Bitdefender 8 Standard manual

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63

Ir para a página of

Bom manual de uso

As regras impõem ao revendedor a obrigação de fornecer ao comprador o manual com o produto Bitdefender 8 Standard. A falta de manual ou informações incorretas fornecidas ao consumidor são a base de uma queixa por não conformidade do produto com o contrato. De acordo com a lei, pode anexar o manual em uma outra forma de que em papel, o que é frequentemente utilizado, anexando uma forma gráfica ou manual electrónicoBitdefender 8 Standard vídeos instrutivos para os usuários. A condição é uma forma legível e compreensível.

O que é a instrução?

A palavra vem do latim "Instructio" ou instruir. Portanto, no manual Bitdefender 8 Standard você pode encontrar uma descrição das fases do processo. O objetivo do manual é instruir, facilitar o arranque, a utilização do equipamento ou a execução de determinadas tarefas. O manual é uma coleção de informações sobre o objeto / serviço, um guia.

Infelizmente, pequenos usuários tomam o tempo para ler o manual Bitdefender 8 Standard, e um bom manual não só permite conhecer uma série de funcionalidades adicionais do dispositivo, mas evita a formação da maioria das falhas.

Então, o que deve conter o manual perfeito?

Primeiro, o manual Bitdefender 8 Standard deve conte:
- dados técnicos do dispositivo Bitdefender 8 Standard
- nome do fabricante e ano de fabricação do dispositivo Bitdefender 8 Standard
- instruções de utilização, regulação e manutenção do dispositivo Bitdefender 8 Standard
- sinais de segurança e certificados que comprovam a conformidade com as normas pertinentes

Por que você não ler manuais?

Normalmente, isso é devido à falta de tempo e à certeza quanto à funcionalidade específica do dispositivo adquirido. Infelizmente, a mesma ligação e o arranque Bitdefender 8 Standard não são suficientes. O manual contém uma série de orientações sobre funcionalidades específicas, a segurança, os métodos de manutenção (mesmo sobre produtos que devem ser usados), possíveis defeitos Bitdefender 8 Standard e formas de resolver problemas comuns durante o uso. No final, no manual podemos encontrar as coordenadas do serviço Bitdefender na ausência da eficácia das soluções propostas. Atualmente, muito apreciados são manuais na forma de animações interessantes e vídeos de instrução que de uma forma melhor do que o o folheto falam ao usuário. Este tipo de manual é a chance que o usuário percorrer todo o vídeo instrutivo, sem ignorar especificações e descrições técnicas complicadas Bitdefender 8 Standard, como para a versão papel.

Por que ler manuais?

Primeiro de tudo, contem a resposta sobre a construção, as possibilidades do dispositivo Bitdefender 8 Standard, uso dos acessórios individuais e uma gama de informações para desfrutar plenamente todos os recursos e facilidades.

Após a compra bem sucedida de um equipamento / dispositivo, é bom ter um momento para se familiarizar com cada parte do manual Bitdefender 8 Standard. Atualmente, são cuidadosamente preparados e traduzidos para sejam não só compreensíveis para os usuários, mas para cumprir a sua função básica de informação

Índice do manual

  • Página 1

    BitDefender 8 Standard User Guide[...]

  • Página 2

    Table of Contents Terms of agreement ............................................................................. 4 Software licensing ......................................................................................................................... 4 License and warranty .....................................................................[...]

  • Página 3

    Table of contents 3 Automatic Update .........................................................................................................................20 Product registration ................................................................................................................ 20 Management console settings ........................[...]

  • Página 4

    Terms of agreement Software licensing The BitDefender package is protected by the copyright law and the international treaties regarding the copyright, as well as other laws and treaties regarding the intellectual property. The copyright law, as well as other intellectual property laws, protects in many countries the software owner's rights, a[...]

  • Página 5

    Terms of agreement License and warranty IF YOU DO NOT AGREE TO THESE TERMS AND CONDITIONS DO NOT INSTALL THE SOFTWARE. BY CLICKING "I ACCEPT", "OK", "CONTINUE", "YES" OR BY INSTALLING OR USING THE SOFTWARE IN ANY WAY, YOU ARE INDICATING YOUR COMPLETE UNDERSTANDING AND ACCEPTANCE OF THE TERMS OF THIS AGREEMENT[...]

  • Página 6

    Terms of agreement resulting upgraded product only in accordance with the terms of this License Agreement. If BitDefender is an upgrade of a component of a package of software programs that you have licensed as a single product, BitDefender may be used and transferred only as part of that single product package and may not be separated for use on m[...]

  • Página 7

    Terms of agreement GOVERNMENT RESTRICTED RIGHTS/RESTRICTED RIGHTS LEGEND. Use, duplication, or disclosure by the Government is subject to restrictions as set forth in subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.227-7013 or subparagraphs (c)(1) and (2) of Commercial Computer Software-Restricted R[...]

  • Página 8

    BitDefender Rescue System BitDefender 8 Standard comes with a bootable CD ( BitDefender Rescue System based on LinuxDefender ) capable to scan and disinfect all existing hard drives before your operating system starts . You should use BitDefender Rescue System any time your operating system is not working properly because of virus infections. That [...]

  • Página 9

    BitDefender Rescue System Figure 1 Install the NTFS-driver Click the Install NTFS Write Drivers icon using your left mouse key. In the window that will appear, click Forward twice. This will start the NTFS Driver installation. BitDefender Rescue System requires two drivers ( ntoskrnl.exe and ntfs.sys ) in order to read the files on your hard disk. [...]

  • Página 10

    BitDefender Rescue System Figure 2 The following options are available:  Scan Archives - Scan inside archives.  Scan Packed – Scan packed programs  Scan Mail - Scan the mail database  QuarDir – The default path to the quarantine folder is: /ramdisk/BitDefender/var/quarantine . If you want to change the quarantine folder click Browse[...]

  • Página 11

    BitDefender Rescue System Start the scan process Click the Scan tab. Figure 3 In the Scan Dir field you must specify the path to the hard disk you want to scan. Examples: If you have one hard disk with 3 partitions, you must scan each partition separately. • /mnt/hda1 – for the first partition; • /mnt/hda2 – for the second partition; • /m[...]

  • Página 12

    Product installation System requirements To ensure a proper functioning of the product, before installation, verify that the following system requirements are met: Minimum Processor : Pentium 200MHz Minimum hard disk space : 40MB Minimum RAM Memory : 64MB (128MB Recommended) Operating system : Windows 98/NT-SP6/ME/2000/XP; Internet Explorer 4.0 (+)[...]

  • Página 13

    Installation Figure 4 Installation steps: 1. Click Next to continue or click Cancel if you want to quit installation. 2. Click Next to continue or click Back to return to the first step. 3. Please read the License Agreement , select I accept the terms in the License Agreement and click Next . If you do not agree with these terms click Cancel . The [...]

  • Página 14

    Installation You can select the folder where you want to install the product. The default folder is C:Program FilesSoftwinBitDefender 8 . If you want t select the fo o select another folder, click Browse and in the window that will open, lder you wish BitDefender to be installed in. Click Next . 7. You onnected to the Internet to update. end of [...]

  • Página 15

    Description and features Description BitDefender Standard Edition is a powerful antivirus tool with features that best meet your security needs. Ease of use and automatic updating make BitDefender Standard Edition an "install and forget" antivirus product. Main Features BitDefender 8 Standard includes 2 protection modules: Antivirus and U[...]

  • Página 16

    Description and features Quarantine zone Suspicious/infected files can optionally be backed up into a safe quarantine area before being disinfected or deleted. The contents of the quarantine can be sent to BitDefender Labs, for detailed analysis. Files that proved harmless can be easily moved out of quarantine, back to their original place. Full e-[...]

  • Página 17

    The Management Console General view BitDefender 8 Standard was designed with a centralized management console, which allows the configuration of the protection options for all BitDefender modules. In other words, it is enough to open the management console in order to have access to all modules: Antivirus and Update . To access the management conso[...]

  • Página 18

    The management console When the console is minimized, an icon will appear in the system tray ( Figure 6 ). Figure 6 Figure 7 If you double-click this icon, the management console will open. Also, by right-clicking it, a pop menu, as in Figure 7 , containing the following options, will appear.  Show – opens the management console.  Close –[...]

  • Página 19

    The management console General module BitDefender comes fully configured for maximum security. Essential status information about all the BitDefender modules is displayed in the General module. The General module contains 4 different sections: Status , Registration , Settings and About . Status Here you can review information regarding the product [...]

  • Página 20

    The management console Automatic Update New viruses are found and identified every day. This is why it is very important to keep BitDefender up to date with the latest virus signatures. It displays the date of the last update and the number of viruses that can be detected (and therefore disinfected) from your BitDefender database. To protect your c[...]

  • Página 21

    The management console Figure 11 Type in the license key in the Serial field. Click Register to finish the registration process. If you mistype the license key you will be prompted to re-enter it. If you type in a valid license key a success message box appears. In the Registration section now, you can see the expiring date of the new license key. [...]

  • Página 22

    The management console The next window will appear: Figure 13 Input the password in the Password field, re-type it in the Retype password field and click OK . From now on, if you want to change the BitDefender configuration options, you will be asked to type in the password. If you forgot the passw ord you w ill have to repair the product in order [...]

  • Página 23

    The management console About In this section you can find the contact information and the product details. BitDefender TM provides security solutions to satisfy the protection requirements of today's computing environment, delivering effective threat management for over 38 million home and corporate users in more than 100 countries. BitDefende[...]

  • Página 24

    The management console Antivirus module BitDefender protects you from viruses entering your system by scanning your files, e- mail messages, downloads and all other content as it enters your system. More features From the antivirus module you have access to all BitDefender antivirus settings and features. On-access scanning and On-demand scanning V[...]

  • Página 25

    The management console On access scanning In case you haven’t already opened the managem ent console, you can access it from the Windows Start menu, following the path Start → Programs → BitDefender → BitDefender 8 Standard or quicker, double click the BitDefender icon from the system tray. In the management console, click Antivirus . Figur[...]

  • Página 26

    The management console Registry Control keeps an eye on the Windows Registry - this is again useful for detecting Trojan horses. It will alert you whenever a program will try to modify a registry entry in order to be executed at Windows start-up. Figure 15 You can deny this modification by clicking No or you can allow it by clicking Yes . If you wa[...]

  • Página 27

    The management console Select the most important settings To select an option, just click with the mouse on the corresponding check box:  Scan incoming email – all the incoming e-mail messages will be scanned by BitDefender. This is highly recommended!  Scan accessed files – all the accessed files will be scanned by BitDefender.  Show [...]

  • Página 28

    The management console  Select Scan accessed files and P2P transfers to scan the accessed files and the communications through Instant Messaging Software applications (ICQ, NetMeeting, Yahoo Messenger, MSN Messenger). Further on, select the type of the files you want to be scanned. The following options are available: Option Description Scan all[...]

  • Página 29

    The management console The following options are available. Action Description Deny access and continue In case an infected file is detected, the access to this will be denied. Clean file To disinfect the infected file. Delete file Deletes the infected files immediately, without any warning. Move to quarantine The infected files are moved into quar[...]

  • Página 30

    The management console On demand scanning The main objective for BitDefender is to keep your computer clean of viruses. This is first and foremost done by keeping new viruses out of your computer and by scanning your e-mail messages and any new files downloaded or copied to your system. There is a risk that a virus is already l odged in your system[...]

  • Página 31

    The management console Figure 18 The section contains the following buttons:  Add file(s) – opens, a browsing window, where you can select the file(s), you want to scan.  Add folder(s) – same as above, but you select which folder(s) you want BitDefender to scan instead of which file(s). TIP: Use drag & drop to add files/folders to the[...]

  • Página 32

    The management console 4. Select the scan options – only for advanced users Advanced users might want to take advantage of the scan-settings BitDefender offers. The scanner can be set to skip file extensions, di rectories or archives that you know to be harmless. This may greatly reduce scanni ng times and improve your computer's responsiven[...]

  • Página 33

    The management console Option Description Use heuristic detection To use heuristic scanning of the files. The aim of heuristic scanning is to identify new viruses, based on certain patterns and algorithms, before a virus definition is found. False alarm messages can appear. When such a file is detected it is classified as suspicious. In these cases[...]

  • Página 34

    The management console Action Description Rename To change the extension of the infected files. The new extension of the infected files will be .vir . By renaming the infected files, the possibility of executing and thus of spreading the infection is removed. At the same time they can be saved for further examination and analysis. Copy to quarantin[...]

  • Página 35

    The management console 5. Scan for viruses With the scan options selected, all you have to do is to effectively start the system scanning. For that, just click Scan . This may take a while, depending on the size of your hard disk drive! Figure 20 While scanning, BitDefender will show you its progress and alert you if any viruses are found. Select t[...]

  • Página 36

    The management console 6. Alternative scanning methods BitDefender has two alternative methods for scanning files immediately: using the contextual menu and by drag & drop feature. Contextual scanning Figure 21 Right click the file or folder you want scanned and select the Scan with BitDefender 8 option. A report file named vscan.log will be cr[...]

  • Página 37

    The management console Figure 24 You can view the name of the file and the name of the virus. You can select one of the following actions on the infected file:  Disinfect - to disinfect the infected file.  Delete – to delete the infected file.  Copy to quarantine – to copy the infected file in the quarantine zone.  Move to quarantin[...]

  • Página 38

    The management console Scheduled scanning Since the scanning will take some time, and works best if you have closed all other programs, it is best for you to schedule the scanning at a time when you are not using your computer and it is standing idly by. Thi s implies that the user must previously create a so-called task, job or scan event. It has [...]

  • Página 39

    The management console The Scheduler's screen also contains a list where all the scan tasks can be seen, with their names, the date of the first execution, the date of the next execution and the task's type (periodically or one time only). The Scheduler includes a wizard for creating new scan tasks. This will assist you any time you need [...]

  • Página 40

    The management console Figure 27 Type in the At every edit box the number of minutes / hours / days / weeks / months / years you want to repeat this process. You can click the up/down arrows of this box in order to increase / decrease the number of minutes / hours / days / weeks / months / years. Select the interval - minutes, hours, days, weeks, m[...]

  • Página 41

    The management console 4. Target Path Here you have to specify the path to the objects that will be scanned, as observed in the picture. This step is necessary if you have selected to scan files in the previous step. Figure 29 This screen is actually an exploring window that lets you select the partitions and folders to be scanned. When the cursor [...]

  • Página 42

    The management console If you wish to see information about all scanned files, infected or not, select the option List all scanned files . But remember, w ith this option on, the computer will slow down. Click Next . 6. Analysis Ty pe Select the scan type. Figure 31 This, as it can be observed from the picture, implies selecting one of the two scan[...]

  • Página 43

    The management console We recommend you to select the first action Clean and the second action Move to quarantine . For the first action the following options are available: First Action Description Clean file To disinfect the infected files. Delete file To automatically delete, without any warning, all the infected files. Action not recommended! M[...]

  • Página 44

    The management console 8. Report Info Choose how to create a scan report file. Figure 33 To create a scan report, click Create report file . At this moment all the other options for the creation of a report file will be enabled. Type the name of the report file in Report file name box. By default, its name is schedule.log . It will contain all the [...]

  • Página 45

    The management console For each scheduled scan event, you can view its name, its description, the starting date, the next moment when it will be launched, the scan type (periodically or one time scan), the target, the files extensions, the analysis type and the action on the infected files. When modifying a scan event, the same steps w ill be fo ll[...]

  • Página 46

    The management console Isolating the infected files BitDefender allows isolating the infected or suspicious files in a secure area, named quarantine. By isolating these files in the quarantine, the risk of getting infected disappears and, at the same time, you have the possibility to send these files for further analysis to the BitDefender lab. The[...]

  • Página 47

    The management console  Delete – deletes the selected file from your computer.  Restore – returns the selected file to its original location.  Send – sends the selected files for further analysis to the BitDefender lab. You must specify some information before you may submit these files. For that click Settings and complete the field[...]

  • Página 48

    The management console Viewing the report files When launching a scan process, the user has the possibility to opt for creating a report file where he can see information about the scan process. The user may view these reports straight from the management console. In case you haven’t already opened the managem ent console, you can access it from [...]

  • Página 49

    The management console  Refresh – if the management console is open at the Report section and in the meantime you perform a scan of your com puter, the new report file with the scan results (if you selected the Create report file option) will be visible only after you click Refresh .  Browse – opens a window in which you can select the re[...]

  • Página 50

    The management console Removing a found virus Viruses are much easier to stop from entering your system, rather than removing them once they are inside your computer. This is why the virus protection should always be enabled and updated. If BitDefender does detect a resident virus it is recommended to let BitDefender try to remove it. This may fail[...]

  • Página 51

    The management console Update module New viruses are found and identified every day. This is why it is very important to keep BitDefender up to date with the latest virus signatures. By default, BitDefender automatically checks for updates every three hours. Features Updates come in three flavors: • Product upgrades - when a new product version i[...]

  • Página 52

    The management console Manual update In case you haven’t already opened the managem ent console, you can access it from the Windows Start menu, following the path Start → Programs → BitDefender → BitDefender 8 Standard or quicker, double click the BitDefender icon from the system tray. In the management console, click Update . Figure 39 The[...]

  • Página 53

    The management console Automatic update If you're an advanced user, click the Settings tab in order to configure the Update module. Figure 40 Updates can be performed from the local network, over the Internet, directly or through a proxy server. The window with the update settings contains three categories of options ( Update location settings[...]

  • Página 54

    The management console Syntax: domainuser . • Proxy password - type in the valid password for the previously specified user Automatic update options  Automatic check for updates – This ensures that BitDefender automatically checks our servers for available updates. • Automatic update - If BitDefender detects a new update on our servers, t[...]

  • Página 55

    Best practices Antivirus Steps to follow in order to ensure a computer free from viruses: 1. After the installation process is over, please register your product, as described in the Product registration section. 2. Perform a manual update of your virus signatures. In the BitDefender Management Console , enter the Update module and click Check . 3.[...]

  • Página 56

    Frequently Asked Questions General 1. Q : How can I tell if BitDefender is actually working ? A: In the General module, access the Status A: In the General module, access the Status section and look at the statistics. 2. Q : What are the system requirements? A: You can see the system requirements in the Installation section. 3. Q : How do I uninsta[...]

  • Página 57

    Frequently Asked Questions Update 10. Q : Why is it necessary to update BitDefender? A: Every time you perform an update new virus signatures will be added to the scan engines, new rules will be added to the Heuristic & URL filters. 11. Q : How can I update BitDefender? A: By default, BitDefender will automatically update every 3 hours. But you[...]

  • Página 58

    Vocabulary ActiveX ActiveX is a model for writing programs so that other programs and the operating system can call them. ActiveX technology is used with Microsoft Internet Explorer to make interactive Web pages that look and behave like computer programs, rather than static pages. With ActiveX, users can ask or answer questions, use push buttons, [...]

  • Página 59

    Vocabulary Cookie Within the Internet industry, cookies are described as small files containing information about individual computers that can be analyzed and used by advertisers to track your online interests and tastes. In this realm, cookie technology is still being developed and the intention is to target ads directly to what you've said [...]

  • Página 60

    Vocabulary 60 Java applet A Java program which is designed to run only on a web page. To use an applet on a web page, you would specify the name of the applet and the size (length and width--in pixels) that the applet can utilize. When the web page is accessed, the browser downloads the applet from a server and runs it on the user's machine (t[...]

  • Página 61

    Vocabulary Port (1) An interface on a computer to which you can connect a device. Personal computers have various types of ports. Internally, there are several ports for connecting disk drives, display screens, and keyboards. Externally, personal computers have ports for connecting modems, printers, mice, and other peripheral devices. (2) In TCP/IP[...]

  • Página 62

    Vocabulary Virus A program or piece of code that is loaded onto your computer without your knowledge and runs against your will. Most viruses can also replicate themselves. All computer viruses are manmade. A simple virus that can copy itself over and over again is relatively easy to produce. Even such a simple virus is dangerous because it will qu[...]

  • Página 63

    Contact information As a valued provider, SOFTWIN strives to provide its customers an unparallel level of fast and accurate support. The Support Center is continually updated with the newest virus descriptions and answers to common questions to help you find answers to your problems in a timely manner. We at SOFTWIN, are dedicated to saving cust om[...]