antivirus Plus
Bitdefender has its own update feature that allows you to manually check
for updates, or let it automatically update the product.
Worm
A program that propagates itself over a network, reproducing itself as
it goes. It cannot attach itself to other programs.
Glossary 173