BitDefender Internet Security 2010 User Manual

User's guide
Copyright© 2010 BitDefender
BitDefender Internet Security 2010
BitDefender Internet Security 2010
User's guide
Published 2010.04.07
Copyright© 2010 BitDefender
Legal Notice
All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without written permission from an authorized representative of BitDefender. The inclusion of brief quotations in reviews may be possible only with the mention of the quoted source. The content can not be modified in any way.
Warning and Disclaimer. This product and its documentation are protected by copyright. The information in this document is provided on an “as is” basis, without warranty. Although every precaution has been taken in the preparation of this document, the authors will not have any liability to any person or entity with respect to any loss or damage caused or alleged to be caused directly or indirectly by the information contained in this work.
This book contains links to third-party Websites that are not under the control of BitDefender, therefore BitDefender is not responsible for the content of any linked site. If you access a third-party website listed in this document, you will do so at your own risk. BitDefender provides these links only as a convenience, and the inclusion of the link does not imply that BitDefender endorses or accepts any responsibility for the content of the third-party site.
Trademarks. Trademark names may appear in this book. All registered and unregistered trademarks in this document are the sole property of their respective owners, and are respectfully acknowledged.
BitDefender Internet Security 2010
Each man has his price Bob And yours was pretty low
BitDefender Internet Security 2010

Table of Contents

End User Software License Agreement . .. . . . . . . . . . . . . . . . .. .. .. . . . . . . . . . . . . . xi
Preface . . . . . .. .. .. . . . . . . . . . . . . . . . .. .. .. . . . . . . . . . . . . . .. .. .. .. . . . . . . . . . . . . . .. .. xvi
1. Conventions Used in This Book . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvi
1.1. Typographical Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvi
1.2. Admonitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvi
2. Book Structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvii
3. Request for Comments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xviii
Installation and Removal .............................................. 1
1. System Requirements . . . . .. .. .. . . . . . . . . . . . . . . . .. .. .. . . . . . . . . . . . . . .. .. .. 2
1.1. Minimal System Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.2. Recommended System Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.3. Supported Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
2. Preparing for Installation . . .. .. .. . . . . . . . . . . . . . . . .. .. .. . . . . . . . . . . . . . .. .. . 4
3. Installing BitDefender ... . . . . . . . . . . . . . .. .. .. . . . . . . . . . . . . . . . .. .. .. . . . . . . . 5
3.1. Registration Wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
3.1.1. Step 1 - Register BitDefender Internet Security 2010 . . . . . . . . . . . . . . . . . . . 9
3.1.2. Step 2 - Create a BitDefender Account . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
3.2. Configuration Wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
3.2.1. Step 1 - Select Usage Profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
3.2.2. Step 2 - Describe Computer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
3.2.3. Step 3 - Select User Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
3.2.4. Step 4 - Configure Parental Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
3.2.5. Step 5 - Configure BitDefender Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
3.2.6. Step 6 - Select the Tasks to Be Run . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
3.2.7. Step 7 - Finish . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
4. Upgrade .. . .. .. .. . . . . . . . . . . . . . . . .. .. .. . . . . . . . . . . . . . . . .. .. .. . . . . . . . . . . . . 19
5. Repairing or Removing BitDefender . . . . . . . . . . . . . . .. .. .. . . . . . . . . . . . . . 20
Getting Started ......................................................... 21
6. Overview .. . . . . . . . .. .. .. . . . . . . . . . . . . . .. .. .. . . . . . . . . . . . . . . . .. .. .. . . . . . . . 22
6.1. Opening BitDefender . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
6.2. User Interface View Modes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
6.2.1. Novice Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
6.2.2. Intermediate Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
6.2.3. Expert Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
6.3. System Tray Icon . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
6.4. Scan Activity Bar . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
6.4.1. Scan Files and Folders . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
6.4.2. Disable/Restore Scan Activity Bar . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
6.5. BitDefender Manual Scan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
6.6. Game Mode and Laptop Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
iv
BitDefender Internet Security 2010
6.6.1. Game Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
6.6.2. Laptop Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
6.7. Automatic Device Detection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
7. Fixing Issues . . . . . . . . . . .. .. .. . . . . . . . . . . . . . .. .. .. . . . . . . . . . . . . . . . .. .. .. . . . 37
7.1. Fix All Issues Wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
7.2. Configuring Issue Tracking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
8. Configuring Basic Settings ... .. .. . . . . . . . . . . . . . . . .. .. .. . . . . . . . . . . . . . .. 40
8.1. User Interface Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
8.2. Security Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
8.3. General Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
9. History and Events . . . . . . . . . . . . . . . .. .. .. . . . . . . . . . . . . . . . .. .. .. . . . . . . . . . . 45
10. Registration and My Account .. . . . . . . . . . .. .. .. . . . . . . . . . . . . . . . .. .. .. . 47
10.1. Registering BitDefender Internet Security 2010 . . . . . . . . . . . . . . . . . . . . . . . . . . 47
10.2. Activating BitDefender . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
10.3. Purchasing License Keys . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
10.4. Renewing Your License . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
11. Wizards . . . . . . . . . .. .. .. . . . . . . . . . . . . . . . .. .. .. . . . . . . . . . . . . . . . .. .. .. . . . . . . 52
11.1. Antivirus Scan Wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
11.1.1. Step 1/3 - Scanning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
11.1.2. Step 2/3 - Select Actions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
11.1.3. Step 3/3 - View Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
11.2. Custom Scan Wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
11.2.1. Step 1/6 - Welcome Window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
11.2.2. Step 2/6 - Select Target . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
11.2.3. Step 3/6 - Select Actions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
11.2.4. Step 4/6 - Additional Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
11.2.5. Step 5/6 - Scanning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
11.2.6. Step 6/6 - View Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
11.3. Vulnerability Check Wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
11.3.1. Step 1/6 - Select Vulnerabilities to Check . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
11.3.2. Step 2/6 - Checking for Vulnerabilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
11.3.3. Step 3/6 - Update Windows . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
11.3.4. Step 4/6 - Update Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
11.3.5. Step 5/6 - Change Weak Passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
11.3.6. Step 6/6 - View Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70
11.4. File Vault Wizards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70
11.4.1. Add Files to Vault . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
11.4.2. Remove Vault Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
11.4.3. View File Vault . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
11.4.4. Lock File Vault . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
Intermediate Mode .................................................... 89
12. Dashboard . . . . . . . . . . . . . .. .. .. . . . . . . . . . . . . . . . .. .. .. . . . . . . . . . . . . . . . .. .. 90
13. Security ... . . . . . . . . . . . . . .. .. .. . . . . . . . . . . . . . . . .. .. .. . . . . . . . . . . . . . .. .. .. 92
13.1. Status Area . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
v
BitDefender Internet Security 2010
13.1.1. Configuring Status Tracking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
13.2. Quick Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
13.2.1. Updating BitDefender . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
13.2.2. Scanning with BitDefender . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
13.2.3. Searching for Vulnerabilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
14. Parental .. . . . . . . . . . . . . . .. .. .. . . . . . . . . . . . . . . . .. .. .. . . . . . . . . . . . . . . . .. .. . 98
14.1. Status Area . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
14.2. Quick Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
14.2.1. Updating BitDefender . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
14.2.2. Scanning with BitDefender . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
15. File Vault . . . . . . . . . . . . .. .. .. . . . . . . . . . . . . . . . .. .. .. . . . . . . . . . . . . . .. .. .. . . 101
15.1. Status Area . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102
15.2. Quick Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102
16. Network . . . . . . . . .. .. .. . . . . . . . . . . . . . .. .. .. . . . . . . . . . . . . . . . .. .. .. . . . . . . . 103
16.1. Quick Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
16.1.1. Joining the BitDefender Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104
16.1.2. Adding Computers to the BitDefender Network . . . . . . . . . . . . . . . . . . . . . 104
16.1.3. Managing the BitDefender Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106
16.1.4. Scanning All Computers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108
16.1.5. Updating All Computers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109
16.1.6. Registering All Computers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110
Expert Mode ........................................................... 111
17. General . . . . . . . . . .. .. .. . . . . . . . . . . . . . . . .. .. .. . . . . . . . . . . . . . .. .. .. . . . . . . 112
17.1. Dashboard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112
17.1.1. Overall Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113
17.1.2. Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115
17.1.3. Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116
17.2. Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116
17.2.1. General Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117
17.2.2. Virus Report Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
17.3. System Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
18. Antivirus . . . . . . . . . . . . . . . . .. .. .. . . . . . . . . . . . . . . . .. .. .. . . . . . . . . . . . . . .. .. 121
18.1. Real-time Protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121
18.1.1. Configuring Protection Level . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122
18.1.2. Customizing Protection Level . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
18.1.3. Configuring Active Virus Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127
18.1.4. Disabling Real-time Protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130
18.1.5. Configuring Antiphishing Protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130
18.2. On-demand Scanning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131
18.2.1. Scan Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132
18.2.2. Using Shortcut Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134
18.2.3. Creating Scan Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135
18.2.4. Configuring Scan Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135
18.2.5. Scanning Files and Folders . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146
18.2.6. Viewing Scan Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154
vi
BitDefender Internet Security 2010
18.3. Objects Excluded from Scanning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155
18.3.1. Excluding Paths from Scanning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157
18.3.2. Excluding Extensions from Scanning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160
18.4. Quarantine Area . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164
18.4.1. Managing Quarantined Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165
18.4.2. Configuring Quarantine Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 166
19. Antispam . . .. .. .. . . . . . . . . . . . . . . . .. .. .. . . . . . . . . . . . . . .. .. .. .. . . . . . . . . . 168
19.1. Antispam Insights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 168
19.1.1. Antispam Filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 168
19.1.2. Antispam Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170
19.1.3. Antispam Updates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171
19.2. Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171
19.2.1. Setting the Protection Level . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172
19.2.2. Configuring the Friends List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173
19.2.3. Configuring the Spammers List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175
19.3. Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177
19.3.1. Antispam Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178
19.3.2. Basic Antispam Filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179
19.3.3. Advanced Antispam Filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179
20. Parental Control . . . . . . . . . . . . . . .. .. .. . . . . . . . . . . . . . .. .. .. . . . . . . . . . . . . . 180
20.1. Configuring Parental Control For A User . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 181
20.1.1. Protecting Parental Control Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183
20.1.2. Setting Age Category . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 184
20.2. Monitoring Children Activity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186
20.2.1. Checking Visited Websites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187
20.2.2. Configuring E-mail Notifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187
20.3. Web Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 188
20.3.1. Creating Web Control Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189
20.3.2. Managing Web Control Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 190
20.4. Web Time Limiter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 190
20.5. Applications Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191
20.5.1. Creating Application Control Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192
20.5.2. Managing Application Control Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193
20.6. Keywords Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194
20.6.1. Creating Keywords Control Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194
20.6.2. Managing Keywords Control Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195
20.7. Instant Messaging (IM) Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195
20.7.1. Creating Instant Messaging (IM) Control Rules . . . . . . . . . . . . . . . . . . . . . . 196
20.7.2. Managing Instant Messaging (IM) Control Rules . . . . . . . . . . . . . . . . . . . . 197
21. Privacy Control .. . . . . . . . .. .. .. . . . . . . . . . . . . . . . .. .. .. . . . . . . . . . . . . . .. .. 198
21.1. Privacy Control Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 198
21.1.1. Configuring Protection Level . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 199
21.2. Identity Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 199
21.2.1. Creating Identity Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201
21.2.2. Defining Exclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 204
21.2.3. Managing Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205
21.2.4. Rules Defined by Other Administrators . . . . . . . . . . . . . . . . . . . . . . . . . . . . 206
21.3. Registry Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 206
vii
BitDefender Internet Security 2010
21.4. Cookie Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208
21.4.1. Configuration Window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 210
21.5. Script Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 212
21.5.1. Configuration Window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213
22. Firewall .. . . . . . . . . . .. .. .. . . . . . . . . . . . . . . . .. .. .. . . . . . . . . . . . . . . . .. .. .. . . . 215
22.1. Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 215
22.1.1. Setting the Default Action . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 216
22.1.2. Configuring Advanced Firewall Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . 217
22.2. Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 219
22.2.1. Changing the Trust Level . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 220
22.2.2. Configuring the Stealth Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 220
22.2.3. Configuring Generic Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 221
22.2.4. Network Zones . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 221
22.3. Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 222
22.3.1. Adding Rules Automatically . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 224
22.3.2. Deleting and Reseting Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 224
22.3.3. Creating and Modifying Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 224
22.3.4. Advanced Rule Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 228
22.4. Connection Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229
23. Vulnerability . .. .. .. . . . . . . . . . . . . . . . .. .. .. . . . . . . . . . . . . . . . .. .. .. . . . . . . . 231
23.1. Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231
23.1.1. Fixing Vulnerabilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 232
23.2. Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 232
24. Encryption .. . . . . . . . . . . . . . .. .. .. . . . . . . . . . . . . . . . .. .. .. . . . . . . . . . . . . . . . . 234
24.1. Instant Messaging (IM) Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234
24.1.1. Disabling Encryption for Specific Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235
24.2. File Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 236
24.2.1. Creating a Vault . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 237
24.2.2. Opening a Vault . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239
24.2.3. Locking a Vault . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239
24.2.4. Changing Vault Password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 240
24.2.5. Adding Files to a Vault . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 241
24.2.6. Removing Files from a Vault . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 241
25. Game / Laptop Mode . . . . . . . . . . . . . . .. .. .. . . . . . . . . . . . . . . . .. .. .. . . . . . . 243
25.1. Game Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 243
25.1.1. Configuring Automatic Game Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 244
25.1.2. Managing the Game List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 245
25.1.3. Configuring Game Mode Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 246
25.1.4. Changing Game Mode Hotkey . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 247
25.2. Laptop Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 247
25.2.1. Configuring Laptop Mode Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 248
26. Home Network .. . . . . . . . . . .. .. .. . . . . . . . . . . . . . . . .. .. .. . . . . . . . . . . . . . .. 249
26.1. Joining the BitDefender Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 249
26.2. Adding Computers to the BitDefender Network . . . . . . . . . . . . . . . . . . . . . . . . . 250
26.3. Managing the BitDefender Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 252
27. Update .. . .. .. .. .. . . . . . . . . . . . . . .. .. .. . . . . . . . . . . . . . . . .. .. .. . . . . . . . . . . . 255
viii
BitDefender Internet Security 2010
27.1. Automatic Update . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 255
27.1.1. Requesting an Update . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 256
27.1.2. Disabling Automatic Update . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 257
27.2. Update Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 257
27.2.1. Setting Update Locations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 258
27.2.2. Configuring Automatic Update . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 259
27.2.3. Configuring Manual Update . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 259
27.2.4. Configuring Advanced Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 259
27.2.5. Managing Proxies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 260
28. Registration . . .. .. .. . . . . . . . . . . . . . . . .. .. .. . . . . . . . . . . . . . .. .. .. .. . . . . . . . 262
28.1. Registering BitDefender Internet Security 2010 . . . . . . . . . . . . . . . . . . . . . . . . . 262
28.2. Creating a BitDefender Account . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 263
Integration into Windows and Third-Party Software ........ 267
29. Integration into Windows Contextual Menu . . . . . . . .. .. .. . . . . . . . . . 268
29.1. Scan with BitDefender . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 268
29.2. BitDefender File Vault . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 269
29.2.1. Create Vault . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 270
29.2.2. Open Vault . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 271
29.2.3. Lock Vault . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 272
29.2.4. Add to File Vault . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 272
29.2.5. Remove from File Vault . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 273
29.2.6. Change Vault Password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 273
30. Integration into Web Browsers . . . . . . . . . . .. .. .. . . . . . . . . . . . . . .. .. .. . 275
31. Integration into Instant Messenger Programs . . . . . .. .. .. . . . . . . . . . 278
32. Integration into Mail Clients ... .. . . . . . . . . . . . . . .. .. .. . . . . . . . . . . . . . . . 279
32.1. Antispam Configuration Wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 279
32.1.1. Step 1/6 - Welcome Window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 280
32.1.2. Step 2/6 - Fill in the Friends List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 281
32.1.3. Step 3/6 - Delete Bayesian Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 282
32.1.4. Step 4/6 - Train Bayesian Filter with Legitimate Mail . . . . . . . . . . . . . . . . . 283
32.1.5. Step 5/6 - Train Bayesian Filter with Spam . . . . . . . . . . . . . . . . . . . . . . . . . 284
32.1.6. Step 6/6 - Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 285
32.2. Antispam Toolbar . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 285
How To ................................................................... 293
33. How to Scan Files and Folders . . . .. .. .. .. . . . . . . . . . . . . . .. .. .. . . . . . . . 294
33.1. Using Windows Contextual Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 294
33.2. Using Scan Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 294
33.3. Using BitDefender Manual Scan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 296
33.4. Using Scan Activity Bar . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 297
34. How to Schedule Computer Scan .. . . . . . .. .. .. .. . . . . . . . . . . . . . .. .. . 298
Troubleshooting and Getting Help ............................... 300
ix
BitDefender Internet Security 2010
35. Troubleshooting . . . . . . . . . . . . . .. .. .. . . . . . . . . . . . . . .. .. .. . . . . . . . . . . . . . . 301
35.1. Installation Problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 301
35.1.1. Installation Validation Errors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 301
35.1.2. Failed Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 302
35.2. BitDefender Services Are Not Responding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 303
35.3. File and Printer Sharing in Wi-Fi (Wireless) Network Does Not Work . . . . . . . . 304
35.3.1. "Trusted Computer" Solution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 305
35.3.2. "Safe Network" Solution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 306
35.4. Antispam Filter Does Not Work Properly . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 308
35.4.1. Legitimate Messages Are Marked as [spam] . . . . . . . . . . . . . . . . . . . . . . . 308
35.4.2. Many Spam Messages Are Not Detected . . . . . . . . . . . . . . . . . . . . . . . . . . . 311
35.4.3. Antispam Filter Does Not Detect Any Spam Message . . . . . . . . . . . . . . . . 313
35.5. BitDefender Removal Failed . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 314
36. Support . . . . . .. .. .. . . . . . . . . . . . . . .. .. .. .. . . . . . . . . . . . . . .. .. .. . . . . . . . . . . 316
36.1. BitDefender Knowledge Base . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 316
36.2. Asking for Help . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 316
36.3. Contact Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 317
36.3.1. Web Addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 317
36.3.2. BitDefender Offices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 317
BitDefender Rescue CD ............................................. 319
37. Overview . . . .. .. .. . . . . . . . . . . . . . . . .. .. .. . . . . . . . . . . . . . .. .. .. .. . . . . . . . . . 320
37.1. System Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 320
37.2. Included Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 321
38. BitDefender Rescue CD Howto . . . . . . . . . . . . . .. .. .. . . . . . . . . . . . . . .. .. 323
38.1. Start BitDefender Rescue CD . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 323
38.2. Stop BitDefender Rescue CD . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 324
38.3. How do I perform an antivirus scan? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 325
38.4. How do I configure the Internet connection? . . . . . . . . . . . . . . . . . . . . . . . . . . . . 326
38.5. How do I update BitDefender? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 327
38.5.1. How do I update BitDefender over a proxy? . . . . . . . . . . . . . . . . . . . . . . . . 328
38.6. How do I save my data? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 329
38.7. How do I use console mode? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 331
Glossary . . . . .. .. .. .. . . . . . . . . . . . . . .. .. .. . . . . . . . . . . . . . . . .. .. .. . . . . . . . . . . . . . .. . 332
x
BitDefender Internet Security 2010

End User Software License Agreement

IF YOU DO NOT AGREE TO THESE TERMS AND CONDITIONS DO NOT INSTALL THE SOFTWARE. BY SELECTING "I ACCEPT", "OK", "CONTINUE", "YES" OR BY INSTALLING OR USING THE SOFTWARE IN ANY WAY, YOU ARE INDICATING YOUR COMPLETE UNDERSTANDING AND ACCEPTANCE OF THE TERMS OF THIS AGREEMENT.
PRODUCT REGISTRATION. By accepting this Agreement, You agree to register Your Software, using “My account”, as a condition of Your use of the Software (receiving updates) and Your right to Maintenance. This control helps ensure that the Software operates only on validly licensed Computers and that validly licensed end users receive Maintenance services. Registration requires a valid product serial number and a valid email address for renewal and other notices.
These Terms cover BitDefender Solutions and Services for home-users licensed to you, including related documentation and any update and upgrade of the applications delivered to you under the purchased license or any related service agreement as defined in the documentation and any copy of these items.
This License Agreement is a legal agreement between you (either an individual or a legal person) and BITDEFENDER for use of BITDEFENDER’s software product identified above, which includes computer software and services, and may include associated media, printed materials, and "online" or electronic documentation (hereafter designated as "BitDefender"), all of which are protected by international copyright laws and international treaties. By installing, copying or using BitDefender, you agree to be bound by the terms of this agreement.
If you do not agree to the terms of this agreement, do not install or use BitDefender.
BitDefender License. BitDefender is protected by copyright laws and international copyright treaties, as well as other intellectual property laws and treaties. BitDefender is licensed, not sold.
GRANT OF LICENSE. BITDEFENDER hereby grants you and only you the following non-exclusive, limited, non assignable, non-transferable, non-sublicensable and royalty-bearing license to use BitDefender.
APPLICATION SOFTWARE. You may install and use BitDefender, on as many computers as necessary with the limitation imposed by the total number of licensed users. You may make one additional copy for back-up purpose.
DESKTOP USER LICENSE. This license applies to BitDefender software that can be installed on a single computer and which does not provide network services. Each primary user may install this software on a single computer and may make one additional copy for backup on a different device. The number of primary users allowed is the number of the users of the license.
End User Software License Agreement
xi
BitDefender Internet Security 2010
TERM OF LICENSE. The license granted hereunder shall commence on the purchasing date of BitDefender and shall expire at the end of the period for which the license is purchased.
EXPIRATION. The product will cease to perform its functions immediately upon expiration of the license.
UPGRADES. If BitDefender is labeled as an upgrade, you must be properly licensed to use a product identified by BITDEFENDER as being eligible for the upgrade in order to use BitDefender. A BitDefender labeled as an upgrade replaces and/or supplements the product that formed the basis for your eligibility for the upgrade. You may use the resulting upgraded product only in accordance with the terms of this License Agreement. If BitDefender is an upgrade of a component of a package of software programs that you licensed as a single product, BitDefender may be used and transferred only as part of that single product package and may not be separated for use by more than the total number of licensed users. The terms and conditions of this license replace and supersede any previous agreements that may have existed between you and BITDEFENDER regarding the original product or the resulting upgraded product.
COPYRIGHT. All rights, titles and interest in and to BitDefender and all copyright rights in and to BitDefender (including but not limited to any images, photographs, logos, animations, video, audio, music, text, and "applets" incorporated into BitDefender), the accompanying printed materials, and any copies of BitDefender are owned by BITDEFENDER. BitDefender is protected by copyright laws and international treaty provisions. Therefore, you must treat BitDefender like any other copyrighted material. You may not copy the printed materials accompanying BitDefender. You must produce and include all copyright notices in their original form for all copies created irrespective of the media or form in which BitDefender exists. You may not sub-license, rent, sell, lease or share the BitDefender license. You may not reverse engineer, recompile, disassemble, create derivative works, modify, translate, or make any attempt to discover the source code for BitDefender.
LIMITED WARRANTY. BITDEFENDER warrants that the media on which BitDefender is distributed is free from defects for a period of thirty days from the date of delivery of BitDefender to you. Your sole remedy for a breach of this warranty will be that BITDEFENDER , at its option, may replace the defective media upon receipt of the damaged media, or refund the money you paid for BitDefender. BITDEFENDER does not warrant that BitDefender will be uninterrupted or error free or that the errors will be corrected. BITDEFENDER does not warrant that BitDefender will meet your requirements.
EXCEPT AS EXPRESSLY SET FORTH IN THIS AGREEMENT, BITDEFENDER DISCLAIMS ALL OTHER WARRANTIES, EXPRESS OR IMPLIED, WITH RESPECT TO THE PRODUCTS, ENHANCEMENTS, MAINTENANCE OR SUPPORT RELATED THERETO, OR ANY OTHER MATERIALS (TANGIBLE OR INTANGIBLE) OR SERVICES SUPPLIED BY HIM. BITDEFENDER HEREBY EXPRESSLY DISCLAIMS ANY IMPLIED WARRANTIES AND
End User Software License Agreement
xii
BitDefender Internet Security 2010
CONDITIONS, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE, NON INTERFERENCE, ACCURACY OF DATA, ACCURACY OF INFORMATIONAL CONTENT, SYSTEM INTEGRATION, AND NON INFRINGEMENT OF THIRD PARTY RIGHTS BY FILTERING, DISABLING, OR REMOVING SUCH THIRD PARTY’S SOFTWARE, SPYWARE, ADWARE, COOKIES, EMAILS, DOCUMENTS, ADVERTISEMENTS OR THE LIKE, WHETHER ARISING BY STATUTE, LAW, COURSE OF DEALING, CUSTOM AND PRACTICE, OR TRADE USAGE.
DISCLAIMER OF DAMAGES. Anyone using, testing, or evaluating BitDefender bears all risk to the quality and performance of BitDefender. In no event shall BITDEFENDER be liable for any damages of any kind, including, without limitation, direct or indirect damages arising out of the use, performance, or delivery of BitDefender, even if BITDEFENDER has been advised of the existence or possibility of such damages.
SOME STATES DO NOT ALLOW THE LIMITATION OR EXCLUSION OF LIABILITY FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES, SO THE ABOVE LIMITATION OR EXCLUSION MAY NOT APPLY TO YOU.
IN NO CASE SHALL BITDEFENDER'S LIABILITY EXCEED THE PURCHASE PRICE PAID BY YOU FOR BITDEFENDER. The disclaimers and limitations set forth above will apply regardless of whether you accept to use, evaluate, or test BitDefender.
IMPORTANT NOTICE TO USERS. THIS SOFTWARE IS NOT FAULT-TOLERANT AND IS NOT DESIGNED OR INTENDED FOR USE IN ANY HAZARDOUS ENVIRONMENT REQUIRING FAIL-SAFE PERFORMANCE OR OPERATION. THIS SOFTWARE IS NOT FOR USE IN THE OPERATION OF AIRCRAFT NAVIGATION, NUCLEAR FACILITIES, OR COMMUNICATION SYSTEMS, WEAPONS SYSTEMS, DIRECT OR INDIRECT LIFE-SUPPORT SYSTEMS, AIR TRAFFIC CONTROL, OR ANY APPLICATION OR INSTALLATION WHERE FAILURE COULD RESULT IN DEATH, SEVERE PHYSICAL INJURY OR PROPERTY DAMAGE.
CONSENT TO ELECRONIC COMMUNICATIONS. BitDefender may be required to send you legal notices and other communications about the Software and Maintenance subscription services or our use of the information you provide us (“Communications”). BitDefender will send Communications via in-product notices or via email to the primary user’s registered email address, or will post Communications on its Sites. By accepting this Agreement, you consent to receive all Communications through these electronic means only and acknowledge and demonstrate that you can access Communications on Sites.
UPDATES. By accepting this Agreement, You acknowledge and agree that your system will be used for receiving and serving updates through a peer to peer protocol. The protocol will not be used for anything other than transmitting and receiving BitDefender updates of signatures files.
DATA COLLECTION TECHNOLOGY- BitDefender informs you that in certain programs or products it may use data collection technology to collect technical information (including suspect files), to improve the products, to provide related services, to
End User Software License Agreement
xiii
BitDefender Internet Security 2010
adapt them and to prevent the unlicensed or illegal use of the product or the damages resulting from the malware products. You accept that BitDefender may use such information as part of the services provided in relation to the product and to prevent and stop the malware programs running on your computer.
By accepting this Agreement, You acknowledge and agree that the security technology used can scan the traffic in an impersonal mode to detect the malware and to prevent the damages resulting from the malware products.
You acknowledge and accept that BitDefender may provide updates or additions to the program or product which automatically download to your computer.
By accepting this Agreement, You agree to upload the executable files for the purpose of being scanned by the BitDefender servers. Similarly, for the purpose of contracting and using the program, you may have to give BitDefender certain personal data. BitDefender informs you that it will treat your personal data in accordance with current applicable legislation and as established in its Privacy Policy.
DATA COLLECTION. Access to the website by the User and the acquisition of products and services and the use of tools or content via the website implies the processing of personal data. Complying with legislation governing the processing of personal data and information society services and electronic commerce is of the utmost importance to BitDefender. Sometimes, to access products, services contents or tools, you will in some cases, need to provide certain personal details. BitDefender guarantees that such data will be treated confidentially and in accordance with legislation governing the protection of personal data and information society services and electronic commerce.
BitDefender complies with applicable data protection legislation, and has taken the administrative and technical steps necessary to guarantee the security of the personal data that it collects.
You declare that all the data that you provide will be true and accurate and undertakes to inform BItDefender of any changes to said data. You have the right to object to the processing of any of his or her data which is not essential for the execution of the agreement and to its use for any purpose other than the maintenance of the contractual relationship.
In the event that you provide the details of a third-party, BitDefender shall not be held responsible for complying with the principles of information and consent, and it shall therefore be you that guarantees to have previously informed and obtained the consent of the owner of the data, with regards to communicating such data.
BitDefender and its affiliates and partners will only send marketing information by e-mail or other electronic means to those users who have given their express consent to receiving communication concerning BitDefender products or services or newsletters.
End User Software License Agreement
xiv
BitDefender Internet Security 2010
BitDefender’s privacy policy guarantees you the right to access, rectify, eliminate and object to the processing of data by notifying BitDefender via e-mail at:
juridic@bitdefender.com.
GENERAL. This Agreement will be governed by the laws of Romania and by international copyright regulations and treaties. The exclusive jurisdiction and venue to adjudicate any dispute arising out of these License Terms shall be of the courts of Romania.
In the event of invalidity of any provision of this Agreement, the invalidity shall not affect the validity of the remaining portions of this Agreement.
BitDefender and BitDefender logos are trademarks of BITDEFENDER. All other trademarks used in the product or in associated materials are the property of their respective owners.
The license will terminate immediately without notice if you are in breach of any of its terms and conditions. You shall not be entitled to a refund from BITDEFENDER or any resellers of BitDefender as a result of termination. The terms and conditions concerning confidentiality and restrictions on use shall remain in force even after any termination.
BITDEFENDER may revise these Terms at any time and the revised terms shall automatically apply to the corresponding versions of the Software distributed with the revised terms. If any part of these Terms is found void and unenforceable, it will not affect the validity of rest of the Terms, which shall remain valid and enforceable.
In case of controversy or inconsistency between translations of these Terms to other languages, the English version issued by BITDEFENDER shall prevail.
Contact BITDEFENDER, at 24, Preciziei Boulevard, West Gate Building H2, ground floor, Sector 6, Bucharest, Romania, or at Tel No: 40-21-206.34.70 or Fax: 40-21-264.17.99, e-mail address: office@bitdefender.com.
End User Software License Agreement
xv
BitDefender Internet Security 2010

Preface

This guide is intended to all users who have chosen BitDefender Internet Security 2010 as a security solution for their personal computers. The information presented in this book is suitable not only for computer literates, it is accessible to everyone who is able to work under Windows.
This book will describe for you BitDefender Internet Security 2010, will guide you through the installation process, will show you how to configure it. You will find out how to use BitDefender Internet Security 2010, how to update, test and customize it. You will learn how to get best from BitDefender.
We wish you a pleasant and useful lecture.

1. Conventions Used in This Book

1.1. Typographical Conventions

Several text styles are used in the book for an improved readability. Their aspect and meaning are presented in the following table.
DescriptionAppearance
sample syntax
http://www.bitdefender.com
sales@bitdefender.com
“Preface” (p. xvi)
filename
option
sample code listing
Syntax samples are printed with monospaced characters.
The URL link is pointing to some external location, on http or ftp servers.
E-mail addresses are inserted in the text for contact information.
This is an internal link, towards some location inside the document.
File and directories are printed using monospaced font.
All the product options are printed using strong characters.
The code listing is printed with monospaced characters.

1.2. Admonitions

The admonitions are in-text notes, graphically marked, bringing to your attention additional information related to the current paragraph.
Preface
xvi
BitDefender Internet Security 2010
Note
The note is just a short observation. Although you can omit it, the notes can provide valuable information, such as specific feature or a link to some related topic.
Important
This requires your attention and is not recommended to skip over it. Usually, it provides non-critical but significant information.
Warning
This is critical information you should treat with increased caution. Nothing bad will happen if you follow the indications. You should read and understand it, because it describes something extremely risky.

2. Book Structure

The book consists of several parts containing major topics. Moreover, a glossary is provided to clarify some technical terms.
Installation and Removal. Step by step instructions for installing BitDefender on a personal computer. Starting with the prerequisites for a successfully installation, you are guided through the whole installation process. Finally, the removing procedure is described in case you need to uninstall BitDefender.
Getting Started. Contains all the information you need to get started with BitDefender. You are presented with the BitDefender interface and how to fix issues, configure basic settings and register your product.
Intermediate Mode. Presents the Intermediate Mode interface of BitDefender.
Expert Mode. A detailed presentation of the Expert Mode interface of BitDefender.
You are taught how to configure and use all BitDefender modules so as to efficiently protect your computer against all kind of threats (malware, spam, hackers, innapropriate content and so on).
Integration into Windows and Third-Party Software. Shows you how to use the BitDefender options on the Windows contextual menu and the BitDefender toolbars integrated into supported third-party programs.
How To. Provides procedures to quickly perform the most common tasks in BitDefender.
Troubleshooting and Getting Help. Where to look and where to ask for help if something unexpected appears.
BitDefender Rescue CD. Description of the BitDefender Rescue CD. It helps understand and use the features offered by this bootable CD.
Glossary. The Glossary tries to explain some technical and uncommon terms you will find in the pages of this document.
Preface
xvii
BitDefender Internet Security 2010

3. Request for Comments

We invite you to help us improve the book. We have tested and verified all of the information to the best of our ability. Please write to tell us about any flaws you find in this book or how you think it could be improved, to help us provide you with the best documentation possible.
Let us know by sending an e-mail to documentation@bitdefender.com.
Important
Please write all of your documentation-related e-mails in English so that we can process them efficiently.
Preface
xviii
BitDefender Internet Security 2010

Installation and Removal

1
BitDefender Internet Security 2010

1. System Requirements

You may install BitDefender Internet Security 2010 only on computers running the following operating systems:
Windows XP (32/64 bit) with Service Pack 2 or higher
Windows Vista (32/64 bit) or Windows Vista with Service Pack 1 or higher
Windows 7 (32/64 bit)
Before installation, make sure that your computer meets the minimum hardware and software requirements.
Note
To find out the Windows operating system your computer is running and hardware information, right-click My Computer on the desktop and then select Properties from the menu.

1.1. Minimal System Requirements

450 MB available free hard disk space
800 MHz processor
RAM Memory:512 MB for Windows XP1 GB for Windows Vista and Windows 7
Internet Explorer 6.0
.NET Framework 1.1 (also available in the installer kit)

1.2. Recommended System Requirements

600 MB available free hard disk space
Intel CORE Duo (1.66 GHz) or equivalent processor
RAM Memory:1 GB for Windows XP and Windows 71.5 GB for Windows Vista
Internet Explorer 7 (or higher)
.NET Framework 1.1 (also available in the installer kit)

1.3. Supported Software

Antiphishing protection is provided only for:
Internet Explorer 6.0 or higher
Mozilla Firefox 2.5
Yahoo Messenger 8.5
Windows Live Messenger 8
Instant Messaging (IM) encryption is provided only for:
System Requirements
2
BitDefender Internet Security 2010
Yahoo Messenger 8.5
Windows Live Messenger 8
Antispam protection is provided for all POP3/SMTP e-mail clients. The BitDefender Antispam toolbar however is integrated only into:
Microsoft Outlook 2000 / 2003 / 2007
Microsoft Outlook Express
Microsoft Windows Mail
Thunderbird 2.0.0.17
System Requirements
3
BitDefender Internet Security 2010

2. Preparing for Installation

Before you install BitDefender Internet Security 2010, complete these preparations to ensure the installation will go smoothly:
Make sure that the computer where you plan to install BitDefender meets the
minimum system requirements. If the computer does not meet all the minimum system requirements, BitDefender will not be installed or, if installed, it will not work properly and it will cause system slowdowns and instability. For a complete list of system requirements, please refer to System Requirements” (p. 2).
Log on to the computer using an Administrator account.
Remove any other security software from the computer. Running two security
programs simultaneously may affect their operation and cause major problems with the system. Windows Defender will be disabled by default before installation is initiated.
Disable or remove any firewall program that may be running on the computer.
Running two firewall programs simultaneously may affect their operation and cause major problems with the system. Windows Firewall will be disabled by default before installation is initiated.
Preparing for Installation
4
BitDefender Internet Security 2010

3. Installing BitDefender

You can install BitDefender from the BitDefender installation CD or using the installation file downloaded on your computer from the BitDefender website or from other authorized websites (for example, the website of a BitDefender partner or an online shop). You can download the installation file from the BitDefender website at the following address: http://www.bitdefender.com/site/Downloads/.
To install BitDefender from the CD, insert the CD into the drive. A welcome screen
should be displayed in a few moments. Follow the instructions to start installation.
Note
The welcome screen provides an option to copy the installation package from the installation CD to a USB storage device. This is useful if you need to install BitDefender on a computer that does not have a CD drive (for example, on a netbook). Insert the storage device into the USB drive and then click Copy to USB. Afterwards, go to the computer without a CD drive, insert the storage device into the USB drive and double-click runsetup.exe from the folder where you have saved the installation package.
If the welcome screen does not appear, follow this path Products\InternetSecurity\install\en\ from the CD's root directory and double-click runsetup.exe.
To install BitDefender using the installation file downloaded on your computer,
locate the file and double-click it.
The installer will first check your system to validate the installation. If the installation is validated, the setup wizard will appear. The following image shows the setup wizard steps.
Installing BitDefender
5
BitDefender Internet Security 2010
Installation Steps
Follow these steps to install BitDefender Internet Security 2010:
1. Click Next. You can cancel installation anytime you want by clicking Cancel.
BitDefender Internet Security 2010 alerts you if you have other antivirus products installed on your computer. Click Remove to uninstall the corresponding product. If you want to continue without removing the detected products, click Next.
Warning
It is highly recommended that you uninstall any other antivirus products detected before installing BitDefender. Running two or more antivirus products at the same time on a computer usually renders the system unusable.
2. Please read the License Agreement and click I agree.
Important
If you do not agree to these terms click Cancel. The installation process will be abandoned and you will exit setup.
3. Select the type of installation to be performed.
Installing BitDefender
6
BitDefender Internet Security 2010
Typical - to install the program immediately, using the default installation
options. If you choose this option, skip to Step 6.
Custom - to configure the installation options and then install the program.
This option allows you to change the installation path.
4. By default, BitDefender Internet Security 2010 will be installed in C:\Program
Files\BitDefender\BitDefender 2010. If you want to change the installation path, click Browse and select the folder in which you would like BitDefender to be installed.
Click Next.
5. Select options regarding the installation process. The recommended options are
selected by default:
Open readme file - to open the readme file at the end of the installation.
Place a shortcut on the desktop - to place a shortcut to BitDefender Internet
Security 2010 on your desktop at the end of the installation.
Disable DNS Caching - to disable the DNS (Domain Name System) Caching.
The DNS Client service may be used by malicious applications to send information over the network without your consent.
Send Virus Reports - to send virus scanning reports to the BitDefender Lab
for analysis. Please note that these reports will contain no confidential data, such as your name or IP address, and that they will not be used for commercial purposes.
Turn off Windows Firewall - to turn off Windows Firewall.
Important
We recommend you to turn off Windows Firewall since BitDefender Internet Security 2010 already includes an advanced firewall. Running two firewalls on the same computer may cause problems.
Turn off Windows Defender - to turn off Windows Defender; this option
appears only on Windows Vista.
Click Install to start installing the program. If not already installed, BitDefender will first install .NET Framework 1.1.
6. Wait until the installation is completed and then click Finish. You will be asked
to restart your system so that the setup wizard can complete the installation process. We recommend doing so as soon as possible.
Important
After completing the installation and restarting the computer, a registration wizard and a configuration wizard will appear. Complete these wizards in order to register
Installing BitDefender
7
BitDefender Internet Security 2010
and configure BitDefender Internet Security 2010 and to create a BitDefender account.
If you have accepted the default settings for the installation path, you can see in Program Files a new folder, named BitDefender, which contains the subfolder BitDefender 2010.

3.1. Registration Wizard

The first time you start your computer after installation, a registration wizard will appear. The wizard helps you register BitDefender and configure a BitDefender account.
You MUST create a BitDefender account in order to receive BitDefender updates. The BitDefender account also gives you access to free technical support and special offers and promotions. If you loose your BitDefender license key, you can log in to your account at http://myaccount.bitdefender.com to retrieve it.
Note
If you do not want to follow this wizard, click Cancel. You can open the registration wizard anytime you want by clicking the Register link, located at the bottom of the user interface.
Installing BitDefender
8
BitDefender Internet Security 2010
3.1.1. Step 1 - Register BitDefender Internet Security 2010
Registration
BitDefender Internet Security 2010 comes with 30-day trial period. To continue evaluating the product, select I want to evaluate BitDefender and click Next.
To register BitDefender Internet Security 2010:
1. Select I want to register BitDefender with a license key.
2. Type the license key in the edit field.
Note
You can find your license key:
on the CD label.
on the product registration card.
in the online purchase e-mail.
If you do not have a BitDefender license key, click the provided link to go to the BitDefender online store and buy one.
3. Click Register Now.
4. Click Next.
If a valid BitDefender license key is detected on your system, you can continue using this key by clicking Next.
Installing BitDefender
9
BitDefender Internet Security 2010
3.1.2. Step 2 - Create a BitDefender Account
Account Creation
If you do not want to create a BitDefender account at the moment, select Register later and click Finish. Otherwise, proceed according to your current situation:
● “I do not have a BitDefender account” (p. 10)
● “I already have a BitDefender account” (p. 11)
Important
You must create an account within 15 days after installing BitDefender (if you register it with a license key, the deadline is extended to 30 days). Otherwise, BitDefender will no longer update.
I do not have a BitDefender account
To successfully create a BitDefender account, follow these steps:
1. Select Create a new account.
2. Type the required information in the corresponding fields. The data you provide
here will remain confidential.
E-mail address - type in your e-mail address.
Password - type in a password for your BitDefender account. The password
must be between 6 and 16 characters long.
Installing BitDefender
10
BitDefender Internet Security 2010
Re-type password - type in again the previously specified password.
Note
Once the account is activated, you can use the provided e-mail address and password to log in to your account at http://myaccount.bitdefender.com.
3. Optionally, BitDefender can inform you about special offers and promotions using
the e-mail address of your account. Select one of the available options from the menu:
Send me all messages
Send me only product related messages
Don't send me any messages
4. Click Create.
5. Click Finish to complete the wizard.
6. Activate your account. Before being able to use your account, you must
activate it. Check your e-mail and follow the instructions in the e-mail message sent to you by the BitDefender registration service.
I already have a BitDefender account
BitDefender will automatically detect if you have previously registered a BitDefender account on your computer. In this case, provide the password of your account and click Sign in. Click Finish to complete the wizard.
If you already have an active account, but BitDefender does not detect it, follow these steps to register the product to that account:
1. Select Sign in (previously created account).
2. Type the e-mail address and the password of your account in the corresponding
fields.
Note
If you have forgotten your password, click Forgot your password? and follow the instructions.
3. Optionally, BitDefender can inform you about special offers and promotions using
the e-mail address of your account. Select one of the available options from the menu:
Send me all messages
Send me only product related messages
Don't send me any messages
4. Click Sign in.
5. Click Finish to complete the wizard.
Installing BitDefender
11
BitDefender Internet Security 2010

3.2. Configuration Wizard

Once you have completed the registration wizard, a configuration wizard will appear. This wizard helps you configure the main BitDefender settings and user interface so that they suit your requirements better. At the end of the wizard, you can update the product files and malware signatures and scan the system files and applications to make sure they are not infected.
The wizard consists of a few simple steps. The number of steps depends on the choices you make. All of the steps are presented here, but you will be notified when your choices affect their number.
Completing this wizard is not mandatory; however, we recommend you do so in order to save time and ensure your system is safe even before BitDefender Internet Security 2010 is installed. If you do not want to follow this wizard, click Cancel. BitDefender will notify you about the components that you need to configure when you open the user interface.
3.2.1. Step 1 - Select Usage Profile
Usage Profiles
Click the button that best describes the activities performed on this computer (the usage profile).
Installing BitDefender
12
BitDefender Internet Security 2010
DescriptionOption
Typical
Parent
Custom
You can later reset the usage profile from the product interface.
3.2.2. Step 2 - Describe Computer
Click here if this PC is used mainly for browsing and multimedia activities.
Click here if this PC is used by children and you want to control their access to Internet using the Parental Control module.
Click here if this PC is used primarily for gaming.Gamer
Click here if you want to configure all the main settings of BitDefender.
Computer Description
Select the options that apply to your computer:
This computer is in a home network. Select this option if you want to manage
remotely (from another computer) the BitDefender product you installed on this computer. An additional wizard step will allow you to configure the Home Network Management module.
This computer is a laptop. Select this option if you want to have the Laptop
Mode enabled by default. While in Laptop Mode, scheduled scan tasks are not
Installing BitDefender
13
BitDefender Internet Security 2010
performed, as they require more system resources and, implicitly, increase power consumption.
Click Next to continue.
3.2.3. Step 3 - Select User Interface
User Interface View Modes
Click the button that best describes your computer skills to select an appropriate user interface view mode. You can choose to view the user interface under any of three modes, depending on your computer skills and on your previous experience with BitDefender.
DescriptionMode
Novice Mode
Suited for computer beginners and people who want BitDefender to protect their computer and data without being bothered. This mode is simple to use and requires minimal interaction on your side.
All you have to do is fix the existing issues when indicated by BitDefender. An intuitive step-by-step wizard assists you in fixing issues. Additionally, you can perform common tasks, such as updating the BitDefender virus signature and product files or scanning the computer.
Installing BitDefender
14
BitDefender Internet Security 2010
DescriptionMode
Intermediate Mode
Expert Mode
3.2.4. Step 4 - Configure Parental Control
Note
This step appears only if you have selected the Custom option in Step 1.
Aimed at users with average computer skills, this mode extends what you can do in Novice Mode.
You can fix issues separately and choose which issues to be monitored. Moreover, you can manage remotely the BitDefender products installed on the computers in your household.
Suited for more technical users, this mode allows you to fully configure each functionality of BitDefender. You can also use all tasks provided to protect your computer and data.
Parental Control Configuration
BitDefender Parental Control enables you to control the access to the Internet and to specific applications for each user holding a user account on the system.
If you want to use Parental Control, follow these steps:
1. Select Enable Parental Control.
Installing BitDefender
15
BitDefender Internet Security 2010
2. If you are sharing your Windows user account with your children, select the
corresponding check box and type a password in the corresponding fields to protect the Parental Control settings. Anyone trying to change the Parental Control settings must first provide the password that you have configured.
Click Next to continue.
3.2.5. Step 5 - Configure BitDefender Network
Note
This step appears only if you have specified that the computer is connected to a home network in Step 2.
BitDefender Network Configuration
BitDefender enables you to create a virtual network of the computers in your household and to manage the BitDefender products installed in this network.
If you want this computer to be part of the BitDefender Home Network, follow these steps:
1. Select Enable Home Network.
2. Type the same administrative password in each of the edit fields. The password
enables an administrator to manage this BitDefender product from another computer.
Click Next to continue.
Installing BitDefender
16
BitDefender Internet Security 2010
3.2.6. Step 6 - Select the Tasks to Be Run
Task Selection
Set BitDefender to perform important tasks for the security of your system. The following options are available:
Update BitDefender and perform a quick system scan now - during the
next step, the virus signatures and product files of BitDefender will be updated in order to protect your computer against the latest threats. Also, immediately after the update is completed, BitDefender will scan the files from the Windows and Program Files folders to make sure they are not infected. These folders contain files of the operating system and of installed applications and they are usually the first to be infected.
Run a System Scan every day at 2 AM - sets BitDefender to perform a standard
scan of your computer every day at 2 AM. To change the time when the scan is run, click the menu and select the desired start time. If the computer is shut down when the schedule is due, the scan will run the next time you start your computer.
Note
If you later want to change the time when the scan is scheduled to run, follow these steps:
1. Open BitDefender and switch the user interface to Expert Mode.
2. Click Antivirus on the left-side menu.
3. Click the Virus Scan tab.
Installing BitDefender
17
BitDefender Internet Security 2010
4. Right-click the System Scan task and select Schedule. A new window will
appear.
5. Change the frequency and the start time as needed.
6. Click OK to save the changes.
We recommend that you have these options enabled before moving on to the next step in order to ensure the security of your system. Click Next to continue.
If you clear the first check box, there are no tasks to be performed in the last step of the wizard. Click Finish to complete the wizard.
3.2.7. Step 7 - Finish
Task Status
Wait for BitDefender to update its malware signatures and scanning engines. As soon as the update is completed, a quick system scan will be started. The scan will be performed silently, in the background. You can notice the scan progress icon in the system tray. You can click this icon to open the scan window and to see the scan progress.
Click Finish to complete the wizard. You do not have to wait for the scan to complete.
Note
The scan will take a few minutes. When it is over, open the scan window and check the scan results to see if your system is clean. If viruses were detected during the scan, you should immediately open BitDefender and run a full system scan.
Installing BitDefender
18
BitDefender Internet Security 2010

4. Upgrade

You can upgrade to BitDefender Internet Security 2010 if you are using BitDefender Internet Security 2010 beta or the 2008 or 2009 version.
There are two ways to perform the upgrade:
Install BitDefender Internet Security 2010 directly over the older version. If you
install directly over the 2009 version, the Friends and Spammers lists and the Quarantine are automatically imported.
Remove the older version, then restart the computer and install the new version
as described in chapter Installing BitDefender” (p. 5). No product settings will be saved. Use this upgrade method if the other fails.
Upgrade
19
BitDefender Internet Security 2010

5. Repairing or Removing BitDefender

If you want to repair or remove BitDefender Internet Security 2010, follow the path from the Windows start menu: Start Programs BitDefender 2010 Repair or Remove.
You will be requested to confirm your choice by clicking Next. A new window will appear where you can select:
Repair - to re-install all program components installed by the previous setup.
If you choose to repair BitDefender, a new window will appear. Click Repair to start the repairing process.
Restart the computer when prompted and, afterwards, click Install to reinstall BitDefender Internet Security 2010.
Once the installation process is completed, a new window will appear. Click Finish.
Remove - to remove all installed components.
Note
We recommend that you choose Remove for a clean re-installation.
If you choose to remove BitDefender, a new window will appear.
Important
By removing BitDefender, you will no longer be protected against viruses, spyware and hackers. If you want Windows Firewall and Windows Defender (only on Windows Vista) to be enabled after uninstalling BitDefender, select the corresponding check boxes.
Click Remove to start the removal of BitDefender Internet Security 2010 from your computer.
Once the removal process is completed, a new window will appear. Click Finish.
Note
After the removal process is over, we recommend that you delete the
BitDefender folder from Program Files.
Repairing or Removing BitDefender
20
BitDefender Internet Security 2010

Getting Started

21
BitDefender Internet Security 2010

6. Overview

Once you have installed BitDefender your computer is protected. If you have not completed the configuration wizard, you must open BitDefender as soon as possible and fix the existing issues. You may have to configure specific BitDefender components or take preventive actions to protect your computer and your data. If you want to, you can configure BitDefender not to alert you about specific issues.
If you have not registered the product (including creating a BitDefender account), remember to do so until the trial period ends. You must create an account within 15 days after installing BitDefender (if you register it with a license key, the deadline is extended to 30 days). Otherwise, BitDefender will no longer update. For more information on the registration process, please refer to Registration and My Account
(p. 47).

6.1. Opening BitDefender

To access the main interface of BitDefender Internet Security 2010, use the Windows Start menu, by following the path Start Programs BitDefender 2010 BitDefender Internet Security 2010 or, quicker, double click the BitDefender icon in the system tray.

6.2. User Interface View Modes

BitDefender Internet Security 2010 meets the needs of computer beginners and very technical people alike. Its graphical user interface is designed to suit each and every category of users.
You can choose to view the user interface under any of three modes, depending on your computer skills and on your previous experience with BitDefender.
Novice Mode
Intermediate Mode
Overview
DescriptionMode
Suited for computer beginners and people who want BitDefender to protect their computer and data without being bothered. This mode is simple to use and requires minimal interaction on your side.
All you have to do is fix the existing issues when indicated by BitDefender. An intuitive step-by-step wizard assists you in fixing issues. Additionally, you can perform common tasks, such as updating the BitDefender virus signature and product files or scanning the computer.
Aimed at users with average computer skills, this mode extends what you can do in Novice Mode.
22
BitDefender Internet Security 2010
DescriptionMode
You can fix issues separately and choose which issues to be monitored. Moreover, you can manage remotely the BitDefender products installed on the computers in your household.
Expert Mode
The user interface mode is selected in the configuration wizard. This wizard appears after the registration wizard, the first time you open your computer after installing the product. If you cancel the configuration wizard, the user interface mode will default to Intermediate Mode.
To change the user interface mode, follow these steps:
1. Open BitDefender.
2. Click the Settings button in the upper-right corner of the window.
3.
In the User Interface Settings category, click the arrow on the button and select the desired mode from the menu.
4. Click OK to save and apply the changes.
Suited for more technical users, this mode allows you to fully configure each functionality of BitDefender. You can also use all tasks provided to protect your computer and data.
6.2.1. Novice Mode
If you are a computer beginner, displaying the user interface in Novice Mode may be the most adequate choice for you. This mode is simple to use and requires minimal interaction on your side.
Overview
23
BitDefender Internet Security 2010
Novice Mode
The window is organized into four main sections:
Security Status informs you of the issues that affect your computer's security
and helps you fix them. By clicking Fix All Issues, a wizard will help you easily remove any threats to your computer and data security. For detailed information, please refer to Fixing Issues” (p. 37).
Protect Your PC is where you can find the necessary tasks to protect your
computer and data. The available tasks you can perform are different depending on the selected usage profile.
The Scan Now button starts a standard scan of your system for viruses, spyware
and other malware. The Antivirus Scan wizard will appear and guide you through the scanning process. For detailed information about this wizard, please refer to Antivirus Scan Wizard” (p. 52).
The Update Now button helps you update the virus signature and product
files of BitDefender. A new window will appear where you can see the update status. If updates are detected, they are automatically downloaded and installed on your computer.
When the Typical profile is selected, the Vulnerabilities Check button starts
a wizard that helps you find and fix system vulnerabilities, such as outdated software or missing Windows updates. For detailed information, please refer to section Vulnerability Check Wizard” (p. 64).
When the Parent profile is selected, the Parental Control button allows you
to configure the Parental Control settings. Parental Control restricts the computer
Overview
24
BitDefender Internet Security 2010
and online activities of your children based on the rules you defined. Restrictions may include blocking inappropriate web sites, as well as limiting gaming and Internet access according to a specified schedule. For more information on how to configure Parental Control, please refer to Parental Control” (p. 180).
When the Gamer profile is selected, the Turn On/Off Game Mode button
allows you to enable/disable Game Mode. Game Mode temporarily modifies protection settings so as to minimize their impact on system performance.
Maintain Your PC is where you can find additional tasks to protect your computer
and data.
Add File to Vault starts the wizard that allows you to store your important
files / documents privately by encrypting them in special, vaulted drives.
Deep System Scan starts a comprehensive scan of your system for all types
of malware.
My Documents Scan scans for viruses and other malware your most commonly
used folders: My Documents and Desktop. This will ensure the safety of your documents, a safe workspace and clean applications running at startup.
Usage Profile indicates the usage profile that is currently selected. The usage
profile reflects the main activities performed on the computer. Depending on the usage profile, the product interface is organized to allow easy access to your preferred tasks.
If you want to switch to a different profile or edit the one you are currently using, click the profile and follow the configuration wizard.
In the upper-right corner of the window, you can see the Settings button. It opens a window where you can change the user interface mode and enable or disable the main settings of BitDefender. For detailed information, please refer to Configuring
Basic Settings” (p. 40).
In the bottom-right corner of the window, you can find several useful links.
Buy/Renew
Register
Help
View Logs
Overview
DescriptionLink
Opens a web page where you can purchase a license key for your BitDefender Internet Security 2010 product.
Allows you to enter a new license key or to view the current license key and the registration status.
Allows you to contact the BitDefender support team.Support
Gives you access to a help file that shows you how to use BitDefender.
Allows you to see a detailed history of all tasks performed by BitDefender on your system.
25
BitDefender Internet Security 2010
6.2.2. Intermediate Mode
Aimed at users with average computer skills, Intermediate Mode is a simple interface that gives you access to all modules at a basic level. You'll have to keep track of warnings and critical alerts and fix undesired issues.
Intermediate Mode
The Intermediate Mode window consists of five tabs. The following table briefly describes each tab. For detailed information, please refer to the “Intermediate Mode”
(p. 89) part of this user guide.
DescriptionTab
Dashboard
Security
Parental
File Vault
Displays the security status of your system and lets you reset the usage profile.
Displays the status of the security modules (antivirus, antiphishing, firewall, antispam, IM encryption, privacy, vulnerability check and update modules) together with the links to antivirus, update and vulnerability check tasks.
Displays the status of the Parental Control module. Parental Control enables you to restrict your children's access to Internet and to specific applications.
Displays the status of the file vault together with links to the file vault.
Overview
26
BitDefender Internet Security 2010
DescriptionTab
Network
In the upper-right corner of the window, you can see the Settings button. It opens a window where you can change the user interface mode and enable or disable the main settings of BitDefender. For detailed information, please refer to Configuring
Basic Settings” (p. 40).
In the bottom-right corner of the window, you can find several useful links.
Buy/Renew
Register
Help
View Logs
Displays the BitDefender home network structure. This is where you can perform various actions to configure and manage the BitDefender products installed in your home network. In this way, you can manage the security of your home network from a single computer.
DescriptionLink
Opens a web page where you can purchase a license key for your BitDefender Internet Security 2010 product.
Allows you to enter a new license key or to view the current license key and the registration status.
Allows you to contact the BitDefender support team.Support
Gives you access to a help file that shows you how to use BitDefender.
Allows you to see a detailed history of all tasks performed by BitDefender on your system.
6.2.3. Expert Mode
Expert Mode gives you access to each specific component of BitDefender. This is where you can configure BitDefender in detail.
Note
Expert Mode is suited for users having above average computer skills, who know the type of threats a computer is exposed to and how security programs work.
Overview
27
BitDefender Internet Security 2010
Expert Mode
On the left side of the window there is a menu containing all security modules. Each module has one or more tabs where you can configure the corresponding security settings or perform security or administrative tasks. The following table briefly describes each module. For detailed information, please refer to the “Expert Mode”
(p. 111) part of this user guide.
DescriptionModule
General
Antivirus
Antispam
Parental Control
Allows you to access the general settings or to view the dashboard and detailed system info.
Allows you to configure your virus shield and scanning operations in detail, to set exceptions and to configure the quarantine module.
Allows you to keep your Inbox SPAM-free and to configure the antispam settings in detail.
Allows you to protect your children against inappropriate content by using your customized computer access rules.
Overview
28
BitDefender Internet Security 2010
DescriptionModule
Privacy Control
Firewall
Encryption
Game/Laptop Mode
Network
Update
Registration
Allows you to prevent data theft from your computer and protect your privacy while you are online.
Allows you to protect your computer from inbound and outbound unauthorized connection attempts. It is quite similar to a guard at your gate - it will keep a watchful eye on your Internet connection and keep track of who to allow access to the Internet and who to block.
Allows you to keep crucial software on your PC up-to-date.Vulnerability
Allows you to encrypt Yahoo and Windows Live (MSN) Messenger communications and also to local encrypt your critical files, folders or partitions.
Allows you to postpone the BitDefender scheduled tasks while your laptop runs on batteries and also to eliminate all alerts and pop-ups when you are playing.
Allows you to configure and manage several computers in your household.
Allows you to obtain info on the latest updates, to update the product and to configure the update process in detail.
Allows you to register BitDefender Internet Security 2010, to change the license key or to create a BitDefender account.
In the upper-right corner of the window, you can see the Settings button. It opens a window where you can change the user interface mode and enable or disable the main settings of BitDefender. For detailed information, please refer to Configuring
Basic Settings” (p. 40).
In the bottom-right corner of the window, you can find several useful links.
DescriptionLink
Buy/Renew
Register
Help
View Logs
Opens a web page where you can purchase a license key for your BitDefender Internet Security 2010 product.
Allows you to enter a new license key or to view the current license key and the registration status.
Allows you to contact the BitDefender support team.Support
Gives you access to a help file that shows you how to use BitDefender.
Allows you to see a detailed history of all tasks performed by BitDefender on your system.
Overview
29
BitDefender Internet Security 2010

6.3. System Tray Icon

To manage the entire product more quickly, you can use the BitDefender icon in the system tray. If you double-click this icon, BitDefender will open. Also, by right-clicking the icon, a contextual menu will allow you to quickly manage the BitDefender product.
Show - opens the main interface of BitDefender.
Help - opens the help file, which explains in detail how
to configure and use BitDefender Internet Security 2010.
About - opens a window where you can see information
about BitDefender and where to look for help in case something unexpected appears.
Fix All Issues - helps you remove current security
vulnerabilities. If the option is unavailable, there are no issues to be fixed. For detailed information, please refer to Fixing Issues” (p. 37).
Turn Game Mode On / Off - activates / deactivates Game Mode.
Update Now - starts an immediate update. A new window will appear where you
can see the update status.
Basic Settings - opens a window where you can change the user interface mode
and enable or disable the main product settings. For more information, please refer to Configuring Basic Settings” (p. 40).
The BitDefender system tray icon informs you when issues affect your computer or how the product operates, by displaying a special symbol, as follows:
Red triangle with an exclamation mark: Critical issues affect the security of
your system. They require your immediate attention and must be fixed as soon as possible.
Yellow triangle with an exclamation mark: Non-critical issues affect the
security of your system. You should check and fix them when you have the time.
Letter G: The product operates in Game Mode.
If BitDefender is not working, the system tray icon is grayed out . This usually happens when the license key expires. It can also occur when the BitDefender services are not responding or when other errors affect the normal operation of BitDefender.
Tray Icon

6.4. Scan Activity Bar

The Scan activity bar is a graphic visualization of the scanning activity on your system. This small window is by default available only in Expert Mode.
Overview
30
BitDefender Internet Security 2010
The gray bars (the File Zone) show the number of scanned files per second, on a scale from 0 to 50. The orange bars displayed in the Net Zone show the number of Kbytes transferred (sent and received from the Internet) every second, on a scale from 0 to 100.
Note
The Scan activity bar will notify you when real-time protection or the Firewall is disabled by displaying a red cross over the corresponding area (File Zone or Net Zone).
Scan Activity Bar
6.4.1. Scan Files and Folders
You can use the Scan activity bar to quickly scan files and folders. Drag the file or folder you want to be scanned and drop it over the Scan Activity Bar as shown below.
Drag File
Drop File
The Antivirus Scan wizard will appear and guide you through the scanning process. For detailed information about this wizard, please refer to Antivirus Scan Wizard
(p. 52).
Scanning options. The scanning options are pre-configured for the best detection results. If infected files are detected, BitDefender will try to disinfect them (remove the malware code). If disinfection fails, the Antivirus Scan wizard will allow you to specify other actions to be taken on infected files. The scanning options are standard and you cannot change them.
6.4.2. Disable/Restore Scan Activity Bar
When you no longer want to see the graphic visualization, just right-click it and select Hide. To restore the Scan activity bar, follow these steps:
1. Open BitDefender.
Overview
31
BitDefender Internet Security 2010
2. Click the Settings button in the upper-right corner of the window.
3. In the General Settings category, select the check box corresponding to Scan
Activity Bar.
4. Click OK to save and apply the changes.

6.5. BitDefender Manual Scan

BitDefender Manual Scan lets you scan a specific folder or hard disk partition without having to create a scan task. This feature was designed to be used when Windows is running in Safe Mode. If your system is infected with a resilient virus, you can try to remove the virus by starting Windows in Safe Mode and scanning each hard disk partition using BitDefender Manual Scan.
To access the BitDefender Manual Scan, use the Windows Start menu, by following the path Start Programs BitDefender 2010 BitDefender Manual Scan The following window will appear:
BitDefender Manual Scan
Click Add Folder, select the location you want to scan and click OK. If you want to scan multiple folders, repeat this action for each additional location.
The paths to the selected locations will appear in the Scan Target column. If you change your mind about the location, just click the Remove button next to it. Click the Remove All Paths button to remove all the locations that were added to the list.
Overview
32
BitDefender Internet Security 2010
When you are done selecting the locations, click Continue. The Antivirus Scan wizard will appear and guide you through the scanning process. For detailed information about this wizard, please refer to Antivirus Scan Wizard” (p. 52).
Scanning options. The scanning options are pre-configured for the best detection results. If infected files are detected, BitDefender will try to disinfect them (remove the malware code). If disinfection fails, the Antivirus Scan wizard will allow you to specify other actions to be taken on infected files. The scanning options are standard and you cannot change them.
What is Safe Mode?
Safe Mode is a special way to start Windows, used mainly to troubleshoot problems affecting normal operation of Windows. Such problems range from conflicting drivers to viruses preventing Windows to start normally. In Safe Mode, Windows loads only a minimum of operating system components and basic drivers. Only a few applications work in Safe Mode. This is why most viruses are inactive when using Windows in Safe Mode and they can be easily removed. To start Windows in Safe Mode, restart your computer and press the F8 key until the Windows Advanced Options Menu appears. You can choose between several options of starting Windows in Safe Mode. You might want to select Safe Mode with Networking in order to be able to access the Internet.
Note
For more information on Safe Mode, go to the Windows Help and Support Center (in the Start menu, click Help and Support). You can also find useful information by searching the Internet.

6.6. Game Mode and Laptop Mode

Some computer activities, such as games or presentations, require increased system responsiveness and performance, and no interruptions. When your laptop is running on battery power, it is best that unnecessary operations, which consume additional power, be postponed until the laptop is connected back to A/C power.
To adapt to these particular situations, BitDefender Internet Security 2010 includes two special operation modes:
● Game Mode
● Laptop Mode
6.6.1. Game Mode
Game Mode temporarily modifies protection settings so as to minimize their impact on system performance. While in Game Mode, the following settings are applied:
Minimize processor time & memory consumption
Postpone automatic updates & scans
Overview
33
BitDefender Internet Security 2010
Eliminate all alerts and pop-ups
Scan only the most important files
While in Game Mode, you can see the letter G over the BitDefender icon.
Using Game Mode
By default, BitDefender automatically enters Game Mode when you start a game from the BitDefender's list of known games or when an application goes to full screen. BitDefender will automatically return to the normal operation mode when you close the game or when the detected application exits full screen.
If you want to manually turn on Game Mode, use one of the following methods:
Right-click the BitDefender icon in the system tray and select Turn on Game
Mode.
Press Ctrl+Shift+Alt+G (the default hotkey).
Important
Do not forget to turn Game Mode off when you finish. To do this, use the same methods you did when you turned it on.
Changing Game Mode Hotkey
If you want to change the hotkey, follow these steps:
1. Open BitDefender and switch the user interface to Expert Mode.
2. Click Game / Laptop Mode on the left-side menu.
3. Click the Game Mode tab.
4. Click the Advanced Settings button.
5. Under the Use HotKey option, set the desired hotkey:
Choose the modifier keys you want to use by checking one the following: Control
key (Ctrl), Shift key (Shift) or Alternate key (Alt).
In the edit field, type the letter corresponding to the regular key you want to
use.
For example, if you want to use the Ctrl+Alt+D hotkey, you must check only Ctrl and Alt and type D.
Note
Removing the checkmark next to Use HotKey will disable the hotkey.
6. Click OK to save the changes.
Overview
34
BitDefender Internet Security 2010
6.6.2. Laptop Mode
Laptop Mode is especially designed for laptop and notebook users. Its purpose is to minimize BitDefender's impact on power consumption while these devices are running on battery. While in Laptop Mode, scheduled scan tasks are not performed, as they require more system resources and, implicitly, increase power consumption.
BitDefender detects when your laptop has switched to battery power and it automatically enters Laptop Mode. Likewise, BitDefender automatically exits Laptop Mode, when it detects the laptop is no longer running on battery.
To use Laptop Mode, you must specify in the configuration wizard that you are using a laptop. If you did not select the appropriate option when running the wizard, you can later enable Laptop Mode as follows:
1. Open BitDefender.
2. Click the Settings button in the upper-right corner of the window.
3. In the General Settings category, select the check box corresponding to Laptop Mode Detection.
4. Click OK to save and apply the changes.

6.7. Automatic Device Detection

BitDefender automatically detects when you connect a removable storage device to your computer and offers to scan it before you access its files. This is recommended in order to prevent viruses and other malware from infecting your computer.
Detected devices fall into one of these categories:
CDs/DVDs
USB storage devices, such as flash pens and external hard-drives
mapped (remote) network drives
When such a device is detected, an alert window is displayed.
Overview
35
BitDefender Internet Security 2010
To scan the storage device, just click Yes. The Antivirus Scan wizard will appear and guide you through the scanning process. For detailed information about this wizard, please refer to
Antivirus Scan Wizard” (p. 52).
If you do not want to scan the device, you must click No. In this case, you may find one of these options useful:
Don't ask me again about this type of device
- BitDefender will no longer offer to scan storage devices of this type when they are connected to your computer.
Disable automatic device detection - You will
no longer be prompted to scan new storage devices when they are connected to the computer.
If you accidentally disabled automatic device detection and you want to enable it, or if you want to configure its settings, follow these steps:
1. Open BitDefender and switch the user interface to Expert Mode.
2. Go to Antivirus>Virus Scan.
3. In the list of scan tasks, locate the Device Detection Scan task.
4. Right-click the task and select Open. A new window will appear.
5. On the Overview tab, configure the scanning options as needed. For more information, please refer to Configuring Scan Settings” (p. 135).
6. On the Detection tab, choose which types of storage devices to be detected.
7. Click OK to save and apply the changes.
Device Detection Alert
Overview
36
BitDefender Internet Security 2010

7. Fixing Issues

BitDefender uses an issue tracking system to detect and inform you about the issues that may affect the security of your computer and data. By default, it will monitor only a series of issues that are considered to be very important. However, you can configure it as needed, choosing which specific issues you want to be notified about.
This is how pending issues are notified:
A special symbol is displayed over the BitDefender icon in the system tray to
indicate pending issues.
Red triangle with an exclamation mark: Critical issues affect the security
of your system. They require your immediate attention and must be fixed as soon as possible.
Yellow triangle with an exclamation mark: Non-critical issues affect the
security of your system. You should check and fix them when you have the time.
Also, if you move the mouse cursor over the icon, a pop-up will confirm the existence of pending issues.
When you open BitDefender, the Security Status area will indicate the number of
issues affecting your system.
In Intermediate Mode, the security status is shown on the Dashboard tab.
In Expert Mode, go to General>Dashboard to check the security status.

7.1. Fix All Issues Wizard

The easiest way to fix the existing issues is to follow the step-by-step Fix All Issues wizard. The wizard helps you easily remove any threats to your computer and data security. To open the wizard, do any of the following:
Right-click the BitDefender icon in the system tray and select Fix All Issues.
Open BitDefender. Depending on the user interface mode, proceed as follows:
In Novice Mode, click Fix All Issues.
In Intermediate Mode, go to the Dashboard tab and click Fix All Issues.
In Expert Mode, go to General>Dashboard and click Fix All Issues.
Fixing Issues
37
BitDefender Internet Security 2010
Fix All Issues Wizard
The wizard displays the list of existing security vulnerabilities on your computer.
All current issues are selected to be fixed. If there is an issue that you do not want to be fixed, just select the corresponding check box. If you do so, its status will change to Skip.
Note
If you do not want to be notified about specific issues, you must configure the tracking system accordingly, as described in the next section.
To fix the selected issues, click Start. Some issues are fixed immediately. For others, a wizard helps you fix them.
The issues that this wizard helps you fix can be grouped into these main categories:
Disabled security settings. Such issues are fixed immediately, by enabling
the respective security settings.
Preventive security tasks you need to perform. An example of such a task
is scanning your computer. It is recommended that you scan your computer at least once a week. BitDefender will automatically do that for you in most cases. However, if you have changed the scanning schedule or if the schedule is not completed, you will be notified about this issue.
When fixing such issues, a wizard helps you successfully complete the task.
Fixing Issues
38
BitDefender Internet Security 2010
System vulnerabilities. BitDefender automatically checks your system for
vulnerabilities and alerts you about them. System vulnerabilities include the following:
weak passwords to Windows user accounts.
outdated software on your computer.
missing Windows updates.
Windows Automatic Updates is disabled.
When such issues are to be fixed, the vulnerability scan wizard is started. This wizard assists you in fixing the detected system vulnerabilities. For detailed information, please refer to section Vulnerability Check Wizard” (p. 64).

7.2. Configuring Issue Tracking

The issue tracking system is pre-configured to monitor and alert you about the most important issues that may affect the security of your computer and data. Additional issues may be monitored based on the choices you make in the configuration wizard (when you configure your usage profile). Besides the issues monitored by default, there are several other issues you can be informed about.
You can configure the tracking system to best serve your security needs by choosing which specific issues to be informed about. You can do that either in Intermediate Mode or in Expert Mode.
In Intermediate Mode, the tracking system can be configured from separate
locations. Follow these steps:
1. Go to the Security, Parental or File Vault tab.
2. Click Configure Status Tracking.
3. Select the check boxes corresponding to the items you want to be monitored.
For detailed information, please refer to the “Intermediate Mode” (p. 89) part of this user guide.
In Expert Mode, the tracking system can be configured from a central location.
Follow these steps:
1. Go to General>Dashboard.
2. Click Configure Status Tracking.
3. Select the check boxes corresponding to the items you want to be monitored.
For detailed information, please refer to chapter Dashboard” (p. 112).
Fixing Issues
39
BitDefender Internet Security 2010

8. Configuring Basic Settings

You can configure the main product settings (including changing the user interface view mode) from the basic settings window. To open it, do any of the following:
Open BitDefender and click the Settings button in the upper-right corner of the
window.
Right-click the BitDefender icon in the system tray and select Basic Settings.
Note
To configure the product settings in detail, use the Expert Mode interface. For detailed information, please refer to the “Expert Mode” (p. 111) part of this user guide.
Basic Settings
The settings are organized into three categories:
● User Interface Settings
● Security Settings
● General Settings
To apply and save the configuration changes you make, click OK. To close the window without saving the changes, click Cancel.
Configuring Basic Settings
40
BitDefender Internet Security 2010

8.1. User Interface Settings

In this area, you can switch the user interface view mode and reset the usage profile.
Switching the user interface view mode. As described in section “User Interface
View Modes” (p. 22), there are three modes for displaying the user interface. Each
user interface mode is designed for a specific category of users, based on their computer skills. In this way, the user interface accommodates all kinds of users, from computer beginners to very technical people.
The first button shows the current user interface view mode. To change the user interface mode, click the arrow on the button and select the desired mode from the menu.
DescriptionMode
Novice Mode
Intermediate Mode
Expert Mode
Suited for computer beginners and people who want BitDefender to protect their computer and data without being bothered. This mode is simple to use and requires minimal interaction on your side.
All you have to do is fix the existing issues when indicated by BitDefender. An intuitive step-by-step wizard assists you in fixing issues. Additionally, you can perform common tasks, such as updating the BitDefender virus signature and product files or scanning the computer.
Aimed at users with average computer skills, this mode extends what you can do in Novice Mode.
You can fix issues separately and choose which issues to be monitored. Moreover, you can manage remotely the BitDefender products installed on the computers in your household.
Suited for more technical users, this mode allows you to fully configure each functionality of BitDefender. You can also use all tasks provided to protect your computer and data.
Resetting the usage profile. The usage profile reflects the main activities performed on the computer. Depending on the usage profile, the product interface is organized to allow easy access to your preferred tasks.
To reconfigure the usage profile, click Reset Usage Profile and follow the configuration wizard.
Configuring Basic Settings
41
BitDefender Internet Security 2010

8.2. Security Settings

In this area, you can enable or disable product settings that cover various aspects of computer and data security. The current status of a setting is indicated using one of these icons:
Green circle with a check mark: The setting is enabled. Red circle with an exclamation mark: The setting is disabled.
To enable / disable a setting, select / clear the corresponding Enable check box.
Warning
Use caution when disabling real-time antivirus protection, firewall or automatic update. Disabling these features may compromise your computer's security. If you really need to disable them, remember to re-enable them as soon as possible.
The entire list of settings and their description is provided in the following table:
DescriptionSetting
Antivirus
Automatic Update
Vulnerability Check
Antispam
Antiphishing
Identity Control
IM Encryption
Parental Control
Real-time protection ensures that all files are scanned as they are accessed by you or by an application running on this system.
Automatic update ensures that the newest BitDefender product and signature files are downloaded and installed automatically, on a regular basis.
Automatic vulnerability check ensures that crucial software on your PC is up-to-date.
Antispam filters the e-mail messages that you receive, marking unsolicited and junk mail as SPAM.
Antiphishing detects and alerts you in real-time if a web page is set up to steal personal information.
Identity Control helps you prevent your personal data from being sent out on the Internet without your consent. It blocks any instant messages, e-mail messages or web forms transmitting data you defined as being private to unauthorized recipients (addresses).
IM (Instant Messaging) Encryption secures your conversations via Yahoo! Messenger and Windows Live Messenger provided that your IM contacts use a compatible BitDefender product and IM software.
Parental Control restricts the computer and online activities of your children based on the rules you
Configuring Basic Settings
42
BitDefender Internet Security 2010
DescriptionSetting
defined. Restrictions may include blocking inappropriate web sites, as well as limiting gaming and Internet access according to a specified schedule.
Firewall
File Encryption
The status of some of these settings may be monitored by the BitDefender issue tracking system. If you disable a monitored setting, BitDefender will indicate this as an issue that you need to fix.
If you do not want a monitored setting that you disabled to be shown as an issue, you must configure the tracking system accordingly. You can do that either in Intermediate Mode or in Expert Mode.
In Intermediate Mode, the tracking system can be configured from separate
locations, based on settings categories. For detailed information, please refer to the “Intermediate Mode” (p. 89) part of this user guide.
In Expert Mode, the tracking system can be configured from a central location.
Follow these steps:
1. Go to General>Dashboard.
2. Click Configure Status Tracking.
3. Clear the check box corresponding to the item you want not to be monitored.
For detailed information, please refer to chapter Dashboard” (p. 112).
Firewall protects your computer from hacker and malicious outside attacks.
File Encryption keeps your documents private by encrypting them in special vaulted drives. If you disable File Encryption, all file vaults will be locked and you will no longer be able to access the files they contain.

8.3. General Settings

In this area, you can enable or disable settings that affect product behavior and user experience. To enable / disable a setting, select / clear the corresponding Enable check box.
The entire list of settings and their description is provided in the following table:
DescriptionSetting
Game Mode
Configuring Basic Settings
Game Mode temporarily modifies protection settings so as to minimize their impact on system performance during games.
43
BitDefender Internet Security 2010
DescriptionSetting
Laptop Mode Detection
Settings Password
BitDefender News
Product Notification Alerts
Scan Activity Bar
Send Virus Reports
Outbreak Detection
Laptop Mode temporarily modifies protection settings so as to minimize their impact on the life of your laptop battery.
This ensures that the BitDefender settings can only be changed by the person who knows this password.
When you enable this option, you will be prompted to configure the settings password. Type the desired password in both fields and click OK to set the password.
By enabling this option, you will receive important company news, product updates or new security threats from BitDefender.
By enabling this option, you will receive information alerts.
The Scan Activity Bar is a small, transparent window indicating the progress of the BitDefender scanning activity. For more information, please refer to Scan
Activity Bar” (p. 30).
By enabling this option, virus scanning reports are sent to BitDefender labs for analysis. Please note that these reports will contain no confidential data, such as your name or IP address, and that they will not be used for commercial purposes.
By enabling this option, reports regarding potential virus-outbreaks are sent to BitDefender labs for analysis. Please note that these reports will contain no confidential data, such as your name or IP address, and that they will not be used for commercial purposes.
Configuring Basic Settings
44
BitDefender Internet Security 2010

9. History and Events

The View Logs link at the bottom of the BitDefender main window opens another window with the BitDefender history & events. This window offers you an overview of the security-related events. For instance, you can easily check if the update was successfully performed, if malware was found on your computer etc.
Events
In order to help you filter the BitDefender history & events, the following categories are provided on the left side:
Antivirus
Antispam
Parental Control
Privacy Control
Firewall
Vulnerability
IM encryption
File Encryption
Game/Laptop Mode
Home Network
History and Events
45
BitDefender Internet Security 2010
Update
Registration
Internet Log
A list of events is available for each category. Each event comes with the following information: a short description, the action BitDefender took on it when it happened, and the date and time when it occurred. If you want to find out more information about a particular event in the list, double click that event.
Click Clear all logs if you want to remove old logs or Refresh to make sure the latest logs are displayed.
History and Events
46
BitDefender Internet Security 2010

10. Registration and My Account

BitDefender Internet Security 2010 comes with 30-day trial period. During the trial period, the product is fully functional and you can test it to see if it meets your expectations. Please note that, after 15 days of evaluation, the product will cease to update, unless you create a BitDefender account. Creating a BitDefender account is a mandatory part of the registration process.
Before the trial period is over, you must register the product in order to keep your computer protected. Registration is a two-step process:
1. Product activation (registration of a BitDefender account). You must create a BitDefender account in order to receive updates and to have access to free technical support. If you already have a BitDefender account, register your BitDefender product to that account. BitDefender will notify you that you need to activate your product and it will help you fix this issue.
Important
You must create an account within 15 days after installing BitDefender (if you register it with a license key, the deadline is extended to 30 days). Otherwise, BitDefender will no longer update.
2. Registration with a license key. The license key specifies how long you are entitled to use the product. As soon as the license key expires, BitDefender stops performing its functions and protecting your computer. You must register the product with a license key when the trial period ends. You should purchase a license key or renew your license a few days before the current license key expires.

10.1. Registering BitDefender Internet Security 2010

If you want to register the product with a license key or to change the current license key, click the Register Now link, located at the bottom of the BitDefender window. The product registration window will appear.
Registration and My Account
47
BitDefender Internet Security 2010
Registration
You can see the BitDefender registration status, the current license key and how many days are left until the license expires.
To register BitDefender Internet Security 2010:
1. Type the license key in the edit field.
Note
You can find your license key:
on the CD label.
on the product registration card.
in the online purchase e-mail.
If you do not have a BitDefender license key, click the provided link to go to the BitDefender online store and buy one.
2. Click Register Now.
3. Click Finish.

10.2. Activating BitDefender

To activate BitDefender, you must create or sign in to a BitDefender account. If you did not register a BitDefender account during the initial registration wizard, you can do that as follows:
Registration and My Account
48
BitDefender Internet Security 2010
In Novice Mode, click Fix All Issues. The wizard will help you fix all pending
issues, including activating the product.
In Intermediate Mode, go to the Security tab and click the Fix button
corresponding to the issue regarding the product activation.
In Expert Mode, go to Registration and click the Activate Product button.
The account registration window will open. This is where you can create or sign in into a BitDefender account to activate your product.
Account Creation
If you do not want to create a BitDefender account at the moment, select Register later and click Finish. Otherwise, proceed according to your current situation:
● “I do not have a BitDefender account” (p. 49)
● “I already have a BitDefender account” (p. 50)
Important
You must create an account within 15 days after installing BitDefender (if you register it with a license key, the deadline is extended to 30 days). Otherwise, BitDefender will no longer update.
I do not have a BitDefender account
To successfully create a BitDefender account, follow these steps:
Registration and My Account
49
BitDefender Internet Security 2010
1. Select Create a new account.
2. Type the required information in the corresponding fields. The data you provide here will remain confidential.
E-mail address - type in your e-mail address.
Password - type in a password for your BitDefender account. The password
must be between 6 and 16 characters long.
Re-type password - type in again the previously specified password.
Note
Once the account is activated, you can use the provided e-mail address and password to log in to your account at http://myaccount.bitdefender.com.
3. Optionally, BitDefender can inform you about special offers and promotions using the e-mail address of your account. Select one of the available options from the menu:
Send me all messages
Send me only product related messages
Don't send me any messages
4. Click Create.
5. Click Finish to complete the wizard.
6. Activate your account. Before being able to use your account, you must activate it. Check your e-mail and follow the instructions in the e-mail message sent to you by the BitDefender registration service.
I already have a BitDefender account
BitDefender will automatically detect if you have previously registered a BitDefender account on your computer. In this case, provide the password of your account and click Sign in. Click Finish to complete the wizard.
If you already have an active account, but BitDefender does not detect it, follow these steps to register the product to that account:
1. Select Sign in (previously created account).
2. Type the e-mail address and the password of your account in the corresponding fields.
Note
If you have forgotten your password, click Forgot your password? and follow the instructions.
Registration and My Account
50
BitDefender Internet Security 2010
3. Optionally, BitDefender can inform you about special offers and promotions using the e-mail address of your account. Select one of the available options from the menu:
Send me all messages
Send me only product related messages
Don't send me any messages
4. Click Sign in.
5. Click Finish to complete the wizard.

10.3. Purchasing License Keys

If the trial period is going to end soon, you must purchase a license key and register your product. Open BitDefender and click the Buy/Renew link, located at the bottom of the window. The link takes you to a web page where you can purchase a license key for your BitDefender product.

10.4. Renewing Your License

As a BitDefender customer, you are eligible for a discount when renewing the license of your BitDefender product. You may also upgrade your product to the current version at a special discount or free of charge.
If your current license key is going to expire soon, you must renew your license. Open BitDefender and click the Buy/Renew link, located at the bottom of the window. The link takes you to a web page where you can renew your license.
Registration and My Account
51
BitDefender Internet Security 2010

11. Wizards

In order to make BitDefender very easy to use, several wizards help you carry out specific security tasks or configure more complex product settings. This chapter describes the wizards that may appear when you fix issues or perform specific tasks with BitDefender. Other configuration wizards are described separately in the “Expert
Mode” (p. 111) part.

11.1. Antivirus Scan Wizard

Whenever you initiate an on-demand scan (for example, right-click a folder and select Scan with BitDefender), the BitDefender Antivirus Scan wizard will appear. Follow the three-step guided procedure to complete the scanning process.
Note
If the scan wizard does not appear, the scan may be configured to run silently, in the background. Look for the scan progress icon in the system tray. You can click this icon to open the scan window and to see the scan progress.
11.1.1. Step 1/3 - Scanning
BitDefender will start scanning the selected objects.
Wizards
Scanning
52
BitDefender Internet Security 2010
You can see the scan status and statistics (scanning speed, elapsed time, number of scanned / infected / suspicious / hidden objects and other).
Wait for BitDefender to finish scanning.
Note
The scanning process may take a while, depending on the complexity of the scan.
Password-protected archives. If BitDefender detects a password-protected archive during scanning and the default action is Prompt for password, you will be prompted to provide the password. Password-protected archives cannot be scanned unless you provide the password. The following options are available:
I want to enter the password for this object. If you want BitDefender to
scan the archive, select this option and type the password. If you do not know the password, choose one of the other options.
I do not want to enter the password for this object (skip this object).
Select this option to skip scanning this archive.
I do not want to enter the password for any object (skip all
password-protected objects). Select this option if you do not want to be bothered about password-protected archives. BitDefender will not be able to scan them, but a record will be kept in the scan log.
Click OK to continue scanning.
Stopping or pausing the scan. You can stop scanning anytime you want by clicking Stop&Yes. You will go directly to the last step of the wizard. To temporarily stop the scanning process, just click Pause. You will have to click Resume to resume scanning.
11.1.2. Step 2/3 - Select Actions
When the scanning is completed, a new window will appear, where you can see the scan results.
Wizards
53
BitDefender Internet Security 2010
Actions
You can see the number of issues affecting your system.
The infected objects are displayed in groups, based on the malware they are infected with. Click the link corresponding to a threat to find out more information about the infected objects.
You can choose an overall action to be taken for all issues or you can select separate actions for each group of issues.
One or several of the following options can appear on the menu:
Wizards
Take No Action
Move to quarantine
Rename files
DescriptionAction
No action will be taken on the detected files. After the scan is completed, you can open the scan log to view information on these files.
Removes the malware code from infected files.Disinfect
Deletes detected files.Delete
Moves detected files to quarantine. Quarantined files cannot be executed or opened; therefore, the risk of getting infected disappears.
Changes the name of hidden files by appending .bd.ren to their name. As a result, you will be able
54
BitDefender Internet Security 2010
DescriptionAction
to search for and find such files on your computer, if any.
Please note that these hidden files are not the files that you deliberately hide from Windows. They are the files hidden by special programs, known as rootkits. Rootkits are not malicious in nature. However, they are commonly used to make viruses or spyware undetectable by normal antivirus programs.
Click Continue to apply the specified actions.
11.1.3. Step 3/3 - View Results
When BitDefender finishes fixing the issues, the scan results will appear in a new window.
Summary
You can see the results summary. If you want comprehensive information on the scanning process, click Show log file to view the scan log.
Important
If required, please restart your system in order to complete the cleaning process.
Wizards
55
BitDefender Internet Security 2010
Click Close to close the window.
BitDefender Could Not Solve Some Issues
In most cases BitDefender successfully disinfects the infected files it detects or it isolates the infection. However, there are issues that cannot be solved.
In these cases, we recommend you to contact the BitDefender Support Team at
www.bitdefender.com. Our support representatives will help you solve the issues
you are experiencing.
BitDefender Detected Suspect Files
Suspect files are files detected by the heuristic analysis as potentially infected with malware the signature of which has not been released yet.
If suspect files were detected during the scan, you will be requested to submit them to the BitDefender Lab. Click OK to send these files to the BitDefender Lab for further analysis.

11.2. Custom Scan Wizard

The Custom Scan Wizard lets you create and run a custom scan task and optionally save it as a Quick Task when using BitDefender in Intermediate Mode.
To run a custom scan task using the Custom Scan Wizard you must follow these steps:
1. In Intermediate Mode, go to the Security tab.
2. In the Quick Tasks area, click Custom Scan.
3. Follow the six-step guided procedure to complete the scanning process.
11.2.1. Step 1/6 - Welcome Window
This is a welcome window.
Wizards
56
BitDefender Internet Security 2010
Welcome Window
If you want to skip over this window when running this wizard in the future, select the Don't show this step the next time this wizard is run check box.
Click Next.
11.2.2. Step 2/6 - Select Target
Here you can specify the files or folders to be scanned as well as the scan options.
Wizards
57
BitDefender Internet Security 2010
Select Target
Click Add Target, select the files or folders that you want to scan and click OK. The paths to the selected locations will appear in the Scan Target column. If you change your mind about the location, just click the Remove button next to it. Click the Remove All button to remove all the locations that were added to the list.
When you are done selecting the locations, set the Scan Options. The following are available:
Wizards
DescriptionOption
Scan all files
Scan files with application extensions only .bat; .com; .dll; .ocx; .scr; .bin; .dat; .386;
Select this option to scan all the files in the selected folders.
Only the program files will be scanned. This means only the files with the following extensions: .exe;
.vxd; .sys; .wdm; .cla; .class; .ovl; .ole; .exe; .hlp; .doc; .dot; .xls; .ppt; .wbk; .wiz; .pot; .ppa; .xla; .xlt; .vbs; .vbe; .mdb; .rtf; .htm; .hta; .html; .xml; .xtp; .php; .asp; .js; .shs; .chm; .lnk; .pif; .prc; .url; .smm; .pdf; .msi; .ini; .csc; .cmd; .bas; .eml and .nws.
58
BitDefender Internet Security 2010
DescriptionOption
Scan user defined extensions only
Click Next.
11.2.3. Step 3/6 - Select Actions
Here you can specify the scanner settings and the scan level.
Only the files with the extensions specified by the user will be scanned. These extensions must be separated by ";".
Select Actions
Select the actions to be taken on the infected and suspect files detected. The
following options are available:
DescriptionAction
Take No Action
Disinfect files
Delete files
No action will be taken on infected files. These files will appear in the report file.
Remove the malware code from the infected files detected.
Deletes infected files immediately, without any warning.
Wizards
59
BitDefender Internet Security 2010
DescriptionAction
Move files to Quarantine
Select the action to be taken on the hidden (rootkits) files. The following options
are available:
Take No Action
Rename
Configure scanner aggressiveness. There are 3 levels to choose from. Drag the
slider along the scale to set the appropriate protection level:
DescriptionScan Level
Permissive
Default
Aggressive
Only applications files are scanned and only for viruses. The resource consumption level is low.
The resource consumption level is moderate. All files are scanned for viruses and spyware.
All files (including archives) are scanned for viruses and spyware. Hidden files and processes are included in the scan The resource consumption level is higher.
Moves infected files into the quarantine. Quarantined files cannot be executed or opened; therefore, the risk of getting infected disappears.
DescriptionAction
No action will be taken on hidden files. These files will appear in the report file.
Changes the name of hidden files by appending .bd.ren to their name. As a result, you will be able to search for and find such files on your computer, if any.
Wizards
Advanced users might want to take advantage of the scan settings BitDefender offers. The scanner can be set to search only for specific malware threats. This may greatly reduce scanning times and improve your computer's responsiveness during a scan.
Drag the slider to select Custom and then click the Custom level button. A window will appear. Specify the type of malware you want BitDefender to scan for by selecting the appropriate options:
DescriptionOption
Scans for known viruses.Scan for viruses
60
BitDefender Internet Security 2010
DescriptionOption
BitDefender detects incomplete virus bodies, too, thus removing any possible threat that could affect your system's security.
Scan for adware
Scan for spyware
Scan for applications
Scan for dialers
Scan for rootkits
Scan for keyloggers
Scans for adware threats. Detected files will be treated as infected. The software that includes adware components might stop working if this option is enabled.
Scans for known spyware threats. Detected files will be treated as infected.
Scan for legitimate applications that can be used as a spying tool, to hide malicious applications or for other malicious intent.
Scans for applications dialing high-cost numbers. Detected files will be treated as infected. The software that includes dialer components might stop working if this option is enabled.
Scans for hidden objects (files and processes), generally known as rootkits.
Scans for malicious applications that record keystrokes.
Click OK to close the window.
Click Next.
11.2.4. Step 4/6 - Additional Settings
Before scanning begins, additional options are available:
Wizards
61
BitDefender Internet Security 2010
Additional Settings
To save the custom task you are creating for future use select the Show this
task in Intermediate UI check box and enter a name for the task in the provided edit field.
The task will be added to the list of Quick Tasks already available in the Security tab and will also appear in Expert Mode > Antivirus > Virus Scan.
To shut down the computer after scanning is completed, select the Shut down
the computer after scan finishes if no threats are found check box.
Click Start Scan.
11.2.5. Step 5/6 - Scanning
BitDefender will start scanning the selected objects:
Wizards
62
BitDefender Internet Security 2010
Scanning
Note
The scanning process may take a while, depending on the complexity of the scan. You can click the scan progress icon in the system tray to open the scan window and see the scan progress.
11.2.6. Step 6/6 - View Results
When BitDefender completes the scanning process, the scan results will appear in a new window:
Wizards
63
BitDefender Internet Security 2010
Summary
You can see the results summary. If you want comprehensive information on the scanning process, click View Log to view the scan log.
Important
If required, please restart your system in order to complete the cleaning process.
Click Close to close the window.

11.3. Vulnerability Check Wizard

This wizard checks the system for vulnerabilities and helps you fix them.
Wizards
64
BitDefender Internet Security 2010
11.3.1. Step 1/6 - Select Vulnerabilities to Check
Vulnerabilities
Click Next to check the system for the selected vulnerabilities.
Wizards
65
BitDefender Internet Security 2010
11.3.2. Step 2/6 - Checking for Vulnerabilities
Vulnerability Check
Wait for BitDefender to finish checking for vulnerabilities.
Wizards
66
BitDefender Internet Security 2010
11.3.3. Step 3/6 - Update Windows
Windows Updates
You can see the list of critical and non-critical Windows updates that are not currently installed on your computer. Click Install All System Updates to install all the available updates.
Click Next.
Wizards
67
BitDefender Internet Security 2010
11.3.4. Step 4/6 - Update Applications
Applications
You can see the list of applications checked by BitDefender and if they are up to date. If an application is not up to date, click the provided link to download the latest version.
Click Next.
Wizards
68
BitDefender Internet Security 2010
11.3.5. Step 5/6 - Change Weak Passwords
User Passwords
You can see the list of the Windows user accounts configured on your computer and the level of protection their password provides. A password can be strong (hard to guess) or weak (easy to crack by malicious people with specialized software).
Click Fix to modify the weak passwords. A new window will appear.
Change Password
Select the method to fix this issue:
Force user to change password at next login. BitDefender will prompt the
user to change the password the next time the user logs on to Windows.
Wizards
69
BitDefender Internet Security 2010
Change user password. You must type the new password in the edit fields.
Make sure to inform the user about the password change.
Note
For a strong password, use a combination of uppercase and lowercase letters, numbers and special characters (such as #, $ or @). You can search the Internet for more information and tips on creating strong passwords.
Click OK to change the password.
Click Next.
11.3.6. Step 6/6 - View Results
Results
Click Close.

11.4. File Vault Wizards

The File Vault wizards help you create and manage BitDefender file vaults. A file vault is an encrypted storage space on your computer where you can securely store important files, documents and even entire folders.
Wizards
70
BitDefender Internet Security 2010
These wizards do not appear when you fix issues, because file vaults are an optional method of protecting your data. They can only be started from the Intermediate Mode interface of BitDefender, the File Storage tab, as follows:
Add File to Vault - starts the wizard that allows you to store your important files
/ documents privately by encrypting them in special, vaulted drives.
Remove Vault Files - starts the wizard that allows you to erase data from the
file vault.
View File Vault - starts the wizard that allows you to view the content of your
file vaults.
Lock File Vault - starts the wizard that allows you to lock an open file vault in
order to protect its content.
11.4.1. Add Files to Vault
This wizard helps you create a file vault and add files to it in order to safely store them on your computer.
Step 1/6 - Select Target
Here you can specify the files or folders to be added to vault.
Wizards
Target
71
BitDefender Internet Security 2010
Click Add Target, select the file or folder that you want to add and click OK. The path to the selected location will appear in the Path column. If you change your mind about the location, just click the Remove button next to it.
Note
You can select one or several locations.
Click Next.
Step 2/6 - Select Vault
This is where you can create a new vault or choose an existing vault.
Select Vault
If you select Browse for a File Vault, you must click Browse and select the file vault. You will go either to the step 5 if the selected vault is opened (mounted ) or to the step 4 if it is locked (unmounted).
If you click Select an existing File Vault, then you must click the desired vault name. You will go either to the step 5 if the selected vault is opened (mounted ) or to the step 4 if it is locked (unmounted).
Select Create New File Vault if none of the existing vaults are suitable for your needs. You will go to the step 3.
Click Next.
Wizards
72
BitDefender Internet Security 2010
Step 3/6 - Create Vault
This is where you can specify information for the new Vault.
Create Vault
To complete the file vault related information follow these steps:
1. Click Browse and choose a location for the bvd file.
Note
Remember that the file vault is an encrypted file on your computer with the bvd extension.
2. Select a drive letter for the new file vault from the corresponding drop-down menu.
Note
Remember that when you mount the bvd file, a new logical partition (a new drive) will appear.
3. Type a password for the file vault into the corresponding field.
Note
The password must have at least 8 characters.
4. Re-type the password.
Wizards
73
BitDefender Internet Security 2010
5. Set the size of the file vault (in MB) by typing a number into the corresponding field.
Click Next.
You will go to the step 5.
Step 4/6 - Password
This is where you will be asked to enter the password for the selected vault.
Enter password
Type the password into the corresponding field and click Next.
Step 5/6 - Summary
This is where you can review chosen operations.
Wizards
74
BitDefender Internet Security 2010
Summary
Click Next.
Step 6/6 - Results
This is where you can view the vault content.
Wizards
75
BitDefender Internet Security 2010
Results
Click Finish.
11.4.2. Remove Vault Files
This wizard helps you remove files from a specific file vault.
Step 1/5 - Select Vault
Here you can specify the vault to remove files from.
Wizards
76
BitDefender Internet Security 2010
Select Vault
If you select Browse for a File Vault, you must click Browse and select the file vault. You will go either to the step 3 if the selected vault is opened (mounted ) or to the step 2 if it is locked (unmounted).
If you click Select an existing File Vault, then you must click the desired vault name. You will go either to the step 3 if the selected vault is opened (mounted ) or to the step 2 if it is locked (unmounted).
Click Next.
Step 2/5 - Password
This is where you will be asked to enter the password for the selected vault.
Wizards
77
BitDefender Internet Security 2010
Enter password
Type the password into the corresponding field and click Next.
Step 3/5 - Select files
This is where you will be provided with the list of the files from the previously selected vault.
Wizards
78
BitDefender Internet Security 2010
Select files
Select the files to be removed and click Next.
Step 4/5 - Summary
This is where you can review chosen operations.
Wizards
79
BitDefender Internet Security 2010
Summary
Click Next.
Step 5/5 - Results
This is where you can view operation result.
Wizards
80
BitDefender Internet Security 2010
Results
Click Finish.
11.4.3. View File Vault
This wizard helps you open a specific file vault and view the files it contains.
Step 1/4 - Select Vault
Here you can specify the vault to view files from.
Wizards
81
BitDefender Internet Security 2010
Select Vault
If you select Browse for a File Vault, you must click Browse and select the file vault. You will go either to the step 3 if the selected vault is opened (mounted ) or to the step 2 if it is locked (unmounted).
If you click Select an existing File Vault, then you must click the desired vault name. You will go either to the step 3 if the selected vault is opened (mounted ) or to the step 2 if it is locked (unmounted).
Click Next.
Step 2/4 - Password
This is where you will be asked to enter the password for the selected vault.
Wizards
82
Loading...