Bitdefdener Ultimate en
Bitdefdener Ultimate en
USER'S GUIDE
Internal Use Only
User's Guide
Legal Notice
All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means, electronic
or mechanical, including photocopying, recording, or by any information storage and retrieval system, without
written permission from an authorized representative of Bitdefender. The inclusion of brief quotations in reviews
may be possible only with the mention of the quoted source. The content can not be modified in any way.
Warning and Disclaimer. This product and its documentation are protected by copyright. The information in this
document is provided on an “as is” basis, without warranty. Although every precaution has been taken in the
preparation of this document, the authors will not have any liability to any person or entity with respect to any loss
or damage caused or alleged to be caused directly or indirectly by the information contained in this work.
This book contains links to third-party Websites that are not under the control of Bitdefender, therefore Bitdefender
is not responsible for the content of any linked site. If you access a third-party website listed in this document, you
will do so at your own risk. Bitdefender provides these links only as a convenience, and the inclusion of the link does
not imply that Bitdefender endorses or accepts any responsibility for the content of the third-party site.
Trademarks. Trademark names may appear in this book. All registered and unregistered trademarks in this
document are the sole property of their respective owners, and are respectfully acknowledged.
Internal Use Only
Bitdefender Ultimate Security
Table of Contents
About This Guide ................................................................................... 1
Purpose and Intended Audience ........................................................ 1
How to Use This Guide ..................................................................... 1
Conventions used in This Guide ......................................................... 2
Typographical Conventions ....................................................... 2
Admonitions ........................................................................... 2
Request for Comments ..................................................................... 3
1. Total Security for Windows PC ............................................................ 4
1.1. Installation ............................................................................... 4
1.1.1. Preparing for installation ................................................. 4
1.1.2. System requirements ...................................................... 4
1.1.3. Software requirements .................................................... 5
1.1.4. Installing your Bitdefender product ................................... 5
1.2. Managing your Security ............................................................ 13
1.2.1. Antivirus protection ...................................................... 13
1.2.2. Advanced Threat Defense .............................................. 31
1.2.3. Online Threat Prevention ............................................... 33
1.2.4. Email Protection ........................................................... 36
1.2.5. Antispam .................................................................... 37
1.2.6. Firewall ....................................................................... 46
1.2.7. Vulnerability ................................................................ 51
1.2.8. Video & Audio Protection ............................................... 58
1.2.9. Ransomware Remediation ............................................. 62
1.2.10. Cryptomining Protection .............................................. 64
1.2.11. Scam Copilot for Windows ........................................... 66
1.2.12. Anti-tracker ............................................................... 66
1.2.13. Safepay security for online transactions ......................... 69
1.2.14. Parental Control ......................................................... 72
1.2.15. Device Anti-Theft ........................................................ 80
1.3. Utilities .................................................................................. 82
1.3.1. Profiles ....................................................................... 82
1.3.2. OneClick Optimizer ....................................................... 89
1.3.3. Data Protection ............................................................ 90
1.4. How to ................................................................................... 91
1.4.1. Installation .................................................................. 91
1.4.2. Bitdefender Central ...................................................... 96
1.4.3. Scanning with Bitdefender ............................................. 99
1.4.4. Parental Control ......................................................... 104
1.4.5. Privacy protection ....................................................... 109
Internal Use Only
Bitdefender Ultimate Security
Learn how to hide your online identity using Bitdefender VPN on any of
your devices.
❍ Password Manager (page 257)
Keep track and safely store of all of your passwords and credentials
with Password Manager.
❍ Digital Identity Protection (page 278)
Learn how you can protect and monitor your digital identity.
❍ Getting Help (page 286)
Find out where to look for help if something unexpected pops up.
Appearance Description
sample syntax Syntax samples are printed with monospaced characters.
https://www.bitdefender.com The URL link is pointing to some external location, on http or ftp servers.
[email protected] Email addresses are inserted in the text for contact information.
About this Guide (page 1) This is an internal link, towards some location inside the document.
filename File and directories are printed using monospaced font.
option All the product options are printed using bold characters.
keyword Important keywords or phrases are highlighted using bold characters.
Admonitions
The admonitions are in-text notes, graphically marked, bringing to your
attention additional information related to the current paragraph.
Note
The note is just a short observation. Although you can omit it, the notes
can provide valuable information, such as specific feature or a link to
some related topic.
Important
This requires your attention and is not recommended to skip over it.
Usually, it provides non-critical but significant information.
Warning
This is critical information you should treat with increased caution.
Nothing bad will happen if you follow the indications. You should read
and understand it, because it describes something extremely risky.
1.1. Installation
1.1.1. Preparing for installation
Before you install Bitdefender Ultimate Security, complete these
preparations to ensure the installation will go smoothly:
❍ Make sure that the device where you plan to install Bitdefender meets
the system requirements. If the device does not meet all the system
requirements, Bitdefender will not be installed or, if installed, it will not
work properly and it will cause system slowdowns and instability. For
a complete list of system requirements, refer to System requirements
(page 4).
❍ Log on to the device using an Administrator account.
❍ Remove any other similar software from the device. If any is detected
during the Bitdefender installation process, you will be notified to
uninstall it. Running two security programs simultaneously may affect
their operation and cause major problems with the system. Windows
Defender will be disabled during the installation.
❍ Disable or remove any firewall program that may be running on the
device. Running two firewall programs simultaneously may affect
their operation and cause major problems with the system. Windows
Firewall will be disabled during the installation.
❍ It is recommended that your device be connected to the internet
during the installation, even when from a CD/DVD. If newer versions
of the app files included in the installation package are available,
Bitdefender can download and install them.
❍ Windows 10
❍ 2,5 GB available free hard disk space (at least 800 MB on the system
drive)
❍ 2 GB of memory (RAM)
Important
System performance may be affected on devices that have old
generation CPUs.
Note
To find out the Windows operating system your device is running and
hardware information:
❍ In Windows 7, right-click My Computer on the desktop, and then
select Properties from the menu.
❍ In Windows 8.1, locate This PC and then right-click its icon.
Select Properties in the bottom menu. Look in the System area to
find information about your system type.
❍ In Windows 10 / Windows 11, type System in the search box
from the taskbar and click its icon. Look in the System area to find
information about your system type.
The account you need to use is the one which contains your Bitdefender
active subscription.
4. Wait for the download to complete, and then run the installer.
If your system does not meet the system requirements for installing
Bitdefender, you will be informed of the areas that need improvement
before you can proceed.
If an incompatible security solution or an older version of Bitdefender is
detected, you will be prompted to remove it from your system. Please
follow the directions to remove the software from your system, thus
avoiding problems occurring later on. You may need to reboot your device
to complete the removal of detected security solutions.
The Bitdefender Total Security installation package is constantly updated.
Note
Downloading the installation files can take a long time, especially over
slower internet connections.
Once the installation is validated, the setup wizard appears. Follow the
steps to install Bitdefender Ultimate Security.
Note
Alternatively, if you do not wish to perform the scan, you can simply
click on Skip.
Note
Downloading the installation files can take a long time, especially over
slower internet connections.
Once the installation is validated, the setup wizard appears. Follow the
steps to install Bitdefender Ultimate Security.
such as your name or IP address, and that they will not be used for
commercial purposes.
❍ Select the language you want to install the product in.
Click INSTALL to launch the installation process of your Bitdefender
product.
Note
Alternatively, if you do not wish to perform the scan, you can simply
click on Skip.
Note
Once the account is created, you can use the provided email
address and password to sign in to your account at https://
central.bitdefender.com, or in the Bitdefender Central app
provided that it is installed on one of your Android or iOS
devices. To install the Bitdefender Central app on Android, you
have to access Google Play, search Bitdefender Central, and
then tap the corresponding installation option. To install the
Bitdefender Central app on iOS, you have to access App Store,
search Bitdefender Central, and then tap the corresponding
installation option.
Note
If you already have a MyBitdefender account, you can use it to
sign into your Bitdefender account. If you forgot your password,
you first need to go to https://my.bitdefender.com to reset it.
Then, use the updated credentials to sign into your Bitdefender
account.
Note
Bitdefender does not get access to any confidential information
such as the password of the account you use to sign in, or the
personal information of your friends and contacts.
Note
You can find your activation code:
❍ on the CD/DVD label.
❍ on the product registration card.
❍ in the online purchase email.
Important
To prevent threats from infecting your device, keep on-access
scanning enabled.
Warning
This is a critical security issue. We recommend you to disable real-
time protection for as little time as possible. If real-time protection is
disabled, you will not be protected against threats.
3. In the Advanced window, scroll down on the window until you see the
Threat actions option.
4. Configure the scan settings as needed.
The following actions can be taken by the real-time protection in
Bitdefender:
Take proper action
Bitdefender will take the recommended actions depending on the type of
detected file:
❍ Infected files. Files detected as infected match a piece of threat
information found in the Bitdefender Threat Information Database.
Bitdefender will automatically attempt to remove the malicious code
from the infected file and reconstruct the original file. This operation is
referred to as disinfection.
Files that cannot be disinfected are moved to quarantine to contain the
infection. Quarantined files cannot be executed or opened; therefore,
the risk of getting infected disappears. For more information, refer to
Managing quarantined files (page 30).
Important
For particular types of threats, disinfection is not possible because
the detected file is entirely malicious. In such cases, the infected
file is deleted from the disk.
Move to quarantine
On-demand scanning
The main objective for Bitdefender is to keep your device clean of threats.
This is done by keeping new threats out of your device and by scanning
your email messages and any new files downloaded or copied to your
system.
There is a risk that a threat is already lodged in your system, before
you even install Bitdefender. This is why it's a very good idea to scan
your device for resident threats after you've installed Bitdefender. And it's
definitely a good idea to frequently scan your device for threats.
On-demand scanning is based on scan tasks. Scan tasks specify the
scanning options and the objects to be scanned. You can scan the device
whenever you want by running the default tasks or your own scan tasks
(user-defined tasks). If you want to scan specific locations on your device
or to configure the scan options, configure and run a custom scan.
will appear and guide you through the scanning process. At the end of
the scan, you will be prompted to choose the actions to be taken on the
detected files, if any.
Note
Because System Scan performs a thorough scan of the entire system,
the scan may take a while. Therefore, it is recommended to run this
task when you are not using your device.
Before running a System Scan, the following are recommended:
❍ Make sure Bitdefender is up-to-date with its threat information
database. Scanning your device using an outdated threat information
database may prevent Bitdefender from detecting new threats found
since the last update. For more information, refer to Keeping
Bitdefender up-to-date.
❍ Shut down all open programs.
If you want to scan specific locations on your device or to configure the
scanning options, configure and run a custom scan. For more information,
refer to Configuring a custom scan (page 20).
❍ If you are not familiar with some of the terms, check them in
the glossary. You can also find useful information by searching the
internet.
❍ Scan potentially unwanted applications. Select this option to scan
for unwanted applications. A potentially unwanted application (PUA)
or potentially unwanted program (PUP) is a software that usually
comes bundled with freeware software and will display pop-ups or
install a toolbar in the default browser. Some of them will change the
homepage or the search engine, others will run several processes in
the background slowing down the PC or will display numerous ads.
These programs can be installed without your consent (also called
adware) or will be included by default in the express installation kit
(ad-supported).
❍ Scan archives. Archives containing infected files are not an immediate
threat to the security of your system. The threat can affect your
system only if the infected file is extracted from the archive and
executed without having real-time protection enabled. However, it is
recommended to use this option to detect and remove any potential
threat, even if it is not an immediate threat.
Drag the slider along the scale to exclude from scanning archives that
are bigger than a given value in MB (Megabytes).
Note
Scanning archived files increases the overall scanning time and
requires more system resources.
❍ Scan only new and modified files. By scanning only new and modified
files, you may greatly improve overall system responsiveness with a
minimum trade-off in security.
❍ Scan boot sectors. You can set Bitdefender to scan the boot sectors
of your hard disk. This sector of the hard disk contains the necessary
computer code to start the boot process. When a threat infects the
boot sector, the drive may become inaccessible and you may not be
able to start your system and access your data.
❍ Scan memory. Select this option to scan programs running in your
system's memory.
❍ Scan registry. Select this option to scan registry keys. Windows
Registry is a database that stores configuration settings and options
Note
If the scan wizard does not appear, the scan may be configured to run
silently, in the background. Look for the scan progress icon in the
system tray. You can click this icon to open the scan window and to see
the scan progress.
Note
When you run a quick scan or a system scan, Bitdefender will
automatically take the recommended actions on detected files during
the scan. If there remain unresolved threats, you will be prompted to
choose the actions to be taken on them.
The infected objects are displayed in groups, based on the threats they
are infected with. Click the link corresponding to a threat to find out more
information about the infected objects.
You can choose an overall action to be taken for all issues or you can
select separate actions for each group of issues. One or several of the
following options can appear on the menu:
Take proper actions
Bitdefender will take the recommended actions depending on the type of
detected file:
❍ Infected files. Files detected as infected match a piece of threat
information found in the Bitdefender Threat Information Database.
Bitdefender will automatically attempt to remove the malicious code
from the infected file and reconstruct the original file. This operation is
referred to as disinfection.
Files that cannot be disinfected are moved to quarantine to contain the
infection. Quarantined files cannot be executed or opened; therefore,
Important
For particular types of threats, disinfection is not possible because
the detected file is entirely malicious. In such cases, the infected
file is deleted from the disk.
Delete
Removes detected files from the disk.
If infected files are stored in an archive together with clean files,
Bitdefender will attempt to delete the infected files and reconstruct the
archive with the clean files. If archive reconstruction is not possible, you
will be informed that no action can be taken so as to avoid losing clean
files.
Take no action
No action will be taken on the detected files. After the scan is completed,
you can open the scan log to view information on these files.
Click Continue to apply the specified actions.
Step 3 - Summary
When Bitdefender finishes fixing the issues, the scan results will appear
in a new window. If you want comprehensive information on the scanning
process, click SHOW LOG to view the scan log.
Important
In most cases Bitdefender successfully disinfects the infected files
it detects or it isolates the infection. However, there are issues that
cannot be solved automatically. If required, restart your system to
complete the cleaning process. For more information and instructions
on how to remove a threat manually, refer to Removing threats from
your system (page 141).
Note
Take into account that no action can be taken on infected or suspicious
files detected on CDs/DVDs. Similarly, no action can be taken on
infected or suspicious files detected on mapped network drives if you
do not have the appropriate privileges.
This information may be useful to you:
❍ Be careful when using a threat-infected CD/DVD, because the threat
cannot be removed from the disc (the media is read-only). Make sure
real-time protection is turned on to prevent threats from spreading to
your system. It is best practice to copy any valuable data from the disc
to your system, and then dispose of the disc.
❍ In some cases, Bitdefender may not be able to remove threats from
specific files due to legal or technical constraints. Such an example
are files archived using a proprietary technology (this is because the
archive cannot be recreated correctly).
To find out how to deal with threats, refer to Removing threats from
your system (page 141).
Note
Exceptions will NOT apply for contextual scanning. Contextual scanning
is a type of on-demand scanning: you right-click the file or folder you
want to scan and select Scan with Bitdefender.
Important
Use caution when excepting extensions from scanning because such
exceptions can make your device vulnerable to threats.
To except file extensions from scanning:
1. Click Protection on the navigation menu on the Bitdefender interface.
Note
To keep your system protected from ransomware and other threats, we
recommend you to disable Advanced Threat Defense for as little time
as possible.
5. Enter the path of the folder you want to except from scanning in the
corresponding field.
Alternatively, you can navigate to the executable by clicking the
browse button in the right side of the interface, select it and click on
OK.
6. Turn on the switch next to Advanced Threat Defense.
7. Click Save.
Exploits detection
A way used by hackers to breach systems, is to take advantage of
particular bugs or vulnerabilities present in computer software (apps or
plugins) and hardware. To make sure that your device stays away from
such attacks, that normally spread very fast, Bitdefender uses the newest
anti-exploit technologies.
Note
The Exploit detection option is enabled by default.
❍ Safari
❍ Bitdefender Safepay™
❍ Opera
To configure Online Threat Prevention settings:
1. Click Protection on the navigation menu on the Bitdefender interface.
2. In the ONLINE THREAT PREVENTION pane, click Settings.
In the Web Protection sections, click the switches to turn on or off:
❍ Web attack prevention blocks threats coming from the internet,
including drive-by downloads.
❍ Search Advisor, a component that rates the results of your search
engine queries and the links posted on social networking websites by
placing an icon next to every result:
You should not visit this webpage.
This webpage may contain dangerous content. Exercise caution if
you decide to visit it.
This is a safe page to visit.
Search Advisor rates the search results from the following web search
engines:
❍ Google
❍ Yahoo!
❍ Bing
❍ Baidu
Search Advisor rates the links posted on the following online social
networking services:
❍ Facebook
❍ Twitter
❍ Phishing protection.
Scroll down and you will reach the Network threat prevention section.
Here you have the Network threat prevention option. To keep your device
away from attacks made by complex malware (such as ransomware)
through the exploitation of vulnerabilities, keep this option enabled.
You can create a list of websites, domains, and IP addresses that will
not be scanned by the Bitdefender anti-threat, antiphishing, and antifraud
engines. The list should contain only websites, domains, and IP addresses
that you fully trust.
To configure and manage websites, domains, and IP addresses using the
Online Threat Prevention feature provided by Bitdefender:
1. Click Protection on the navigation menu on the Bitdefender interface.
2. In the ONLINE THREAT PREVENTION pane, click Settings.
3. Click Manage exceptions.
4. Click +Add an Exception.
5. Type in the corresponding field the name of the website, the name of
the domain, or the IP address you want to add to exceptions.
6. Click the switch next to Online Threat Prevention.
7. To remove an entry from the list, click the button next to it.
Click Save to save the changes and close the window.
❍ If you are sure that the detected website is safe, click SUBMIT to add
it to exceptions. We recommend you to add only websites that you fully
trust.
Note
You can protect up to 5 different email accounts.
Note
Email Protection is currently available for Google accounts, Outlook
accounts and soon-to-be available for Yahoo Mail as well.
Note
Each scanned email will be marked with a label to indicate its safetly
levels.
Dashboard
The dashboard will display your protected emails under which you will
find:
❍ configuration date (the date at which the account was set up for Email
Protection)
❍ status (active or inactive)
❍ number of filtered emails in the last 30 days.
Here you will see a chart showcasing the number of safe emails and
dangerous emails received.
To add multiple email accounts click on the Add another account and go
through the configuration process above for each of them.
To pause scanning or remove an account from this feature click on the
three dots next to the account in question and click of Manage account.
1.2.5. Antispam
Spam is a term used to describe unsolicited email. Spam is a growing
problem, both for individuals and for organizations. It's not pretty, you
wouldn't want your kids to see it, it can get you fired (for wasting too much
time or from receiving porn in your office mail) and you can't stop people
from sending it. The next best thing to that is, obviously, to stop receiving
it. Unfortunately, Spam comes in a wide range of shapes and sizes, and
there's a lot of it.
Bitdefender Antispam employs remarkable technological innovations and
industry standard antispam filters to weed out spam before it reaches the
user's Inbox. For more information, refer to Antispam insights (page 38).
The Bitdefender Antispam protection is available only for email clients
configured to receive email messages via the POP3 protocol. POP3 is one
of the most widely used protocols for downloading email messages from a
mail server.
Note
Bitdefender does not provide antispam protection for email accounts
that you access through a web-based email service.
The spam messages detected by Bitdefender are marked with the
[spam] prefix in the subject line. Bitdefender automatically moves spam
messages to a specific folder, as follows:
❍ In Microsoft Outlook, spam messages are moved to a Spam folder,
located in the Deleted Items folder. The Spam folder is created when
an email is labeled as spam.
❍ In Mozilla Thunderbird, spam messages are moved to a Spam folder,
located in the Trash folder. The Spam folder is created when an email
is labeled as spam.
If you use other mail clients, you must create a rule to move the email
messages marked as [spam] by Bitdefender to a custom quarantine folder.
If the Deleted items or Trash folders are deleted, the Spam folder will be
deleted too. However, a new Spam folder will be created as soon as an
email is labeled as spam.
Antispam insights
The antispam feature has the following features and settings:
Antispam filters
The Bitdefender Antispam Engine incorporates cloud protection and other
several different filters that ensure your Inbox to be SPAM-free, like
Friends list, Spammers list and Charset filter.
Note
We recommend that you add your friends' names and email addresses
to the Friends list. Bitdefender does not block messages from those
on the list; therefore, adding friends helps ensure that legitimate
messages get through.
Charset filter
Many spam messages are written in Cyrillic and / or Asian charsets. The
Charset Filter detects this kind of messages and tags them as SPAM.
Antispam operation
The Bitdefender Antispam Engine uses all antispam filters combined to
determine whether a certain email message should get into your Inbox or
not.
Every email that comes from the internet is first checked with the Friends
list/Spammers list filter. If the sender's address is found in the Friends list
the email is moved directly to your Inbox.
Otherwise, the Spammers list filter will take over the email to verify if the
sender's address is on its list. If a match is made, the email will be tagged
as SPAM and moved in the Spam folder.
Else, the Charset filter will check if the email is written in Cyrillic or Asian
characters. If so the email will be tagged as SPAM and moved in the Spam
folder.
Note
If the email is tagged as SEXUALLY EXPLICIT in the subject line,
Bitdefender will consider it SPAM.
Important
Bitdefender integrates into the most commonly used mail clients
through an easy-to-use antispam toolbar. For a complete list of
supported mail clients, refer to Supported email clients and protocols
(page 39).
Each button from the Bitdefender toolbar will be explained below:
Settings - opens a window where you can configure the antispam
filters and the toolbar settings.
Is Spam - indicates that the selected email is spam. The email will be
moved immediately to the Spam folder. If the antispam cloud services are
activated, the message is sent to Bitdefender Cloud for further analysis.
Not Spam - indicates that the selected email is not spam and
Bitdefender should not have tagged it. The email will be moved from the
Spam folder to the Inbox directory. If the antispam cloud services are
activated, the message is sent to Bitdefender Cloud for further analysis.
Important
The Not Spam button becomes active when you select a message
marked as SPAM by Bitdefender (normally these messages are located
in the Spam folder).
Spammers - opens the Spammers list that contains all the email
addresses from which you don't want to receive messages, regardless of
their content. For more information, refer to Configuring the Spammers
List (page 43).
Friends - opens the Friends list that contains all the email addresses
from which you always want to receive email messages, regardless of
their content. For more information, refer to Configuring the Friends List
(page 42).
Note
Any mail coming from an address contained in the Friends list, will
automatically be delivered to your Inbox without further processing.
To configure and manage the Friends list:
❍ If you are using Microsoft Outlook or Thunderbird, click the Friends
button on the Bitdefender antispam toolbar.
❍ Alternatively:
1. Click Protection on the navigation menu on the Bitdefender
interface.
2. In the ANTISPAM pane, click Settings.
3. Access the Manage Friends window.
To add an email address, select the Email address option, enter the
address, and then click ADD. Syntax: [email protected].
To add all the email addresses from a specific domain, select the Domain
name option, enter the domain name, and then click ADD. Syntax:
❍ @domain.com and domain.com - all the received email messages from
domain.com will reach your Inbox regardless of their content;
❍ domain - all the received email messages from domain (no matter the
domain suffixes) will be tagged as SPAM;
❍ com - all the received email messages having the domain suffix com
will be tagged as SPAM;
It is recommended to avoid adding entire domains, but this may be useful
in some situations. For example, you can add the email domain of the
company you work for, or those of your trusted partners.
To delete an item from the list, click the corresponding button next to it.
To delete all entries from the list, click Clear List.
You can save the Friends list to a file so that you can use it on another
device or after reinstalling the product. To save the Friends list, click the
Save button and save it to the desired location. The file will have a .bwl
extension.
To load a previously saved Friends list, click Load and open the
corresponding .bwl file. To reset the content of the existing list when
loading a previously saved list, check the box next to Overwrite current
list.
To add an email address, select the Email address option, enter the
address, and then click ADD. Syntax: [email protected].
To add all the email addresses from a specific domain, select the Domain
name option, enter the domain name, and then click ADD. Syntax:
❍ @domain.comand domain.com - all the received email messages from
domain.com will reach your Inbox regardless of their content;
❍ domain - all the received email messages from domain (no matter the
domain suffixes) will be tagged as SPAM;
❍ com - all the received email messages having the domain suffix com
will be tagged as SPAM.
It is recommended to avoid adding entire domains, but this may be useful
in some situations.
Warning
Do not add domains of legitimate web-based email services (such as
Yahoo, Gmail, Hotmail or other) to the Spammers list. Otherwise, the
email messages received from any registered user of such a service
will be detected as spam. If, for example, you add yahoo.com to the
Spammers list, all email messages coming from yahoo.com addresses
will be marked as [spam].
To delete an item from the list, click the corresponding button next to it.
To delete all entries from the list, click Clear List.
You can save the Spammers list to a file so that you can use it on another
device or after reinstalling the product. To save the Spammers list, click
the Save button and save it to the desired location. The file will have
a .bwl extension.
To load a previously saved Spammers list, click LOAD and open the
corresponding .bwl file. To reset the content of the existing list when
loading a previously saved list, select Overwrite current list.
Important
Depending on whether or not you receive legitimate emails written
in Asian or Cyrillic characters, disable or enable the setting that
automatically blocks such emails. The corresponding setting is disabled
in the localized versions of the program that use such charsets (for
example, in the Russian or Chinese version).
To configure the local antispam filters:
1. Click Protection on the navigation menu on the Bitdefender interface.
2. In the ANTISPAM pane, click Settings.
3. Go to the Settings window and click the corresponding turn on or off
switches.
If you are using Microsoft Outlook or Thunderbird, you can configure the
local antispam filters directly from your mail client. Click the Settings
button on the Bitdefender antispam toolbar (normally located in the upper
part of the mail client window), and then the Antispam Filters tab.
1.2.6. Firewall
The Firewall protects your device from inbound and outbound
unauthorized connection attempts, both on local networks and on the
internet. It is quite similar to a guard at your gate - it keeps track of
connection attempts and decides which to allow and which to block.
The Bitdefender firewall uses a set of rules to filter data transmitted to
and from your system.
Under normal conditions, Bitdefender automatically creates a rule
whenever an app tries to access the internet. You can also manually add
or edit rules for apps.
As a safety measure you will be notified each time a potentially malicious
app is blocked from accessing the internet.
Bitdefender automatically assigns a network type to every network
connection it detects. Depending on the network type, the firewall
protection is set to the appropriate level for each connection.
To find out more about the firewall settings for each network type and how
you can edit the network settings, refer to Managing connection settings
(page 49).
Warning
Because it exposes your device to unauthorized connections, turning
off the firewall should only be a temporary measure. Turn the firewall
back on as soon as possible.
❍ Apply this rule to all applications. Enable this switch to apply the
created rule to all apps.
❍ Program Path. Click BROWSE and select the app the rule applies to.
❍ Permission. Select one of the available permissions:
Permission Description
Allow The specified app will be allowed network / internet access under the specified
circumstances.
Deny The specified app will be denied network / internet access under the specified
circumstances.
❍ Network Type. Select the type of network the rule applies to. You can
change the type by opening the Network Type drop-down menu and
selecting one of the available types from the list.
❍ Protocol. Select from the menu the IP protocol the rule applies to.
❍ If you want the rule to apply to all protocols, select Any.
❍ If you want the rule to apply to TCP, select TCP.
❍ If you want the rule to apply to UDP, select UDP.
❍ If you want the rule to apply to ICMP, select ICMP.
❍ If you want the rule to apply to IGMP, select IGMP.
❍ If you want the rule to apply to GRE, select GRE.
❍ If you want the rule to apply to a specific protocol, type the number
assigned to the protocol you want to filter in the blank edit field.
Note
IP protocol numbers are assigned by the Internet Assigned
Numbers Authority (IANA). You can find the complete list of
assigned IP protocol numbers at http://www.iana.org/assignments/
protocol-numbers.
❍ Direction. Select from the menu the traffic direction the rule applies
to.
Direction Description
Outbound The rule applies only for the outgoing traffic.
Inbound The rule applies only for the incoming traffic.
Both The rule applies in both directions.
Click the Advanced Settings button in the lower part of the window to
customize the following settings:
❍ Custom Local Address. Specify the local IP address and port the rule
applies to.
❍ Custom Remote Address. Specify the remote IP address and port the
rule applies to.
To remove the current set of rules and restore the default ones, click
Reset rules in the Rules window.
❍ Allow - apps that don't have any Firewall rule defined will be
automatically allowed.
❍ Block - apps that don't have any Firewall rule defined will be
automatically blocked.
1.2.7. Vulnerability
An important step in protecting your device against malicious actions and
apps is to keep the operating system and the apps you regularly use up
to date. Moreover, to prevent unauthorized physical access to your device,
strong passwords (passwords that cannot be easily guessed) must be
configured for each Windows user account and for the Wi-Fi networks you
connect to as well.
Bitdefender provides two easy ways to fix the vulnerabilities of your
system:
❍ You can scan your system for vulnerabilities and fix them step by step
using the Vulnerability Scan option.
❍ Using automatic vulnerability monitoring, you can check and fix
detected vulnerabilities in the Notifications window.
You should check and fix system vulnerabilities every one or two weeks.
❍ APPLICATIONS
❍ Browser Security
Change upon your device's settings that allows the execution
of files and programs downloaded via Internet Explorer without
an integrity validation, which may lead to your device being
compromised.
❍ Application updates
To see information about the app that needs to be updated,
click its name from the list.
If an app is not up to date, click Download new version to
download the latest version.
❍ NETWORK
❍ Network and Credentials
Altered system settings such as automatically connecting to
open hotspot networks without your knowledge or not enforcing
encryption on the outgoing secure channel traffic.
❍ Wi-Fi networks and routers
To find out more about the wireless network and router you are
connected to, click its name from the list. If it is recommended
Important
To be automatically notified about system or app vulnerabilities,
keep the Vulnerability option enabled.
Note
If you turn off monitoring of a specific vulnerability, related issues will
no longer be recorded in the Notifications window.
Public Wi-Fi
While connected to an unsecured or unsafe wireless network, the Public
Wi-Fi profile is activated. While running in this profile, Bitdefender
Ultimate Security is set to automatically accomplish the following program
settings:
❍ Advanced Threat Defense is turned on
❍ The following settings from Online Threat Prevention are turned on:
❍ Encrypted web scan
❍ Protection against fraud
❍ Protection against phishing
Webcam Protection
That hackers may take over your webcam to spy on you is not a novelty
anymore, and solutions to protect it, such as revoking app’s privileges,
disable the device’s built-in camera, or to cover it up are not very practical.
To prevent further attempts to gain access to your privacy, Bitdefender
Webcam Protection permanently monitors the apps that try to get access
to your camera and blocks those that are not listed as trusted.
As a safety measure you will be notified each time an untrusted app will
attempt to gain access to your camera.
Notifications
❍ Notify when allowed applications connect to the webcam - you will
be notified each time an allowed app will access your webcam.
To view what the Bitdefender users have chosen to do with the selected
app, click the icon.
The apps that will request access to your camera together with the time of
last activity will appear in this window.
You will be notified each time one of the allowed apps is blocked by the
Bitdefender users.
To stop the access of an added app to your webcam, click the icon.
The icon turns to , meaning that the selected app will have no access to
your webcam.
Microphone monitor
Rogue apps may access your built-in microphone silently or in the
background without your consent. To make you aware of potential
malicious exploits, Bitdefender Microphone monitor will give you notice
of such events. This way, no app will be able to gain access to your
microphone without you being in charge.
To view what the Bitdefender users have chosen to do with the selected
app, click the icon.
The apps that will request access to your microphone together with the
time of last activity will appear in this window.
To stop receiving notifications regarding the activity of an added app, click
the icon.
The icon turns to , meaning that no Bitdefender notification will be
displayed when the selected app will try to access your microphone.
Note
To ensure that your files are protected against ransomware, we
recommend you to keep Ransomware Remediation enabled.
Note
Cryptomining Protection relies on:
❍ Bitdefender Shield
❍ Web Attack Prevention
In order to have Cryptomining Protection capable of running, both of
these two features must be enabled as well.
Note
Cryptomining Protection is disabled by default, ensuring that users
have control over its activation.
Modes of operation
Once enabled, the Cryptomining Protection feature operates in 2 distinct
states, each tailored to the user’s preferences:
1. Block all Cryptomining activities. (automatically blocks any crypto-
mining activities and takes necessary actions to prevent further
unauthorized attempts)
This mode is ideal for users who have no intention of engaging in
crypto-mining activities.
2. Detect Cryptomining activities. (issues alerts whenever a crypto-
mining activity is detected and requires user input to determine the
appropriate action)
This mode is suited for users actively involved in their own crypto-
mining activities but wish to monitor and control any unauthorized
attempts.
Manage exceptions
Exceptions can be specified for applications, with the added capability
of defining specific command lines. However, exceptions can also be
established without the need for providing such detailed parameters,
offering a balance between customization and simplicity.
To add an exception:
1. Click Protection on the left-hand side menu on the Bitdefender
interface.
2. In the Cryptomining Protection pane, click Settings.
3. Click the Manage exceptions option.
4. Next, click the Add an Exception button.
5. A new window will open. You can manually exclude applications, URLs,
and IP addresses.
6. Finally, click Save. The new rule is added to Cryptomining Protection
exceptions list.
Note
To remove an exception, simply click the trash can icon next to it.
1.2.12. Anti-tracker
Many websites you visit are using trackers to collect information about
your behavior, either to share it with third-party companies or to show
ads that are more relevant for you. Hereby, websites owners are making
money to be able to provide you content for free or continue operating.
Anti-tracker interface
When the Bitdefender Anti-tracker extension is activated, the icon
appears next to the search bar in your web browser. Every time you visit
a website, a counter can be noticed on the icon, referring to the detected
and blocked trackers. To view more details about the blocked trackers,
click the icon to open the interface. Besides the number of the trackers
blocked, you can view the time required for the page to load and the
categories to which the detected trackers belong. To view the list of the
websites that are tracking, click the desired category.
To disable Bitdefender from blocking trackers on the website you are
currently visiting, click Pause protection on this website. This setting
applies only as long you have the website open and will be reverted to the
initial state when you close the website.
❍ From Windows:
❍ In Windows 7:
1. Click Start and go to All Programs.
2. Click Bitdefender.
3. Click Bitdefender Safepay™.
❍ In Windows 8.1:
Locate Bitdefender Safepay™ from the Windows Start screen (for
example, you can start typing "Bitdefender Safepay™" directly in
the Start screen) and then click the icon.
❍ In Windows 10 and Windows 11:
Type "Bitdefender Safepay™" in the search box from the taskbar
and click its icon.
If you are used to web browsers, you will have no trouble using
Bitdefender Safepay™ - it looks and behaves like a regular browser:
❍ enter URLs you want to go to in the address bar.
❍ add tabs to visit multiple websites in the Bitdefender Safepay™
window by clicking .
❍ navigate back and forward and refresh pages using
respectively.
❍ access Bitdefender Safepay™ settings by clicking and choosing
Settings.
❍ manage your bookmarks by clicking next to the address bar.
❍ open the virtual keyboard by clicking .
❍ increase or decrease the browser size by pressing simultaneously Ctrl
and the +/- keys in the numeric keypad.
❍ view information about your Bitdefender product by clicking and
choosing About.
Note
To switch between Bitdefender Safepay™ and Windows desktop, press
the Alt+Tab keys, or click the Switch to Desktop option on the upper
left side of the window.
Configuring settings
Click and choose Settings to configure Bitdefender Safepay™:
Apply Bitdefender Safepay rules for accessed domains
The websites you have added to Bookmarks with the Automatically
open in Safepay option enabled will appear here. If you want to stop
automatically opening with Bitdefender Safepay™ a website from the list,
click × next to the desired entry from the Remove column.
Block pop-ups
You can choose to block pop-ups by clicking the corresponding switch.
You can also create a list of websites to allow pop-ups from. The list
should contain only websites you fully trust.
To add a site to the list, provide its address in the corresponding field and
click ADD DOMAIN.
To remove a website from the list, select the icon corresponding to the
desired entry.
Manage Plugins
You can choose whether you wish to enable or disable specific plugins in
Bitdefender Safepay™.
Manage certificates
You can import certificates from your system to a certificate store.
Click IMPORT and follow the wizard to use the certificates in Bitdefender
Safepay™.
Use Virtual Keyboard
The Virtual Keyboard will automatically appear when a password field is
selected.
Use the corresponding switch to enable or disable the feature.
Printing confirmation
Enable this option if you want to give your confirmation before the printing
process starts.
Managing bookmarks
If you disabled the automatic detection of some or all websites,
or Bitdefender simply doesn't detect certain websites, you can add
bookmarks to Bitdefender Safepay™ so that you can easily launch favorite
websites in the future.
Follow these steps to add a URL to Bitdefender Safepay™ bookmarks:
1. Click and choose Bookmarks to open the Bookmarks page.
Note
The Bookmarks page is opened by default when you start
Bitdefender Safepay™.
Control, you can easily find out what your children are doing on the
devices they use and where they have been in the last 24 hours. Moreover,
to help you know better what your children are doing, the feature gives
you statistics about their activities and interests.
In your Bitdefender subscription you have included the following features:
❍ On Windows:
❍ Block inappropriate webpages.
❍ Block apps like games, chat, file sharing programs, or others.
❍ Block the usage of the monitored device.
❍ Block internet access for specific periods of time (such as when it's
time for lessons).
❍ Set time restrictions for the usage of the devices.
❍ View the average time spent by your children on a device.
❍ View a report with the apps used on the monitored device in the
last 30 days.
❍ Set restricted areas.
❍ Find your child's Android device location.
Note
In this material you are provided with the options and instructions
available on the web platform.
As soon as you create a profile, you can start customizing more detailed
settings to monitor and control the access to the internet and to specific
apps for your children.
You can access Parental Control settings from Bitdefender Central on any
PC or mobile device connected to the internet.
Access your Bitdefender account:
❍ On any device with internet access:
1. Access Bitdefender Central.
2. Sign in to your Bitdefender account using your email address and
password.
3. Select the Parental Control panel.
4. In the window that appears, you can manage and configure the
Parental Control profiles for each device.
Note
Make sure you are logged on to the device with an administrator
account. Only users with administrative rights on the system (system
administrators) can access and configure Parental Control.
Important
On Windows and macOS-based devices that do not have a Bitdefender
product installed, the Bitdefender Parental Control monitoring tracker
will be installed so that you can monitor your children online activities.
On Android and iOS-based devices, the Bitdefender Parental Control
app will be downloaded and installed.
To assign other devices, click ADD DEVICE next to the child's profile.
Follow the instructions from step 6 provided in this chapter.
Editing a profile
To edit an existing profile:
1. Access Bitdefender Central.
2. Select the Parental Control panel.
3. Click OPTIONS on the desired profile card, and then select Edit
profile.
Removing a profile
To remove an existing profile:
1. Access Bitdefender Central.
2. Select the Parental Control panel.
3. Select the child profile.
4. Click the OPTIONS button, then select Delete profile.
5. Confirm your choice.
Activity
The main window gives you detailed information about your children's
online activities from the last 24 hours or from the last 7 days, depending
on your choice, inside and outside the home. To view activities from the
previous seven days click Last 7 days.
Depending on the activity, this window may include information about:
❍ Website activity - here you can view info about the categories of
websites that your children have visited. Click the CHANGE SETTINGS
link to allow or deny access to specific interests.
❍ Latest added phone contacts - here you can view if any new contacts
have been added on your child's devices. Click the VIEW ALL PHONE
CONTACTS link to select the contacts that your children should stay in
touch with or not.
❍ Applications - here you can see the apps your children have used.
Click the VIEW ALL APPLICATIONS link to block or allow the access
to specific apps.
❍ Screentime - here you can see the time spent online on all devices
assigned to your children. Click the VIEW SCREENTIME to acces the
Screentime window.
Applications
The Applications window allows you to block apps from running on
Windows. Games, media and messaging software, as well as other
categories of software can be blocked this way.
Here you can also view a top 30 days used apps together with the time
spent by your children on using them. Information about the time spent
on using apps can only be retrieved from Windows.
To configure application control for a specific user account:
1. A list with the assigned devices is displayed.
Select the card with the device on which you want to restrict app
access.
2. Click Manage the apps used by....
A list with the installed apps is displayed.
3. Select Blocked next to the apps you want your child to stop using.
Websites
The Websites window helps you block websites with inappropriate
content on Windows. Websites that host videos, games, media and
messaging software, as well as other categories of negative content can
be blocked this way.
The feature can be enabled or disabled by using the corresponding switch.
Depending on the age you set for your children, the Interests list comes by
default with a selection of categories enabled. To allow or deny the access
to a specific category, click it.
The icon that appears indicates that your child will not be able to
access content related to a specific category.
Allowing or blocking a website:
To allow or restrict the access to certain webpages, you have to add them
to the Exceptions list, as follows:
1. Click the MANAGE button.
2. Type the webpage you want to allow or block in the corresponding
field.
3. Select Allow or Block.
4. Click the + icon to save the changes.
Note
Access restrictions to websites can be set only for Windows, Android
and macOS devices added at your child's profile.
Screentime
In the Screentime window you are informed about the time spent on the
assigned devices on the current day, how much time is left from the daily
limit you set, and the status of the selected profile, active or paused. From
this window you can also set time restrictions for different times of the
day, such as bed time, homework or private lessons.
Time Restrictions
Important
After you wipe a device, all Anti-Theft features cease to
function.
1.3. Utilities
1.3.1. Profiles
Daily job activities, watching movies or playing games may cause system
slow down, especially if they are running simultaneously with Windows
update processes and maintenance tasks. With Bitdefender, you can now
choose and apply your preferred profile, which makes system adjustments
suited to increase the performance of specific installed apps.
Bitdefender provides the following profiles:
❍ Work Profile
❍ Movie Profile
❍ Game Profile
❍ Public Wi-Fi Profile
❍ Battery Mode Profile
If you decide to not use Profiles, a default profile called Standard is
enabled and it brings no optimization to your system.
According to your activity, the following product settings are applied when
Work, Movie or Game profiles are activated:
❍ All Bitdefender alerts and pop-ups are disabled.
❍ Automatic Update is postponed.
❍ Scheduled scans are postponed.
❍ The Antispam feature is enabled.
❍ Search Advisor is disabled.
❍ Special offers notifications are disabled.
According to your activity, the following system settings are applied when
Work, Movie or Game profiles are activated:
❍ Windows Automatic Updates are postponed.
❍ Windows alerts and pop-ups are disabled.
❍ Unnecessary background programs are suspended.
❍ Visual effects are adjusted for best performance.
❍ Maintenance tasks are postponed.
❍ Power plan settings are adjusted.
While running in the Public Wi-Fi profile, Bitdefender Ultimate Security is
set to automatically accomplish the following program settings:
❍ Advanced Threat Defense is turned on
❍ The Bitdefender Firewall is turned on and the following settings are
applied to your wireless adapter:
❍ Stealth mode - ON
❍ Network type - Public
❍ The following settings from Online Threat Prevention are turned on:
❍ Encrypted web scan
❍ Protection against fraud
❍ Protection against phishing
Work Profile
Running multiple tasks at work, such as sending emails, having a video
communication with your distant colleagues or working with design apps
may affect your system performance. Work Profile has been designed
to help you improve your work efficiency, by turning off some of your
background services and maintenance tasks.
Movie Profile
Displaying high quality video content, such as high definition movies,
requires significant system resources. Movie Profile adjusts system and
product settings so you can enjoy an uninterrupted and seamless movie
experience.
Game Profile
Enjoying an uninterrupted gaming experience is all about reducing system
load and diminishing slowdowns. By using behavioral heuristics along
with a list of known games, Bitdefender can automatically detect running
games and optimize your system resources so that you can enjoy your
gaming break.
Real-time optimization
Bitdefender Real-time optimization is a plugin that improves your system
performance silently, in the background, making sure that you are not
interrupted while you are in a profile mode. Depending on the CPU load,
the plugin monitors all processes, focusing on those that take up a higher
load, to adjust them to your needs.
To turn on or off Real-time optimization:
1. Click Utilities on the navigation menu on the Bitdefender interface.
2. In the Profiles tab, click Settings.
3. Scroll down until you see the Real-time optimization option, and then
use the corresponding switch to turn it on or off.
c. Results Summary
The results are displayed. Click Finish to exit the wizard.
1.4. How to
1.4.1. Installation
How do I install Bitdefender on a second device?
If the subscription you have purchased covers more than one device, you
can use your Bitdefender account to activate a second PC.
To install Bitdefender on a second device:
1. Click Install on another device on the lower-left corner of the
Bitdefender interface.
A new window appears on your screen.
2. Click SHARE DOWNLOAD LINK.
3. Follow the on-screen instructions to install Bitdefender.
The new device on which you have installed the Bitdefender product will
appear in the Bitdefender Central dashboard.
❍ In Windows 8.1:
1. From the Windows Start screen, locate Control Panel (for example,
you can start typing "Control Panel" directly in the Start screen),
and then click its icon.
2. Click Uninstall a program or Programs and Features.
3. Find Bitdefender Ultimate Security and select Uninstall.
4. Click REINSTALL in the window that appears.
5. You need to restart the device to complete the process.
Note
By following this reinstall procedure, customized settings are saved and
available in the new installed product. Other settings may be switched
back to their default configuration.
Note
Before running the kit, it is recommended to remove any security
solution installed on your system. When you use more than one security
solution on the same device, the system becomes unstable.
To install Bitdefender from Bitdefender Central:
1. Access Bitdefender Central.
❍ In Windows 7:
1. Click Start, go to Control Panel and double-click Programs and
Features.
2. Find Bitdefender Ultimate Security and select Uninstall.
3. Click REINSTALL in the window that appears.
4. Wait for the uninstall process to complete, and then reboot your
system.
Open the interface of your new installed Bitdefender product to
have access to its features.
❍ In Windows 8.1:
1. From the Windows Start screen, locate Control Panel (for
example, you can start typing "Control Panel" directly in the
Start screen), and then click its icon.
2. Click Uninstall a program or Programs and Features.
3. Find Bitdefender Ultimate Security and select Uninstall.
4. Click REINSTALL in the window that appears.
5. Wait for the uninstall process to complete, and then reboot your
system.
Open the interface of your new installed Bitdefender product to
have access to its features.
Note
By following this reinstall procedure, customized settings are saved
and available in the new installed product. Other settings may be
switched back to their default configuration.
❍ You changed your system and you want to continue using the
Bitdefender protection. Therefore, you need to reinstall the product
using the latest version.
To solve this situation:
1. Download the installation file:
a. Access Bitdefender Central.
b. Select the My Devices panel, and then click INSTALL
PROTECTION.
c. Choose one of the two available options:
❍ Protect this device
Select this option, and then select the owner of the
device. If the device belongs to someone else, click the
corresponding button.
❍ Protect another device
Select this option, and then select the owner of the
device. If the device belongs to someone else, click the
corresponding button.
Click SEND DOWNLOAD LINK. Type an email address in the
corresponding field, and click SEND EMAIL. Note that the
generated download link is valid for the next 24 hours only.
If the link expires, you will have to generate a new one by
following the same steps.
On the device you want to install your Bitdefender product,
check the email account that you typed in, and then click the
corresponding download button.
3. Type the email address in the corresponding field, and then click
NEXT.
4. Type your password, and then click SIGN IN.
Note
The Bitdefender product from your device automatically changes
according to the subscription associated to the new Bitdefender
account. If there is no available subscription associated to the new
Bitdefender account, or you wish to transfer it from the previous
account, you can contact Bitdefender for support as described in
section Asking for Help (page 286).
5. Click NEXT.
6. Check your email account, type the security code you have
received, and then click NEXT.
Alternatively, you can click Change password in the email that we
sent you.
7. Type the new password you want to set, and then type it once
again. Click SAVE.
To access your Bitdefender account from now on, type your email address
and the new password you have just set.
4. Add the file to the Exceptions list. To find out how to do this, refer to
How do I except a folder from being scanned? (page 102).
5. Turn on the Bitdefender real-time antivirus protection.
6. Contact our support representatives so that we may remove the
detection of the threat information update. To find out how to do this,
refer to Asking for Help (page 286).
Important
On Windows and macOS-based devices that do not have a Bitdefender
product installed, the Bitdefender Parental Control monitoring tracker
will be installed so that you can monitor your children online activities.
On Android and iOS-based devices, the Bitdefender Parental Control
app will be downloaded and installed.
Note
Restrictions can be set only for Android, macOS and Windows-based
devices.
Note
Restrictions can be set only for Android, macOS and Windows-based
devices.
6. Click Devices in the frame you have in the Child Location window.
7. Click the device you want to configure.
8. In the Areas window, click the ADD AREA button.
9. Choose the type of the location, SAFE or RESTRICTED.
10 Type a valid name for the area where your child has permission to go
. or not.
11 Set the range that should be applied for monitoring from the Radius
. slide bar.
12 Click ADD AREA to save your settings.
.
Whenever you want to set a restricted location as safe, or a safe location
as restricted, click it, and then select the EDIT AREA button. Depending
on the change you want to make, select the SAFE or the RESTRICTED
option, and then click UPDATE AREA.
8. Set the time frame and days when the restrictions should be applied,
and then click ADD SCHEDULE to save the settings.
Important
After you wipe a device, all Anti-Theft features cease to
function.
To manually add apps to this list, click the Add application button and
select one of the two options.
❍ From Windows Store
❍ From your apps
❍ In Windows 8.1:
1. From the Windows Start screen, locate Control Panel (for example,
you can start typing "Control Panel" directly in the Start screen),
and then click its icon.
2. Click Uninstall a program or Programs and Features.
3. Find Bitdefender Ultimate Security and select Uninstall.
4. Click REMOVE in the window that appears.
5. Wait for the uninstall process to complete, and then reboot your
system.
Note
This reinstall procedure will permanently delete the customized
settings.
❍ In Windows 8.1:
1. From the Windows Start screen, locate Control Panel (for example,
you can start typing "Control Panel" directly in the Start screen),
and then click its icon.
2. Click Uninstall a program or Programs and Features.
3. Find Bitdefender VPN and select Uninstall.
Wait for the uninstall process to complete.
❍ Google Chrome
1. Click next to the search bar.
2. Select More Tools, and then Extensions.
A list with the installed extensions appears.
3. Click Remove in the Bitdefender Anti-tracker card.
4. Click Remove in the popup that appears.
❍ Mozilla Firefox
How do I automatically shut down the device after the scan is over?
Bitdefender offers multiple scan tasks that you can use to make sure
your system is not infected with threats. Scanning the entire device may
take longer time to complete depending on your system's hardware and
software configuration.
For this reason, Bitdefender allows you to configure your product to shut
down your system as soon as the scan is over.
Consider this example: you have finished your work and you want to go to
sleep. You would like to have your entire system checked for threats by
Bitdefender.
To shut down the device when Quick Scan or System scan is over:
1. Click Protection on the navigation menu on the Bitdefender interface.
2. In the ANTIVIRUS pane, click Open.
3. In the Scans window, click next to Quick Scan or System Scan and
select Edit.
4. Customize the scan according to your needs and click Next.
5. Check the box next to Choose when to schedule this task, and then
choose when the task should start.
If you choose Daily, Monthly, or Weekly, drag the slider along the scale
to set the desired period of time when the scheduled scan should
start.
6. Click Save.
To shut down the device when a custom scan is over:
3. heck the box next to Choose when to schedule this task, and then
choose when the task should start.
4. Click Save.
If no threats are found, the device will shut down.
If there remain unresolved threats, you will be prompted to choose the
actions to be taken on them. For more information, refer to Antivirus Scan
Wizard (page 23).
Important
Home internet connections do not normally use a proxy server. As
a rule of thumb, check and configure the proxy connection settings
of your Bitdefender program when updates are not working. If
Bitdefender can update, then it is properly configured to connect to
the internet.
To manage the proxy settings:
1. Click Settings on the navigation menu on the Bitdefender interface.
2. Select the Advanced tab.
3. Turn on Proxy server.
4. Click Proxy change.
5. There are two options to set the proxy settings:
❍ Import proxy settings from default browser - proxy settings of
the current user, extracted from the default browser. If the proxy
server requires a username and a password, you must specify them
in the corresponding fields.
Note
Bitdefender can import proxy settings from the most popular
browsers, including the latest versions of Microsoft Edge,
Internet Explorer, Mozilla Firefox and Google Chrome.
❍ In Windows 8.1:
1. From the Windows Start screen, locate This PC (for example, you
can start typing "Computer" directly in the Start screen) and then
right-click its icon.
2. Select Properties in the bottom menu.
3. Look in the System area to see your system type.
❍ In Windows 7:
1. Click Start, go to Control Panel and double-click Programs and
Features.
2. Wait a few moments until the installed software list is displayed.
3. Find the name of the program you want to remove and select
Uninstall.
4. Wait for the uninstall process to complete, and then reboot your
system.
❍ In Windows 8.1:
1. From the Windows Start screen, locate Control Panel (for example,
you can start typing "Control Panel" directly in the Start screen),
and then click its icon.
2. Click Uninstall a program or Programs and Features.
3. Wait a few moments until the installed software list is displayed.
4. Find the name of the program you want to remove and select
Uninstall.
5. Wait for the uninstall process to complete, and then reboot your
system.
If you fail to remove the other security solution from your system, get the
uninstall tool from the vendor website or contact them directly to provide
you with the uninstall guidelines.
To reboot in normal mode, switch back the settings by launching again the
System Operation and clearing the Safe boot check box. Click OK, and
then Restart. Wait for the new settings to be applied.
1.5. Troubleshooting
1.5.1. Solving common issues
This chapter presents some problems you may encounter when
using Bitdefender and provides you with possible solutions to these
problems. Most of these problems can be solved through the appropriate
configuration of the product settings.
❍ My system appears to be slow (page 122)
❍ Scan doesn't start (page 123)
❍ I can no longer use an app (page 126)
❍ What to do when Bitdefender blocks a website, a domain, an IP
address, or an online app that is safe (page 127)
❍ How to update Bitdefender on a slow internet connection (page 131)
❍ Bitdefender services are not responding (page 132)
❍ Antispam filter does not work properly (page 132)
❍ Bitdefender removal failed (page 137)
❍ My system doesn't boot up after installing Bitdefender (page 138)
If you cannot find your problem here, or if the presented solutions
do not solve it, you can contact the Bitdefender technical support
representatives as presented in chapter Asking for Help (page 286).
Important
If you suspect a program or an app to be an essential part of
your operating system, do not remove it and contact Bitdefender
Customer Care for assistance.
❍ In Windows 8.1:
1. From the Windows Start screen, locate Control Panel (for
example, you can start typing "Control Panel" directly in the
Start screen), and then click its icon.
2. Click Uninstall a program or Programs and Features.
3. Find Bitdefender Ultimate Security and select Uninstall.
4. Click REINSTALL in the window that appears.
5. Wait for the reinstall process to complete, and then reboot your
system.
Note
By following this reinstall procedure, customized settings are saved
and available in the new installed product. Other settings may be
switched back to their default configuration.
In this case:
1. Remove the other security solution. For more information, refer to
How do I remove other security solutions? (page 119).
2. Reinstall Bitdefender:
❍ In Windows 7:
a. Click Start, go to Control Panel and double-click Programs
and Features.
b. Find Bitdefender Ultimate Security and select Uninstall.
c. Click REINSTALL in the window that appears.
d. Wait for the reinstall process to complete, and then reboot
your system.
❍ In Windows 8.1:
a. From the Windows Start screen, locate Control Panel (for
example, you can start typing "Control Panel" directly in the
Start screen), and then click its icon.
b. Click Uninstall a program or Programs and Features.
c. Find Bitdefender Ultimate Security and select Uninstall.
d. Click REINSTALL in the window that appears.
e. Wait for the reinstall process to complete, and then reboot
your system.
Note
By following this reinstall procedure, customized settings are
saved and available in the new installed product. Other settings
may be switched back to their default configuration.
If this information was not helpful, you can contact Bitdefender for
support as described in section Asking for Help (page 286).
❍ In Windows 8.1:
1. From the Windows Start screen, locate Control Panel (for
example, you can start typing "Control Panel" directly in the
Start screen), and then click its icon.
2. Click System and Security, go to Windows Firewall and
select Allow an app through Windows Firewall.
3. Select the File and Printer Sharing check box, and then
click OK.
Note
To learn how to manage printer sharing (share a printer, set or
remove permissions for a printer, connect to a network printer or to
a shared printer), go to the Windows Help and Support Center (in
the Start menu, click Help and Support).
My internet is slow
This situation may appear after you install Bitdefender. The issue could be
caused by errors in the Bitdefender firewall configuration.
To troubleshoot this situation:
1. Click Protection on the navigation menu on the Bitdefender interface.
2. In the FIREWALL pane, turn off the switch to disable the feature.
3. Check if your internet connection improved with the Bitdefender
firewall disabled.
❍ If you still have a slow internet connection, the issue may not be
caused by Bitdefender. You should contact your Internet Service
Provider to verify if the connection is operational on their side.
If you receive confirmation from your Internet Service Provider
that the connection is operational on their side and the issue still
If this information was not helpful, you can contact Bitdefender for
support as described in section Asking for Help (page 286).
Note
Bitdefender integrates into the most commonly used mail clients
through an easy-to-use antispam toolbar. For a complete list of
supported mail clients, refer to Supported email clients and protocols
(page 39).
Add contacts to Friends List
If you are using a supported mail client, you can easily add the senders of
legitimate messages to the Friends list. Follow these steps:
1. In your mail client, select an email message from the sender that you
want to add to the Friends list.
2. Click the Add Friend button on the Bitdefender antispam toolbar.
3. You may be asked to acknowledge the addresses added to the Friends
list. Select Don't show this message again and click OK.
You will always receive email messages from this address no matter what
they contain.
If you are using a different mail client, you can add contacts to the Friends
list from the Bitdefender interface. Follow these steps:
1. Click Protection on the navigation menu on the Bitdefender interface.
2. In the ANTISPAM pane, click Manage Friends.
A configuration window appears.
3. Type the email address you always want to receive email messages
from and then click ADD. You can add as many email addresses as you
want.
4. Click OK to save the changes and close the window.
Indicate detection errors
If you are using a supported mail client, you can easily correct the
antispam filter (by indicating which email messages should not have been
marked as [spam]). Doing so helps improve the efficiency of the antispam
filter. Follow these steps:
1. Open your mail client.
2. Go to the junk mail folder where spam messages are moved.
3. Select the legitimate message incorrectly marked as [spam] by
Bitdefender.
4. Click the Add Friend button on the Bitdefender antispam toolbar
to add the sender to the Friends list. You may need to click OK
to acknowledge. You will always receive email messages from this
address no matter what they contain.
5. Click the Not Spam button on the Bitdefender antispam toolbar
(normally located in the upper part of the mail client window). The
email message will be moved to the Inbox folder.
1. If you are using one of the mail clients Bitdefender integrates into,
indicate undetected spam messages.
Note
Bitdefender integrates into the most commonly used mail clients
through an easy-to-use antispam toolbar. For a complete list
of supported mail clients, refer to Supported email clients and
protocols (page 39).
this only when you have received several spam messages from the same
email address. Follow these steps:
1. Click Protection on the navigation menu on the Bitdefender interface.
2. In the ANTISPAM pane, click Settings.
3. Go to the Manage Spammers window.
4. Type the spammer's email address and then click the Add. You can
add as many email addresses as you want.
5. Click OK to save the changes and close the window.
Note
POP3 is one of the most widely used protocols for downloading
email messages from a mail server. If you do not know the protocol
that your email client uses to download email messages, ask the
person who configured your email client.
❍ In Windows 8.1:
1. From the Windows Start screen, locate Control Panel (for example,
you can start typing "Control Panel" directly in the Start screen),
and then click its icon.
2. Click Uninstall a program or Programs and Features.
3. Find Bitdefender Ultimate Security and select Uninstall.
4. Click REMOVE in the window that appears.
5. Wait for the uninstall process to complete, and then reboot your
system.
❍ In Windows 8.1:
a. From the Windows Start screen, locate Control Panel (for
example, you can start typing "Control Panel" directly in the
Start screen), and then click its icon.
b. Click Uninstall a program or Programs and Features.
❍ You had a different security solution before and you did not remove
it properly.
To solve this:
1. Reboot your system and enter in Safe Mode. To find out how to do
this, refer to How do I restart in Safe Mode? (page 120).
2. Remove the other security solution from your system:
❍ In Windows 7:
a. Click Start, go to Control Panel and double-click Programs
and Features.
b. Find the name of the program you want to remove and
select Remove.
c. Wait for the uninstall process to complete, and then reboot
your system.
❍ In Windows 8.1:
a. From the Windows Start screen, locate Control Panel (for
example, you can start typing "Control Panel" directly in the
Start screen), and then click its icon.
b. Click Uninstall a program or Programs and Features.
c. Find the name of the program you want to remove and
select Remove.
d. Wait for the uninstall process to complete, and then reboot
your system.
You have already followed the steps above and the situation is not
solved.
To solve this:
1. Reboot your system and enter in Safe Mode. To find out how to do this,
refer to How do I restart in Safe Mode? (page 120).
2. Use the System Restore option from Windows to restore the device to
an earlier date before installing the Bitdefender product.
3. Reboot the system in normal mode and contact our support
representatives for help as described in section Asking for Help (page
286).
Rescue Environment
Rescue Environment is a Bitdefender feature that allows you to scan
and disinfect all existing hard drive partitions inside and outside of your
operating system.
Bitdefender Rescue Environment is integrated with Windows RE.
Warning
If you suspect the file is part of the Windows operating system or
that it is not an infected file, do not follow these steps and contact
Bitdefender Customer Care as soon as possible.
If the selected action could not be taken and the scan log reveals an
infection which could not be deleted, you have to remove the file(s)
manually:
The first method can be used in normal mode:
1. Turn off the Bitdefender real-time antivirus protection:
Note
It's important to note that a threat stored in an archive is not
an immediate threat to your system, since the threat has to be
decompressed and executed to infect your system.
If this information was not helpful, you can contact Bitdefender for
support as described in section Asking for Help (page 286).
3. Open the scan report and use the identification information (Subject,
From, To) of the infected messages to locate them in the email client.
4. Delete the infected messages. Most email clients also move the
deleted message to a recovery folder, from which it can be recovered.
You should make sure the message is deleted also from this recovery
folder.
5. Compact the folder storing the infected message.
❍ In Microsoft Outlook 2007: On the File menu, click Data File
Management. Select the personal folders (.pst) files you intend to
compact, and click Settings. Click Compact Now.
❍ In Microsoft Outlook 2010 / 2013/ 2016: On the File menu, click
Info, and then Account settings (Add and remove accounts or
change existing connection settings). Then click Data File, select
the personal folders (.pst) files you intend to compact, and click
Settings. Click Compact Now.
Note
Bitdefender Anti-tracker and Bitdefender VPN can only be installed on
systems running macOS 10.12 or newer versions.
Installation process
To install Bitdefender Antivirus for Mac:
1. Click the downloaded file. This will launch the installer, which will
guide you through the installation process.
2. Follow the installation wizard.
Click Continue.
Before continuing with the installation, you have to agree with the
Subscription Agreement. Please take some time to read the Subscription
Agreement as it contains the terms and conditions under which you may
use Bitdefender Antivirus for Mac.
From this window you can also select the language you want to install the
product in.
Click Continue, and then click Agree.
Important
If you do not agree to these terms, click Continue, and then click
Disagree to cancel the installation and quit the installer.
Step 5 - Finish
Important
❍ If you are installing Bitdefender Antivirus for Mac on macOS
High Sierra 10.13.0 or a newer version, the System Extension
Blocked notification appears. This notification informs you that the
extensions signed by Bitdefender have been blocked and must be
manually enabled. Click OK to continue. In the Bitdefender Antivirus
for Mac window that appears, click the Security & Privacy link. Click
Allow in the lower part of the window, or select the Bitdefender SRL
from the list, and then click OK.
❍ If you are installing Bitdefender Antivirus for Mac on macOS Mojave
10.14 or a newer version, a new window will be displayed, informing
you that you have to Grant Bitdefender Full Disk Access and Allow
Bitdefender to load. Follow the on-screen instructions to properly
configure the product.
Note
If you’re trying to remove just the Bitdefender VPN app select
Uninstall VPN only.
Important
If there is an error, you can contact Bitdefender Customer Care as
described in Asking for Help (page 286).
❍ Click the icon in the menu bar and choose Open Antivirus
interface.
❍ Open a Finder window, go to Applications and double-click the icon
Bitdefender Antivirus for Mac.
Important
The first time you open Bitdefender Antivirus for Mac on macOS Mojave
10.14 or a newer version, a protection recommendation appears. This
recommendation appears because we need permissions to scan your
entire system for threats. To give us permissions, you have to be logged
in as administrator and follow these steps:
1. Click the System Preferences link.
2. Click the icon, and then type in your administrator credentials.
3. A new window opens. Drag the BDLDaemon file to the allowed apps
list.
into red. For detailed information on issues and how to fix them, refer to
Fixing Issues (page 171).
To offer you an effective operation and increased protection while carrying
out different activities, Bitdefender Autopilot will act as your personal
security advisor. Depending on the activity you perform, either you work or
make online payments Bitdefender Autopilot will come up with contextual
recommendations based on your device usage and needs. This will help
you discovery and benefit from the advantages brought by the features
included into the Bitdefender Antivirus for Mac app.
From the navigation menu on the left side you can access the Bitdefender
sections for detailed configuration and advanced administrative tasks
(Protection and Privacy tabs), notifications, your Bitdefender account and
the Preferences area. Also, you can contact us (Help tab) for support in
case you have questions or something unexpected appears.
❍ Dashboard. From here, you can quickly fix security issues, view
recommendations according to your system needs and usage patterns,
perform quick actions, and go to your Bitdefender account to manage
the devices you have added to your Bitdefender subscription.
❍ Protection. From here, you can launch antivirus scans, add files to
the exceptions list, protect files and apps from ransomware attacks,
Note
Depending on the size of your hard disk, scanning the entire
system may take a while (up to an hour or even more). For
improved performance, it is recommended not to run this task
while performing other resource-intensive tasks (such as video
editing).
If you prefer, you can choose not to scan specific mounted
volumes by adding them to the Exceptions list from the
Protection window.
Note
The scanning process may take a while, depending on the complexity of
the scan.
2.4.4. Quarantine
Bitdefender Antivirus for Mac allows isolating the infected or suspicious
files in a secure area, named quarantine. When a threat is in quarantine it
cannot do any harm because it cannot be executed or read.
The Quarantine section displays all the files currently isolated in the
Quarantine folder.
To delete a file from quarantine, select it and click Delete. If you want
to restore a quarantined file to its original location, select it and click
Restore.
To view a list with all the items added to quarantine:
1. Click Protection on the navigation menu on the Bitdefender interface.
2. Click Open in the Quarantine pane.
Warning
This is a critical security issue. We recommend you to disable real-
time protection for as little time as possible. If real-time protection
is disabled, you will not be protected against threats.
❍ Email Protection
5. Once all Scam Copilot components are enabled, you can close the
setup window.
Scam Copilot for your macOS is now successfully configured!
The exceptions list contains the paths that have been excepted from
scanning.
To access the exceptions list:
❍ Exceptions
If you are on the website you want to add to exceptions, click Add
current website to the list.
If you would like to add another website, type its address in the
corresponding field, and then click .
No warning will be displayed in case threats are present on the
excepted pages. This is why only websites you fully trust should be
added to this list.
2.4.9. Anti-tracker
Many websites you visit are using trackers to collect information about
your behavior, either to share it with third-party companies or to show
ads that are more relevant for you. Hereby, websites owners are making
money to be able to provide you content for free or continue operating.
Anti-tracker interface
When the Bitdefender Anti-tracker extension is activated, the icon
appears next to the search bar in your web browser. Every time you visit
a website, a counter can be noticed on the icon, referring to the detected
and blocked trackers. To view more details about the blocked trackers,
click the icon to open the interface. Besides the number of the trackers
blocked, you can view the time required for the page to load and the
categories to which the detected trackers belong. To view the list of the
websites that are tracking, click the desired category.
To disable Bitdefender from blocking trackers on the website you are
currently visiting, click Pause protection on this website. This setting
applies only as long you have the website open and will be reverted to the
initial state when you close the website.
To allow trackers from a specific category to monitor your activity, click
the desired activity, and then click the corresponding button. If you
change your mind, click the same button once again.
Note
You can protect up to 5 different email accounts.
Note
Email Protection is currently available for Google accounts, Outlook
accounts and soon-to-be available for Yahoo Mail as well.
Note
Each scanned email will be marked with a label to indicate its safetly
levels.
4. Click the button labeled with the plus sign (+), located under the
protected files list. Then, choose the file, folder or volume to be
protected in case ransomware attacks will try access them.
To avoid system slow down, we recommend you to add utmost 30 folders,
or save multiple files in a single folder.
By default, the folders Pictures, Documents, Desktop, and Downloads are
protected against threat attacks.
Note
Custom folders can be protected only for current users. External drives,
system and app files cannot be added to the protection environment.
You will be informed each time an unknown app with an unusual behavior
will try to modify the files you added. Click Allow or Block to add it to the
Managing Applications list.
Applications Access
Those apps that try to change or delete protected files may be flagged as
potentially unsafe and added to the Blocked apps' list. If such an app is
blocked and you are sure that its behavior is normal, you can allow it by
following these steps:
1. Click Protection on the navigation menu on the Bitdefender interface.
2. Select the Anti-Ransomware tab.
3. Click Application Access in the Safe Files area.
4. Change the status to Allow next to the blocked app.
Apps that are set on Allow can be set on Blocked as well.
Use the drag&drop method or click the plus sign (+) to add more
apps to the list.
❍ The new threat information update was not been downloaded from our
servers.
❍ Threats have been detected on your system and the product cannot
automatically disinfect them.
❍ The real-time protection is disabled.
To check and fix detected issues:
1. If Bitdefender has no warnings, the status bar is green. When a
security issue has been detected, the status bar changes its color into
red.
2. Check the description for more information.
3. When a issue is detected, click the corresponding button to take
action.
The list of unresolved threats is updated after each system scan no matter
whether the scan is automatically made in the background or initiated by
you.
You can choose to take the following actions on unresolved threats:
❍ Manually delete. Take this action to remove the infections manually.
❍ Add to Exceptions. This action is not available for threats found inside
archives.
2.4.14. Notifications
Bitdefender keeps a detailed log of events concerning its activity on your
computer. Whenever something relevant to the security of your system or
2.4.15. Updates
New threats are found and identified every day. This is why it is very
important to keep Bitdefender Antivirus for Mac up to date with the latest
threat information updates.
The threat information updates are performed on the fly, meaning that the
files to be updated are replaced progressively. In this way, the update will
not affect the product operation and, at the same time, any vulnerability
will be excepted.
❍ If Bitdefender Antivirus for Mac is up-to-date, it can detect the latest
threats discovered and clean the infected files.
Requesting an Update
You can request an update manually anytime you want.
An active internet connection is required to check for available updates
and download them.
To request an update manually:
1. Click the Actions button in the menu bar.
2. Choose Update threat information database.
Alternatively, you can request an update manually by pressing CMD + U.
You can see the update progress and downloaded files.
access and view the Subscription Agreement, Privacy Policy and Open-
source licenses.
To access the About window:
1. Open Bitdefender Antivirus for Mac.
2. Click Bitdefender Antivirus for Mac in the menu bar and choose About
Antivirus for Mac.
❍ Scan only new and changed files. Select this check box to set
Bitdefender Antivirus for Mac to scan only files that have not been
scanned before or that have been modified since their last scan.
You can choose not to apply this setting for custom and drag & drop
scanning by clearing the corresponding check box.
❍ Don't scan content in backups. Select this check box to exclude
backup files from scanning. If the infected files are restored at a later
time, Bitdefender Antivirus for Mac will automatically detect them and
take the proper action.
Note
The My offers option is enabled by default.
Note
In this material we have included the options that you can find on the
web interface.
2.6.5. Activity
In the Activity area you have access to information on the devices that
have Bitdefender installed.
Once you access the Activity window, the following cards are available:
❍ My Devices. Here you can view the number of the connected devices
along with their protection status. To fix issues remotely on the
detected devices, tap Fix issues, and then tap SCAN AND FIX
ISSUES.
To view details about the detected issues, tap View issues.
Information about detected threats cannot be retrieved from iOS-
based devices.
❍ Threats blocked. Here you can view a graph showing an overall
statistic including information about the threats blocked in the last
24 hours and seven days. The displayed information is retrieved
2.6.6. My Subscriptions
The Bitdefender Central platform gives you the possibility to easily
manage the subscriptions you have for all your devices.
Note
You can have one or more subscriptions on your account provided that
they are for different platforms (Windows, macOS, iOS or Android).
Activate subscription
A subscription can be activated during the installation process by using
your Bitdefender account. Together with the activation process, the
subscription's validity starts to count down.
If you have purchased an activation code from one of our resellers or
you received it as a present, then you can add its availability to your
Bitdefender subscription.
To activate a subscription using an activation code, follow these steps:
1. Access Bitdefender Central.
2. Select the My Subscriptions panel.
3. Tap the ACTIVATION CODE button, then type the code in the
corresponding field.
4. Tap ACTIVATE to continue.
The subscription is now activated.
Renew Subscription
If you disabled the automatic renewal of your Bitdefender subscription,
you can manually renew it by following these steps:
1. Access Bitdefender Central.
2. Select the My Subscriptions panel.
3. Select the desired subscription card.
4. Tap RENEW to continue.
A webpage opens in your web browser where you can renew your
Bitdefender subscription.
2.6.7. My Devices
The My Devices area in your Bitdefender account gives you the possibility
to install, manage and take remote actions on your Bitdefender product
on any device, provided that it is turned on and connected to the internet.
The device cards display the device name, protection status and if there
are security risks affecting the protection of your devices.
4. Wait for the download to complete, and then run the installer.
Remote actions
To remotely update Bitdefender on a device:
2.6.8. Notifications
To help you stay informed about what is happening on the devices
associated to your account, the icon is at hand. Once you tap it you
have an overall image consisting of information about the activity of the
Bitdefender products installed on your devices.
Note
Restricted access files means files Bitdefender Antivirus for Mac
can only open, but it cannot modify them.
Important
If there is an error, you can contact Bitdefender Customer Care as
described in Asking for Help (page 286).
Before going through the validation steps, you have to agree with
the Subscription Agreement. Please take some time to read the
Subscription Agreement as it contains the terms and conditions under
which you may use Bitdefender Mobile Security.
Tap CONTINUE to proceed to the next window.
Note
Bitdefender does not get access to any confidential information such
as the password of the account you use to sign in, or the personal
information of your friends and contacts.
3.2.5. Dashboard
Tap the Bitdefender Mobile Security icon in your device's app drawer to
open the app interface.
The Dashboard offers information about the security status of your device
and through Autopilot helps you to improve your device security by giving
you features recommendations.
The status card at the top of the window informs you about the
device's security status using explicit messages and suggestive colors.
If Bitdefender Mobile Security has no warnings, the status card is green.
When a security issue has been detected, the status card changes its color
into red.
To offer you an effective operation and increased protection while carrying
out different activities, Bitdefender Autopilot will act as your personal
security advisor. Depending on the activity you perform, Bitdefender
Autopilot will come up with contextual recommendations based on your
device usage and needs. This will help you discover and benefit from the
advantages brought by the features included into the Bitdefender Mobile
Security app.
Whenever there is a process in progress or a feature requires your input,
a card with more information and possible actions is displayed in the
Dashboard.
You can access the Bitdefender Mobile Security features and easily
navigate from the bottom navigation bar:
Malware Scanner
Allows you to initiate an on-demand scan and enable Scan Storage. For
more information, refer to Malware Scanner (page 195).
Web Protection
Note
Make sure your mobile device is connected to the internet. If your
device is not connected to the internet, the scan process will not start.
❍ On-install scanning
Whenever you install an app, Bitdefender Mobile Security
automatically scans it using in-the-cloud technology. The same
scanning process starts each time the installed apps are updated.
Note
Additional permissions are required on Android 6 for the
Malware Scanner feature. After tapping START SCAN, select
Allow for the following:
❍ Allow Antivirus to make and manage phone calls?
❍ Allow Antivirus to access photos, media, and files on your
device?
The scan progress is displayed and you can stop the process at any
time.
By default, Bitdefender Mobile Security will scan your device's internal
storage, including any mounted SD card. This way, any dangerous apps
that might be on the card can be detected before they can cause harm.
To disable the Scan Storage setting:
1. Tap More on the bottom navigation bar.
2. Tap Settings.
3. Disable the Scan Storage switch in the Malware Scanner area.
If any malicious apps are detected, information about them will be
displayed and you can remove them by tapping UNINSTALL.
The Malware Scanner card displays the state of your device. When your
device is safe, the card is green. When the device requires a scan, or there
is any action that requires your input, the card will turn red.
If your Android’s version is 7.1 or newer, you can access a shortcut to
Malware Scanner so that you can run scans faster, without opening the
Bitdefender Mobile Security interface. To do this, press and hold the
Bitdefender icon on your Home screen or Apps drawer, and then select
the icon.
Note
Additional permissions are required on Android 6 for the Web
Protection feature.
Allow permission to register as Accessibility service and tap TURN ON
when requested. Tap Antivirus and enable the switch, then confirm
that you agree with the access to your device’s permission.
Each time you access a banking site, Bitdefender Web Protection is set to
notify you to use Bitdefender VPN. The notification appears in the status
bar. We recommend you to use Bitdefender VPN while you are signed
in into your bank account so that your data can stay safe from potential
security breaches.
To disable the Web Protection notification:
2. Tap Settings.
3.5. VPN
With Bitdefender VPN you can keep your data private each time you
connect to unsecured wireless networks while in airports, malls, cafés,
or hotels. This way, unfortunate situations such as theft of personal data,
or attempts to make your device’s IP address accessible to hackers can be
avoided.
The VPN serves as a tunnel between your device and the network you
connect to securing your connection, encrypting the data using bank-
grade encryption, and hiding your IP address wherever you are. Your
traffic is redirected through a separate server; thus making your device
almost impossible to be identified through the myriad of other devices
that are using our services. Moreover, while connected to the internet via
VPN, you are able to access content that is normally restricted in specific
areas.
Note
Some countries practice internet censorship and therefore the usage
of VPNs on their territory has been banned by law. To avoid legal
consequences, a warning message can appear when you try to use the
Bitdefender VPN app for the first time. By continuing using the app, you
confirm that you are aware of the applicable country regulations and
the risks to which you might be exposed.
There are two ways to turn on or off Bitdefender VPN:
❍ Tap CONNECT in the VPN card from the Dashboard.
The status of Bitdefender VPN is displayed.
❍ Tap VPN on the bottom navigation bar, and then tap CONNECT.
Tap CONNECT each time you want to stay protected while connected
to unsecured wireless networks.
Tap DISCONNECT whenever you want to disable the connection.
Note
The first time you turn on VPN, you are asked to allow Bitdefender to
set up a VPN connection that will monitor network traffic. Tap OK to
continue.
3.5.2. Subscriptions
Bitdefender VPN offers for free a daily 200 MB traffic quota per device
to secure your connection every time you need, and connects you
automatically to the optimal server location.
To get unlimited traffic and unrestricted access to content worldwide by
choosing a server location at your will, upgrade to the premium version.
You can upgrade to the Bitdefender Premium VPN version anytime by
tapping on Activate Premium in the VPN window.
The Bitdefender Premium VPN subscription is independent from the
Bitdefender Mobile Security subscription, meaning you will be able to
use it for its entire availability, regardless of the state of your security
subscription. In case the Bitdefender Premium VPN subscription expires,
but the one for Bitdefender Mobile Security is still active, you will be
reverted to the free plan.
Bitdefender VPN is a cross-platform product, available in the Bitdefender
products compatible with Windows, macOS, Android, and iOS. Once you
upgrade to the premium plan, you will be able to use your subscription on
all products, provided that you login with the same Bitdefender account.
Note
Bitdefender VPN also works as a standalone application on all
supported operating systems, namely Windows, macOS, Android and
iOS.
Note
Due to Android operating system limitations, Bitdefender cannot delete
text messages, take any direct measures related to the SMS messages,
or any other source of malicious notifications. If you ignore the Scam
Alert warning and try to open the dangerous link, Bitdefender’s Web
Protection feature will automatically catch it, preventing your device
from becoming infected.
3. You will be met by the Chat Protection feature at the top of the Scam
Alert tab. Toggle its corresponding switch to the ON position.
Note
Currently, Chat Protection is compatible with the following applications:
❍ WhatsApp
❍ Facebook Messenger
❍ Telegram
❍ Discord
Note
The Anti-Theft interface also includes a link to our Bitdefender Central
app on Google Play Store. You can use this link to download the app, in
case you haven't done it already.
Bitdefender Mobile Security offers the following Anti-Theft features:
Remote Locate
View your device's current location on Google Maps. The location is
refreshed every 5 seconds, so you can track it if it is on the move.
The accuracy of the location depends on how Bitdefender is able to
determine it:
❍ If the GPS is enabled on the device, its location can be pinpointed to
within a couple of meters as long it is in the range of GPS satellites (i.e.
not inside a building).
❍ If the device is indoors, its location can be determined to within tens of
meters if Wi-Fi is enabled and there are wireless networks available in
its range.
❍ Otherwise, the location will be determined using only information from
the mobile network, which can offer an accuracy no better than several
hundred meters.
Remote Lock
Lock your device's screen and set a numeric PIN for unlocking it.
Remote Wipe
Remove all personal data from your estranged device.
Send alert to device (Scream)
Remotely send a message to be displayed on the device's screen, or
trigger a loud sound to be played on the device speaker.
If you lose your device, you can let whoever finds it know how they can
return it to you by displaying a message on the screen of the device.
If you misplaced your device and there is a chance it is not far from you
(for example, somewhere around the house or the office), what better way
to find it than to make it play a loud sound? The sound will be played even
if the device is in silent mode.
2. Tap Anti-Theft.
3. Tap TURN ON.
4. The following procedure will begin to help you activate this feature:
Note
Additional permissions are required on Android 6 for the Anti-Theft
feature.
To enable it, follow these steps:
a. Tap Activate Anti-Theft, then tap TURN ON.
b. Allow permissions for Antivirus to access your device’s
location.
Once the Anti-Theft feature is activated, you can enable or disable Web
Control commands individually from the Anti-Theft window by tapping the
corresponding options.
Important
After you wipe a device, all Anti-Theft features cease to function.
Note
This step is available only if you didn't previously configure the PIN
in Anti-Theft.
7. Enable the Snap Photo option to catch any intruder that will try to
access your private data.
Note
Additional permissions are required on Android 6 for the Snap
Photo feature. To enable it, allow Antivirus to take pictures and
record video.
Note
The same PIN code is used by Anti-Theft to help you locate your device.
The feature works easy: each time the PIN code or fingerprint
confirmation you set to protect your apps is entered wrong three times
in a row, a photo is taken using the front camera. The photo is saved
together with the time-stamp and reason, and can be seen when you open
Bitdefender Mobile Security and access the App Lock feature.
Note
This feature is available only for phones that have a front camera.
With Smart Unlock you can set as trusted the Wi-Fi networks you usually
connect to, and when connected to them, the App Lock blocking settings
will be disabled for the protected apps.
To configure the Smart Unlock feature:
3.10. Reports
The Reports feature keeps a detailed log of events concerning the
scanning activity on your device.
Whenever something relevant to the security of your device happens, a
new message is added to the Reports.
To access the Reports section:
2. Tap Reports.
The following tabs are available in the Reports window:
❍ WEEKLY REPORTS - here you have access to the security status
and the performed tasks from the current and previous week. The
current week’s report is generated each Sunday and you will receive a
notification informing you about it becoming available.
Each week a new tip will be displayed in this section, so make sure you
check back regularly to get the best out of the app.
To stop receiving notifications each time a report is generated:
❍ ACTIVITY LOG - here you can check detailed information about the
activity of your Bitdefender Mobile Security app since it was installed
on your Android device.
To delete the available activity log:
1. Tap More on the bottom navigation bar.
2. Tap Settings.
3. Tap Clear Activity Log, and then tap CLEAR.
3.11. WearON
With Bitdefender WearON you can easily find your smartphone whether
you left it at the office in a conference room or under a pillow on your
couch. The device can be found even if the silent mode is activated.
Keep this feature enabled to make sure that you always have your
smartphone at hand.
Note
The feature works with Android 4.3 and Android Wear.
3.12. About
To find information about the Bitdefender Mobile Security version you
have installed, to access and read the Subscription Agreement and Privacy
Policy, and view the Open-source licenses:
1. Tap More on the bottom navigation bar.
2. Tap Settings.
3. Tap the desired option in the About area.
❍ Storage -> used to allow the Malware Scanner to check the SD card.
How can I stop submitting to Bitdefender information about suspect
apps?
By default, Bitdefender Mobile Security sends reports to Bitdefender
servers about the suspect apps you are installing. This information is
essential for improving the threat detection and can help us to offer you
a better experience in the future. In case you want to stop sending us
information about suspect apps:
2. Tap Settings.
3. Turn off In-the-cloud detection in the Malware Scanner area.
Where can I see details about the app's activity?
Bitdefender Mobile Security keeps a log of all important actions, status
changes, and other critical messages related to its activity. To access see
about the app's activity:
2. Tap Reports.
In the WEEKLY REPORTS window you can access the reports that are
generated every week and in the ACTIVITY LOG window you can view
information about the activity of your Bitdefender app.
I forgot the PIN code that I set to protect my app. What do I do?
1. Access Bitdefender Central.
2. Select the My Devices panel.
3. Tap the desired device card, and then tap in the upper-right corner
of the screen.
4. Select Settings.
5. Retrieve the PIN code from the Application PIN field.
How can I change the PIN code I set for App Lock and Anti-Theft?
If you wish to change the PIN code you set for App Lock and Anti-Theft:
2. Tap Settings.
3. Tap Security PIN CODE in the Anti-Theft area.
4. Type in the current PIN code.
5. Type in the new PIN code you want to set.
How can I switch off the App Lock feature?
There is no turn off option for the App Lock feature, but you can easily
disable it by clearing the check boxes next to the selected apps after
validating the PIN or fingerprint you have set.
How can I set another wireless network as trusted?
First, you have to connect your device to the wireless network you want to
set as trusted. Then follow these steps:
1. Tap More on the bottom navigation bar.
2. Tap App Lock.
3. Tap in the upper-right corner.
4. Tap ADD next to the network you want to set as trusted.
How can I stop seeing snapped photos taken on my devices?
To stop making visible the snapped photos taken on your devices:
1. Access Bitdefender Central.
2. Tap in the upper right side of the screen.
3. Tap Settings in the slide menu.
4. Disable the Show/don't show snap photos taken on your devices
option.
How can I keep my online shopping secure?
Online shopping comes with high risks when some details are ignored. To
not become a victim of fraud, we recommend you the following:
❍ Keep your security app updated.
❍ Submit online payments only with buyer protection.
❍ Use a VPN when connecting to the internet from public and unsecured
wireless networks.
Note
Bitdefender does not get access to any confidential information
such as the password of the account you use to sign in, or the
personal information of your friends and contacts.
4.2.4. Dashboard
Tap the Bitdefender Mobile Security for iOS icon in your device's app
drawer to open the application interface.
The first time you access the app, you are prompted to allow Bitdefender
to send you notifications. Tap Allow to stay informed each time
Bitdefender has to communicate you something relevant to your app. To
manage Bitdefender notifications, go to Settings > Notifications > Mobile
Security.
To get access to the section you need, tap the corresponding icon from the
bottom of the screen.
Web Protection
Stay safe while you surf the web and whenever less secure apps will try to
access untrusted domains. For more information, refer to Web Protection
(page 228).
VPN
Maintain your privacy no matter what network you are connected to by
keeping your internet communication encrypted. For more information,
refer to VPN (page 230).
Account Privacy
Find out whether your email accounts have been leaked or not. For more
information, refer to Account Privacy (page 233).
To see additional options, tap the icon on your device while in the
application's home screen. The following options appear:
❍ Restore purchases - from here you can restore the previous
subscriptions you have purchased through your iTunes account.
❍ Settings - from here you have access to:
❍ VPN Settings
❍ Agreement - you can read the terms under which you use the
Bitdefender VPN service. If you tap I don't agree anymore, you
will not be able to use Bitdefender VPN at least until you tap I
Agree.
❍ Open Wi-Fi warning - you can enable or disable the product
notification that appears each time you connect to an unsecured
Wi-Fi network.
The purpose of this notification is to help you keep your data
private and secure by using Bitdefender VPN.
❍ Product reports
❍ Feedback - from here you can launch the default email client to send
us your feedback about the app.
❍ App info - from here, you have access to information about the
installed version and to Subscription Agreement, Privacy Policy, and
Open-source licenses compliances.
4.3. Scan
Bitdefender Mobile Security for iOS allows you to scan your device for any
security vulnerabilities and potential threats on your device. Running the
scan will check for:
❍ OS version: Checking your iOS version for the latest updates.
❍ Passcode/Biometrics: Checking the security level in regards to
accessing your device.
❍ Web Protection: Checking the state of the Web Protection module
❍ Account Privacy: Checking for the presence of monitored accounts
listed in the Account Privacy module.
❍ Scan Wi-Fi: Checking for the security status of the currently
connected network.
The protection status is determined after you run a manual scan.
After running the first scan, you will be met with Bitdefender's Autopilot
recommendations. This is your personal security advisor, providing
contextual recommendations based on your device usage and needs. This
way, you’ll get to benefit from everything your app has to offer.
Note
When first entering the app, you will be prompted to run a scan.
Note
Due to iOS restrictions, Bitdefender SMS filtering can only be used
for SMS and MMS messages that come from people you don’t have
saved in your contacts. This means it won’t filter messages from people
already in your contacts list or iMessage messages from anyone.
How to enable Calendar Scan:
1. Open the Bitdefender Mobile Security app installed on your iPhone or
iPad.
2. Go to the Scam Alert option in the bottom navigation bar and
press Set up now.
3. Tap Continue, and then tap Enable.
4. Choose OK to grant Bitdefender access to your calendar. A calendar
scan will begin immediately.
Important
If you are located in an area where the usage of a VPN service
is restricted by law, the functionality of Web Protection will not be
available.
To activate Web Protection:
1. Tap the icon from the bottom of the screen.
2. Tap I Agree.
3. Enable the Web Protection switch.
Note
The first time you turn on Web Protection, you might be prompted
to allow Bitdefender to set up VPN configurations that will monitor
network traffic. Tap Allow, to continue. If an authentication method
(fingerprint or PIN code) has been set to protect your smartphone,
you are required to use it. To be able to detect access to untrusted
domains, Web Protection is working together with the VPN services.
Important
The Web Protection feature and the VPN cannot function at the
same time. Whenever one of them is enabled, the other (if it is
active at that time) will be disabled.
4.6. VPN
With Bitdefender VPN you can keep your data private each time you
connect to unsecured wireless networks while in airports, malls, cafés,
or hotels. This way, unfortunate situations such as theft of personal data,
or attempts to make your device’s IP address accessible to hackers can be
avoided.
The VPN serves as a tunnel between your device and the network you
connect to securing your connection, encrypting the data using military-
grade encryption, and hiding your IP address wherever you are. Your
traffic is redirected through a separate server; thus making your device
impossible to be identified by your ISP, through the myriad of other
devices that are using our services. Moreover, while connected to the
internet via Bitdefender VPN, you are able to access content that is
normally restricted in specific areas.
Note
Some countries practice internet censorship and therefore the usage
of VPNs on their territory has been banned by law. To avoid legal
consequences, a warning message can appear when you try to use the
Bitdefender VPN app for the first time. By continuing using the app, you
confirm that you are aware of the applicable country regulations and
the risks to which you might be exposed.
To turn on Bitdefender VPN:
1. Tap the icon from the bottom of the screen.
2. Tap Connect each time you want to stay protected while connected to
unsecured wireless networks.
Tap Disconnect whenever you want to disable the connection.
Note
The first time you turn on VPN, you are prompted to allow Bitdefender
to set up VPN configurations that will monitor network traffic. Tap
Allow, to continue. If an authentication method (fingerprint or PIN
code) has been set to protect your smartphone, you are required to use
it.
4.6.1. Subscriptions
Bitdefender VPN offers for free a daily 200 MB traffic quota per device
to secure your connection every time you need, and connects you
automatically to the optimal server location.
To get unlimited traffic and unrestricted access to content worldwide by
choosing a server location at your will, upgrade to the premium version.
You can upgrade to the Bitdefender Premium VPN version anytime by
tapping the Activate Premium VPN button available in the VPN window.
There are two types of subscriptions to choose from: annual and monthly.
The Bitdefender Premium VPN subscription is independent from the
Bitdefender Mobile Security for iOS free subscription, meaning you will
be able to use it for its entire availability. In case the Bitdefender Premium
VPN subscription expires, your will be automatically reverted to the free
plan.
Bitdefender VPN is a cross-platform product, available in the Bitdefender
products compatible with Windows, macOS, Android, and iOS. Once you
upgrade to the premium plan, you will be able to use your subscription on
all products, provided that you login with the same Bitdefender account.
Note
Bitdefender VPN also works as a standalone application on all
supported operating systems, namely Windows, macOS, Android and
iOS.
5. VPN
Note
Some countries practice internet censorship and therefore the usage
of VPNs on their territory has been banned by law. To avoid legal
consequences, a warning message can appear when you try to use
the Bitdefender VPN feature for the first time. By continuing using
the feature, you confirm that you are aware of the applicable country
regulations and the risks to which you might be exposed.
Note
Server side set is much more restrictive and both Hydra client and
server will reject a mode different from GCM using AES. Hydra server
enforces server side priority of stronger ciphersuites and will reject TLS
handshake if weaker suite is requested by a client. This list is also
configurable in runtime on the server side.
VPN 235
Internal Use Only
Bitdefender Ultimate Security
VPN 236
Internal Use Only
Bitdefender Ultimate Security
5.3. Installation
5.3.1. Preparing for installation
Before you install Bitdefender VPN, complete these preparations to
ensure the installation will go smoothly:
❍ Make sure that the device where you plan to install Bitdefender meets
the system requirements. If the device does not meet all the system
requirements, Bitdefender will not be installed or, if installed, it will not
work properly and it will cause system slowdowns and instability.
VPN 237
Internal Use Only
Bitdefender Ultimate Security
Important
System performance may be affected on devices that have old
generation CPUs.
VPN 238
Internal Use Only
Bitdefender Ultimate Security
VPN 239
Internal Use Only
Bitdefender Ultimate Security
VPN 240
Internal Use Only
Bitdefender Ultimate Security
VPN 241
Internal Use Only
Bitdefender Ultimate Security
❍ For macOS
You can open the Bitdefender VPN app by clicking the icon from the
menu bar at the top right of the screen.
If the Bitdefender shield cannot be found in the menu bar, use your
Mac Launchpad or Finder to bring it back:
❍ From Launchpad
1. Press F4 on your keyboard to enter the Launchpad on your Mac.
2. Browse through the pages of installed apps until you locate the
Bitdefender VPN app. Alternatively, you can type Bitdefender
VPN in Launchpad to start filtering your results.
3. Once you see the Bitdefender VPN app, click on its icon to pin it
to the menu bar.
❍ From Finder
1. Click on Finder at the bottom left of the Dock (Finder is the icon
that looks like a blue square with a smiley face).
VPN 242
Internal Use Only
Bitdefender Ultimate Security
2. Next, click Go at the top left of the screen, on the menu bar.
3. Select Applications from the menu to enter the Applications
folder on your Mac.
4. From the Applications folder open the Bitdefender folder and
then double-click the Bitdefender VPN app.
Note
In order to access Bitdefender VPN on your Android or iOS mobile
devices, simply open the Bitdefender VPN application after you have
installed it.
VPN 243
Internal Use Only
Bitdefender Ultimate Security
VPN 244
Internal Use Only
Bitdefender Ultimate Security
❍ On macOS
1. Open the Bitdefender VPN app on your macOS device by clicking its
icon in the menu bar.
2. Click on the cogwheel button in the upper-right corner of the
Bitdefender VPN interface and select Settings.
❍ On Android
1. Open the Bitdefender VPN app on your device.
2. Tap on your account in the upper-right corner of the Bitdefender
VPN interface.
❍ On iOS
1. Open the Bitdefender VPN app on your device.
2. Tap on your account in the upper-right corner of the Bitdefender
VPN interface.
5.5.2. General
Here you can modify the following:
VPN 245
Internal Use Only
Bitdefender Ultimate Security
VPN 246
Internal Use Only
Bitdefender Ultimate Security
5.5.3. Features
Privacy
Internet Kill-Switch
The Kill-Switch is a feature implemented in Bitdefender VPN. When
enabled, this features temporarily suspends all Internet traffic if the VPN
connection accidentally drops. As soon as you are back online, the VPN
connection will be reestablished.
To activate the Kill-Switch, follow the steps below:
❍ On Windows & macOS
1. Open the Bitdefender VPN app on your device by double clicking its
icon in the system try or by right-clicking on it and selecting Show.
2. Click on the account button on the upper-right side of the interface.
3. Select Privacy.
4. Enable the Internet Kill-Switch option.
❍ On Android
1. Open the Bitdefender VPN app on your device.
2. Click on the account button in the upper-right corner of the
Bitdefender VPN interface.
3. Under Privacy, enable the Kill-Switch option.
❍ On iOS
1. Open the Bitdefender VPN app on your device.
2. Click on the account button in the upper-right corner of the
Bitdefender VPN interface.
3. Under Privacy, enable the Kill-Switch option.
Note
This feature is also available for macOS devices with operating systems
10.15.4 or later versions.
VPN 247
Internal Use Only
Bitdefender Ultimate Security
Ad blocker
The Ad blocker is used to block ads, popups, loud video ads or ad banners
while browsing. This helps websites load faster and be cleaner, as well as
safer to interact with.
To enable the Ad blocker:
1. Locate the Ad blocker and Antitracker feature in Settings - Privacy .
2. Toggle the switch to the ON position.
Anti-tracker
The Anti-tracker is used to block trackers set by advertisers to follow
and profile you online. Some websites may malfunction when blocking
trackers, but adding the URL to the Whitelist may fix this.
To enable the Anti-tracker:
1. Locate the Ad blocker and Antitracker feature in Settings - Privacy.
2. Toggle the switch to the ON position.
Whitelist
Some websites might not load properly if you block their tracker code and
ads. Adding the URLs of these specific domains to the whitelist can fix this
issue, but keep in mind that, while browsing on these websites, you will
see ads and their tracker code will be active.
Add websites you want to allow showing ads and using trackers by:
1. Locate the Ad blocker and Antitracker feature in Settings - Privacy.
2. Click on the Manage link. Then, go to the Whitelist section of the
window and click on its corresponding Manage link.
3. Click on Add website and insert the desired URL.
Auto-connect
While on the go, working in a coffee shop, or waiting at the airport,
connecting to a public wireless network for making payments, checking
VPN 248
Internal Use Only
Bitdefender Ultimate Security
emails or social network accounts can be the fastest solution. But prying
eyes trying to hijack your personal data can be there, watching how the
information leaks through the network.
To safeguard you against the perils of unsecured or unencrypted public
wireless hotspots, Bitdefender VPN includes an auto-connect feature.
This means that Bitdefender VPN can be automatically be activated
in certain situations, depending on your preferences and the operating
system you are running.
❍ On Windows the auto-connect feature can be enabled for the
following situations:
❍ Startup: Connect the VPN at Windows startup.
❍ Unsecured Wi-Fi: Use the VPN whenever you connect to public or
unsecured Wi-Fi networks.
❍ Peer-to-peer apps: Connect to the VPN when you start a peer-to-
peer file sharing app.
❍ Apps and domains: Always use the VPN for certain apps and
websites.
Note
1. Click the Manage link.
2. Browse to the location of the app for which you want to use
VPN, select the app name, then click Add.
VPN 249
Internal Use Only
Bitdefender Ultimate Security
Note
For each category, you can select a different server for the VPN
to connect to.
Advanced
Split tunneling
Virtual private network (VPN) split tunneling lets you route some of
your application or device traffic through an encrypted VPN, while
other applications or devices have direct access to the internet. This
is particularly useful if you want to benefit from services that perform
best when your location is known while also enjoying secure access to
potentially sensitive communications and data.
By enabling the Split tunneling feature, selected apps and websites will
bypass the VPN and access the Internet directly.
To manage the applications and websites that bypass the VPN:
1. Click the Manage link once the feature is enabled.
2. Click the Add button.
3. Browse to the location of the app in question or insert the URL of the
website desired, then click Add.
VPN 250
Internal Use Only
Bitdefender Ultimate Security
Note
By adding a website, the entire domain including all subdomains
will be bypassed.
Important
On macOS devices, the Split tunneling feature is available only for
websites.
VPN 251
Internal Use Only
Bitdefender Ultimate Security
Internet speed. App Traffic Optimizer lets you enjoy uninterrupted privacy
protection without compromising your connection speed.
Note
Alternatively, if you have recently opened the application you want
to prioritize, press the + button in the App Traffic Optimizer window.
Note
The App Traffic Optimizer is not available on macOS.
Protocol
Here you can choose the type of protocol you want to use for data
transfer. The following options are available:
VPN 252
Internal Use Only
Bitdefender Ultimate Security
❍ Automatic - Bitdefender VPN will select the optimal protocol for your
specific device and network.
❍ Hydra Catapult - Fast and secure, ideal for streaming and gaming.
❍ OpenVPN UDP - Optimized for fast speeds. However, this protocol is
not as reliable in terms of data loss as other protocols in the list.
❍ OpenVPN TCP - Designed for reliability. Ensures your data is delivered
entirely, but it is not as fast as OpenVPN UDP.
❍ Wireguard - Newer protocol, providing strong security and a high level
of performance.
Double-hop
With this feature you can manage the servers through which to send and
double-encrypt your internet traffic. Your data will pass through two VPN
servers instead of one, making it harder to track your internet activity.
Note
You can only add a total of 5 double-hop locations. However, you can
delete the custom double-hops in your list and create others at any
time.
Important
Using servers located on different continents in the same double-hop
may slow down your connection speed.
VPN 253
Internal Use Only
Bitdefender Ultimate Security
VPN 254
Internal Use Only
Bitdefender Ultimate Security
VPN 255
Internal Use Only
Bitdefender Ultimate Security
VPN 256
Internal Use Only
Bitdefender Ultimate Security
6. PASSWORD MANAGER
❍ Windows 10
❍ Windows 11
Note
Note that System Performance may be affected on devices that have
old generation CPUs.
Note
❍ Fingerprint unlock feature is supported on Android 6.0 and later.
❍ Autofill feature is supported on Android 8.0 and later, compatible
with iPhone, iPad and iPod touch.
Software Requirements
To be able to use Bitdefender Password Manager and all its features,
your Windows or macOS devices need to meet the following software
requirements:
❍ Microsoft Edge (based on Chromium 80 and later)
❍ Mozilla Firefox (version 65 or later)
❍ Google Chrome (version 72 or later)
❍ Safari (version 12 or later)
Note
The Sofware Requirements are not applicable for Android and iOS.
Warning
Failure to meet the System Requirements presented above will result
in either the inability of installing Bitdefender Password Manager or the
malfunctioning of the product.
6.2.2. Installation
This chapter will guide you on how to install Bitdefender Password
Manager to both the web browsers on your Windows PC and macOS, as
well as on your mobile Android or iOS devices.
Important
Prior to the installation, make sure that you have a valid Password
Manager subscription in your Bitdefender Central account so that this
browser extension can retrieve its validity from your account.
Active subscriptions are listed in the My Subscriptions section within
Bitdefender Central.
Microsoft Edge
❍ Click the Get button
❍ Click Add extension in the prompt that appears on screen
Google Chrome
❍ Click the Add to Chrome button
❍ In the confirmation box, click Add extension
Mozilla Firefox
❍ Click the Add to Firefox button
❍ Click the Install button in the upper right corner of the screen
Safari
❍ Click the Get button, then click Install
❍ Open Safari and select Preferences in the top menu bar
❍ In the Preferences window, click the Extensions tab
❍ Select the checkbox next to Password Manager to enable it
Once you have followed these steps, set a strong master password, then
press the Save Master Password button after you read and agree with the
Terms and conditions.
Important
Note that you will require this Master Password to unlock all the
passwords, credit card information and notes saved in Bitdefender
Password Manager. This is essentially the key that allows the owner
to use this product.
Warning
Upon creating the Master Password, you will receive a 24-digit
recovery key. Make a note of your recovery key in a safe place and
don’t lose it. This key is the only way to access your passwords saved
in Password Manager in the event that you happen to forget the Master
Password previously set up for your account.
❍ You can press Close when done.
Important
Note that you will require this Master Password to unlock all the
passwords, credit card information and notes saved in Bitdefender
Password Manager. This is essentially the key that allows the owner
to use this product.
Warning
Upon creating the Master Password, you will receive a 24-digit
recovery key. Make a note of your recovery key in a safe place and
don’t lose it. This key is the only way to access your passwords
saved in Password Manager in the event that you happen to forget
the Master Password previously set up for your account.
❍ You can press Close when done.
9. Create a 4-digit PIN, so if you switch to another app and then return
to Password Manager, you won’t have to re-enter the master password
you set up previously. If available, you can also enable face recognition
or fingerprint authentication.
10 Tap on Enable Autofill to configure Android autofill settings.
.
Note
If you skip this step, you can enable and customize the Android
autofill features at a later time by following the instructions
available at Intelligent Autofill (page 269).
Important
Note that you will require this Master Password to unlock all the
passwords, credit card information and notes saved in Bitdefender
Password Manager. This is essentially the key that allows the owner
to use this product.
Warning
Upon creating the Master Password, you will receive a 24-digit
recovery key. Make a note of your recovery key in a safe place and
don’t lose it. This key is the only way to access your passwords
saved in Password Manager in the event that you happen to forget
the Master Password previously set up for your account.
❍ You can press Close when done.
9. Create a 4-digit PIN, so if you switch to another app and then return
to Password Manager, you won’t have to re-enter the master password
you set up previously. If available, you can also enable face recognition
or fingerprint authentication.
The installation on your iOS / iPadOS device is now complete!
6.3.1. Compatibility
Bitdefender Password Manager can seamlessly transfer data from the
following list of applications:
❍ 1Password
❍ Bitwarden
❍ Bitdefender Password Manager
❍ ByePass
❍ Chrome browser
❍ Claro
❍ Dashlane
❍ Edge browser
❍ ESET Password Manager v2
❍ ESET Password Manager v3
❍ StickyPassword
❍ Watchguard
❍ Firefox browser
❍ Gestor de contraseñas – Claro
❍ Gestor de contraseñas – SIT
❍ Gestor de contraseñas – Telnor
❍ KeePass 2.x
❍ LastPass
❍ Panda Dome Passwords
❍ PassWatch
❍ Saferpass
❍ SFR Cybersécurité
❍ SIT
❍ F-Secure
❍ Telnor
Note
If the name of the browser or password manager tool from which
you are trying to transfer data files is not mentioned in the list
provided above, you can follow our online guide on how users can
edit a CSV file from unsupported password managers so that you can
import your information into Bitdefender Password Manager: https://
www.bitdefender.com/consumer/support/answer/2472/
This transfer of data between Bitdefender Password Manager and other
account management software can be done through the following data
formats:
CSV, JSON, XML, TXT, 1pif and FSK.
1. Click the Password Manager icon in your web browser (on Windows or
macOS) or launch the Password Manager application (on Android or
iOS). If prompted, enter your Master Password.
2. Open the Password Manager menu to expand the sidebar on the left
and click the Settings menu item.
3. Scroll down to the Data section and click on the Import Data option.
4. Use the drop-down menu to select the name of the password manager
app or browser you want to import your accounts from. Input your
Master Password in the corresponding field, then click on Choose File.
5. Browse through your folders to find the location in which you have
saved the file containing your usernames and passwords, exported
from your other password manager or web browser, then press
Continue.
Once imported, your passwords will then be accessible on all devices
where Bitdefender Password Manager application or browser extension is
installed.
Important
A CSV file is not encrypted and contains usernames and passwords
in plain text format, meaning your private information can be read by
anyone having access to your device. We therefore recommend you
follow the instructions below on a trusted device.
Here is how you can export your data from Bitdefender Password
Manager:
1. Click the Password Manager icon in your web browser (on Windows or
macOS) or launch the Password Manager application (on Android or
iOS). If prompted, enter your Master Password.
2. Open the Password Manager menu to expand the sidebar on the left
and click the Settings menu item.
3. Scroll down to the Data section and click on the Export Data option.
4. Now you should be prompted with the following two options:
❍ CSV
❍ Password-protected files
Select your preferred option, then input your Master Password, and
click the Export data button.
Note
If you pick the password-protected file option, you will be asked to
encrypt the data containing the accounts list with a password, so
this way only you would be able to access it if needed.
Password Generator
The golden rule in regards to online security is to always use unique
random passphrases for every service that requires account creation.
Password reuse across multiple platforms is the number one reason
behind identity theft and losses associated with hostile account takeover.
This feature helps users with generating secure, complex, and unique
passwords for every new account they create anywhere online. This
eliminates the need for users to come up with strong passwords on
their own or being careful not to reuse the same password for multiple
accounts.
The Password Generator can be accessed through the tab on the top
of the Password Manager interface.
The generator can be set to return passwords between 4 and 32
characters.
You can also specify the types of characters that should or should
not be present in the randomly generated password by checking
or unchecking the corresponding tick boxes. (Lowercase, Uppercase,
Numbers, Special)
Note
Your previously generated passwords will be temporarily stored in
Password history, which can be accessed through the Password
history button.
Password Capturing
With this feature within Password Manager, you will be prompted to store
all of your new passwords immediately after creating them. Password
Manager will prompt users to store their newly created passwords, so that
they may be added to the ultra-safe environment provided by Bitdefender
right away.
Intelligent Autofill
Bitdefender Password Manager can be set up in such a way that it
can autofill your login credentials and most importantly passwords.
Proprietary algorithms can detect and pre-fill credentials on previously
visited websites, saving the users’ time every time they log in to a service.
1. On Windows or macOS, click on the Password Manager icon in your
web browser.
On Android or iOS, launch the Password Manager application.
If prompted, enter your Master Password.
2. Open the Password Manager menu to expand the sidebar on the left
and click the Settings menu item.
3. Click on Device Settings.
4. Here you will notice a button displaying either Disable Auto-Fill or
Enable Auto-Fill. This setting controls the operating state of the
intelligent autofill feature.
Security Report
The Security Report is a tool that will generate reports based on a number
of features meant to bolster your digital security. It will let you know if
a password requires your immediate attention by determining its level of
security. It will detect password duplicates and prompt you to change
them accordingly, avoiding the dangers of recycling the same passwords
for multiple accounts.
The report will concentrate on providing you with information on your
overall password hygiene: this refers to duplicate passwords, weak or
otherwise leaked passwords or email addresses.
This is done by comparing the list of encrypted hashes from Troy’s
webpage locally on your device to check if it contains the corresponding
Note
Bitdefender is also equipped with an offline mode to access your
passwords, in the event that you happen to not have access to the
internet. This makes your passwords accessible at all times and from
anywhere.
Deleting an entry
To delete saved passwords first press the edit icon next to the entry you
want to remove, located in the Accounts tab. Scroll down then choose
Delete. When asked if you are sure you want to remove the account select
Remove.
Important
If you do not remember the current master password, click the
I’ve forgotten my password option on the same screen. Enter
the 24-digit Recovery Key provided during the initial Bitdefender
Password Manager setup, then type a new master password. If you
forget or misplace both the Master Password and the Recovery
Key, as a last resort, contact a Bitdefender representative to help
reset your account. Resetting your account will erase all your data
and passwords saved in Bitdefender Password Manager.
3. Open the Password Manager menu to expand the sidebar on the left
and click the Settings menu item.
4. Click on the My account button in the Account section.
5. A window with information about your Password Manager subscription
will be displayed.
2. Open the Password Manager menu to expand the sidebar on the left
and click the Credit cards menu item.
3. Press on the Add Identity button at the bottom.
4. Complete the details you want stored then press Save.
Secure Me
The Secure Me feature allows you to remotely log out or delete browsing
history of your computer, tablet or mobile device. If you’re sharing a
device with other people, we strongly recommend you turn this feature
on.
To locate and enable this feature:
2. Open the Password Manager menu to expand the sidebar on the left
and click the Secure Me menu item.
3. Press on the Secure all sessions button.
If you are looking to secure only a particular device, look for it in the
list of devices on which Password Manager is installed or enabled on a
specific browser.
Notes
Secure Notes is a feature that acts just like a secret notebook where you
can store sensitive data, sort it and use color coding to better visualize
it. Not only does it keep information tidy, but you also keep it safe and
secure.
To locate and enable this feature:
1. On Windows or macOS, click on the Password Manager icon in your
web browser.
On Android or iOS, launch the Password Manager application.
If prompted, enter your Master Password.
2. Open the Password Manager menu to expand the sidebar on the left
and click the Notes menu item.
3. Press on the ⨁ Add note button.
Once you have written down the information you want to safekeep,
press Save.
make sure you type it correctly and the Caps Lock key is not active on the
keyboard.
If you forget the master password, you can always use the Recovery Key
to unlock Password Manager. During the sign-up process, Bitdefender
Password Manager provides a recovery key that can be used to regain
access to the account without losing your data.
If you forget or misplace both the Master Password and the Recovery
Key, as a last resort, contact a Bitdefender representative to reset your
account.
Important
Resetting your account will erase all your data and passwords saved in
Bitdefender Password Manager.
Can multiple users share one Bitdefender Password Manager
subscription?
For now, the ability to have multiple users on the same Password Manager
subscription is not available but we are working on enabling this feature in
the near future.
What is Offline mode and how does it work?
Offline mode is automatically activated when the Internet connection
drops while using Bitdefender Password Manager. If you are already
signed in and have entered your master password, Offline mode lets you
access your passwords when an Internet connection is out of reach.
How do I uninstall Bitdefender Password Manager?
To uninstall Bitdefender Password Manager:
❍ On Windows and macOS:
Remove the Password Manager extension from your web browser.
Right-click on the Bitdefender icon and select “Remove”.
❍ On Android:
Tap and hold the Password Manager app, then drag it to the top of the
screen where it says “Uninstall”.
❍ On iOS & iPadOS:
Tap and hold the Password Manager app until all apps on your screen
begin wiggling, then tap the X to the top left of the Bitdefender icon.
Note
Bitdefender does not store or process personally identifiable
information. Only references to potential data breaches are kept,
without including sensitive data.
5. Type your first name, middle name (if any) and last name in their
corresponding boxes, then click NEXT.
6. Type your email address, then click NEXT.
Make sure it is a valid email address you can access.
7. A security code is sent to the address you provided.
Open your email, copy the code and paste it in its corresponding field.
After that, click CHECK.
8. Select your country and enter your phone number, then click NEXT.
9. You should receive a security code shortly after that.
Enter the code, then select CHECK.
10 After the initial check is performed, click FINISH.
.
Note
You will be informed if any breaches, personally identifiable information
or potential impersonation attempts are discovered during this first
check.
Bitdefender Digital Identity Protection is now configured.
If you would like to add another email address or another phone number,
click , then click on ADD EMAIL ADDRESS or ADD PHONE NUMBER
and follow the instructions.
7.3. Dashboard
The Dashboard aggregates information included in the DIGITAL
FOOTPRINT, DATA BREACHES and IMPERSONATION CHECK sections.
It includes the following:
❍ Your exposed data and their web sources
❍ The average amount of exposed data for the entire community
❍ Your Digital Footprint evolution
❍ Privacy-related content
❍ Data Breaches
❍ The average number of data breaches inside the community
Note
Every piece of information confirmed is added to our monitoring
algorithm, improving the results displayed by our services. Information
that is dismissed will no longer be displayed. However, it will still
remain available on the web.
Note
Bitdefender does not store or process personally identifiable
information. Only references to potential data breaches are kept,
without including sensitive data.
7.7. Education
The Education tab serves as a knowledge base where the user can find
more information on how to protect their digital identity.
Articles listed here can be sorted into several categories:
❍ Breaches
❍ Exposures
❍ Impersonation Check
To access the full version of an article, click on its corresponding Read
more link.
online can be exposed to data breaches. You need to be aware at all times
about the way your private and financial data is stored and handled - and
take the necessary steps to protect it.
What are data breaches and how do they impact my personal
accounts?
Data breaches are security incidents when private data is leaked to
unsafe environments. These can be exploited by cybercriminals all around
the globe to gain access to your online identity. Data breaches can
impact your credit score, medical insurance, college funds, or even your
retirement account.
How can Bitdefender Digital Identity Protection help with my online
privacy?
Bitdefender Digital Identity Protection continuously monitors your
personal information and alerts you in real time in case of a data breach.
This way you can change your passwords and secure your accounts to
prevent any financial loss or social media impersonations.
Where does Bitdefender Digital Identity Protection look for data?
Bitdefender Digital Identity Protection looks for data on the surface web
(social media networks, posts, blogs, forums, data brokers, publications,
offline databases) but also on the Dark Web marketplaces, where
cybercriminals trade information gathered from data breaches.
How is Bitdefender Digital Identity Protection different from other
(free) services?
Bitdefender Digital Identity Protection has unparalleled capabilities of
monitoring considerable volumes and higher quality of data from the Dark
Web. The information from the Dark Web is curated and de-duplicated so
we can reduce false positive alerts.
How can I use the service? Do I have to download anything?
You do not have to download anything, as Bitdefender Digital Identity
Protection is an online service. You gain access to a web dashboard where
you can monitor all your personal accounts in real-time.
How can I receive alerts for future data breaches?
To receive alerts for future data breaches you simply sign up for e-mail
alerts from your web dashboard and you will start to receive privacy alerts
and security reports from Bitdefender Digital Identity Protection.
8. GETTING HELP
GLOSSARY
Activation code
Is a unique key that can be bought from retail and used to activate a
specific product or service. An activation code enables the activation of a
valid subscription for a certain period of time and number devices and can
also be used to extend a subscription with the condition to be generated
for the same product or service.
ActiveX
ActiveX is a model for writing programs so that other programs and the
operating system can call them. ActiveX technology is used with Microsoft
Internet Explorer to make interactive webpages that look and behave like
computer programs, rather than static pages. With ActiveX, users can ask
or answer questions, use push buttons, and interact in other ways with
the webpage. ActiveX controls are often written using Visual Basic. Active
X is notable for a complete lack of security controls; computer security
experts discourage its use over the internet.
Advanced persistent threat
Advanced persistent threat (APT) exploits vulnerabilities of systems to
steal important information to deliver it to the source. Big groups such as
organizations, companies, or governments, are targeted by this threat. The
objective of an advanced persistent threat is to remain undetected for a
long time being able to monitor and gather important information without
damaging the targeted machines. The method used to inject the threat
into the network is through a PDF file or an Office document that look
harmless so that every user can run the files.
Adware
Adware is often combined with a host app that is provided at no charge
as long as the user agrees to accept the adware. Because adware apps
are usually installed after the user has agreed to a licensing agreement
that states the purpose of the app, no offense is committed. However,
pop-up advertisements can become an annoyance, and in some cases
degrade system performance. Also, the information that some of these
apps collect may cause privacy concerns for users who were not fully
aware of the terms in the license agreement.
Glossary 289
Internal Use Only
Bitdefender Ultimate Security
Archive
A disk, tape, or directory that contains files that have been backed up.
A file that contains one or more files in a compressed format.
Backdoor
A hole in the security of a system deliberately left in place by designers or
maintainers. The motivation for such holes is not always sinister; some
operating systems, for example, come out of the box with privileged
accounts intended for use by field service technicians or the vendor's
maintenance programmers.
Boot sector
A sector at the beginning of each disk that identifies the disk's
architecture (sector size, cluster size, and so on). For startup disks, the
boot sector also contains a program that loads the operating system.
Boot virus
A threat that infects the boot sector of a fixed or floppy disk. An attempt to
boot from a diskette infected with a boot sector virus will cause the threat
to become active in memory. Every time you boot your system from that
point on, you will have the threat active in memory.
Botnet
The term “botnet” is composed of the words “robot” and “network”.
Botnets are internet-connected devices infected with threats and can
be used to send spam emails, steal data, remotely control vulnerable
devices, or spread spyware, ransomware, and other kinds of threats. Their
objective is to infect as many connected devices as possible, such as PCs,
servers, mobile or IoT devices belonging to big companies or industries.
Browser
Short for web browser, a software app used to locate and display
webpages. Popular browsers include Microsoft Internet Explorer, Mozilla
Firefox and Google Chrome. These are graphical browsers, which means
that they can display graphics as well as text. In addition, most modern
browsers can present multimedia information, including sound and video,
though they require plug-ins for some formats.
Glossary 290
Internal Use Only
Bitdefender Ultimate Security
Glossary 291
Internal Use Only
Bitdefender Ultimate Security
Glossary 292
Internal Use Only
Bitdefender Ultimate Security
Honeypot
A decoy computer system set to attract hackers to study the way they act
and identify the heretical methods they use to collect system information.
Companies and corporations are more interested in implementing and
using honeypots to improve their overall state of security.
IP
Internet Protocol - A routable protocol in the TCP/IP protocol suite that
is responsible for IP addressing, routing, and the fragmentation and
reassembly of IP packets.
Java applet
A Java program which is designed to run only on a webpage. To use an
applet on a webpage, you would specify the name of the applet and the
size (length and width, in pixels) that the applet can utilize. When the
webpage is accessed, the browser downloads the applet from a server
and runs it on the user's machine (the client). Applets differ from apps in
that they are governed by a strict security protocol.
For example, even though applets run on the client, they cannot read
or write data onto the client's machine. Additionally, applets are further
restricted so that they can only read and write data from the same domain
that they are served from.
Keylogger
A keylogger is an app that logs anything you type. Keyloggers are not
malicious in nature. They can be used for legitimate purposes, such as
monitoring employees or children activity. However, they are increasingly
being used by cyber-criminals for malicious purposes (for example,
to collect private data, such as login credentials and social security
numbers).
Macro virus
A type of computer threat that is encoded as a macro embedded in
a document. Many apps, such as Microsoft Word and Excel, support
powerful macro languages. These apps allow you to embed a macro in
a document, and have the macro execute each time the document is
opened.
Mail client
An email client is an app that enables you to send and receive email.
Glossary 293
Internal Use Only
Bitdefender Ultimate Security
Memory
Internal storage areas in the computer. The term memory identifies data
storage that comes in the form of chips, and the word storage is used
for memory that exists on tapes or disks. Every computer comes with a
certain amount of physical memory, usually referred to as main memory
or RAM.
Non-heuristic
This method of scanning relies on specific threat information database.
The advantage of the non-heuristic scan is that it is not fooled by what
might seem to be a threat, and does not generate false alarms.
Online predators
Individuals who seek to attract minors or adolescents into conversations
on purpose to involve them into illegal sexual activities. Social networks
are the ideal place where vulnerable children can easily be hunted and
seduced into committing sexual activities, online or face-to-face.
Packed programs
A file in a compression format. Many operating systems and apps contain
commands that enable you to pack a file so that it takes up less memory.
For example, suppose you have a text file containing ten consecutive
space characters. Normally, this would require ten bytes of storage.
However, a program that packs files would replace the space characters
by a special space-series character followed by the number of spaces
being replaced. In this case, the ten spaces would require only two bytes.
This is just one packing technique - there are many more.
Path
The exact directions to a file on a computer. These directions are usually
described by means of the hierarchical filing system from the top down.
The route between any two points, such as the communications channel
between two computers.
Phishing
The act of sending an email to a user falsely claiming to be an established
legitimate enterprise in an attempt to scam the user into surrendering
private information that will be used for identity theft. The email directs
the user to visit a website where they are asked to update personal
information, such as passwords and credit card, social security, and
Glossary 294
Internal Use Only
Bitdefender Ultimate Security
bank account numbers, that the legitimate organization already has. The
website, however, is bogus and set up only to steal the user’s information.
Photon
Photon is an innovative non-intrusive Bitdefender technology, designed to
minimize the performance impact of your security solution. By monitoring
your PC’s activity in the background, it creates usage patterns that help
optimize booting and scanning processes.
Polymorphic virus
A threat that changes its form with each file it infects. Since they have no
consistent binary pattern, such threats are hard to identify.
Port
An interface on a computer to which you can connect a device. Personal
computers have various types of ports. Internally, there are several ports
for connecting disk drives, display screens, and keyboards. Externally,
personal computers have ports for connecting modems, printers, mice,
and other peripheral devices.
In TCP/IP and UDP networks, an endpoint to a logical connection. The port
number identifies what type of port it is. For example, port 80 is used for
HTTP traffic.
Ransomware
Ransomware is a malicious program that tries to make money from
users by locking their vulnerable systems. CryptoLocker, CryptoWall, and
TeslaWall, are only some variants that hunt personal systems of users.
The infection can be spread by accessing spam emails, downloading email
attachments, or installing apps, without letting the user know about what
is happening on his system. Daily users and companies are targeted by
ransomware hackers.
Report file
A file that lists actions that have occurred. Bitdefender maintains a report
file listing the path scanned, the folders, the number of archives and files
scanned, how many infected and suspicious files were found.
Rootkit
A rootkit is a set of software tools which offer administrator-level access
to a system. The term was first used for the UNIX operating systems and
Glossary 295
Internal Use Only
Bitdefender Ultimate Security
Glossary 296
Internal Use Only
Bitdefender Ultimate Security
system resources, the apps running in the background can lead to system
crashes or general system instability.
Startup items
Any files placed in this folder will open when the computer starts. For
example, a startup screen, a sound file to be played when the computer
first starts, a reminder calendar, or apps can be startup items. Normally,
an alias of a file is placed in this folder rather than the file itself.
Subscription
Purchase agreement that gives the user the right to use a particular
product or service on a specific number of devices and for a certain period
of time. An expired subscription can be automatically renewed using the
information provided by the user at the first purchase.
System tray
Introduced with Windows 95, the system tray is located in the Windows
taskbar (usually at the bottom next to the clock) and contains miniature
icons for easy access to system functions such as fax, printer, modem,
volume, and more. Double click or right-click an icon to view and access
the details and controls.
TCP/IP
Transmission Control Protocol/Internet Protocol - A set of networking
protocols widely used on the internet that provides communications
across interconnected networks of computers with diverse hardware
architectures and various operating systems. TCP/IP includes standards
for how computers communicate and conventions for connecting
networks and routing traffic.
Threat
A program or piece of code that is loaded onto your computer without
your knowledge and runs against your will. Most threats can also replicate
themselves. All computer threats are manmade. A simple threat that can
copy itself over and over again is relatively easy to produce. Even such
a simple threat is dangerous because it will quickly use all available
memory and bring the system to a halt. An even more dangerous type of
threat is one capable of transmitting itself across networks and bypassing
security systems.
Glossary 297
Internal Use Only
Bitdefender Ultimate Security
Glossary 298