Benutzeranleitung / Produktwartung 8 Standard des Produzenten Bitdefender
Zur Seite of 63
BitDefender 8 Standard User Guide.
Table of Contents Terms of agreement ............................................................................. 4 Software licensing ...................................................................................................................
Table of contents 3 Automatic Update .........................................................................................................................20 Product registration .....................................................................
Terms of agreement Software licensing The BitDefender package is protected by the copyright law and the international treaties regarding the copyright, as well as other laws and treaties regarding the intellectual property.
Terms of agreement License and warranty IF YOU DO NOT AGREE TO THESE TERMS AND CONDITIONS DO NOT INSTALL THE SOFTWARE. BY CLICKING "I ACCEPT", "OK", "CONTINUE", "YES.
Terms of agreement resulting upgraded product only in accordance with the terms of this License Agreement. If BitDefender is an upgrade of a component of a package of software programs that you have l.
Terms of agreement GOVERNMENT RESTRICTED RIGHTS/RESTRICTED RIGHTS LEGEND. Use, duplication, or disclosure by the Government is subject to restrictions as set forth in subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.
BitDefender Rescue System BitDefender 8 Standard comes with a bootable CD ( BitDefender Rescue System based on LinuxDefender ) capable to scan and disinfect all existing hard drives before your operating system starts . You should use BitDefender Rescue System any time your operating system is not working properly because of virus infections.
BitDefender Rescue System Figure 1 Install the NTFS-driver Click the Install NTFS Write Drivers icon using your left mouse key. In the window that will appear, click Forward twice. This will start the NTFS Driver installation. BitDefender Rescue System requires two drivers ( ntoskrnl.
BitDefender Rescue System Figure 2 The following options are available: Scan Archives - Scan inside archives. Scan Packed – Scan packed programs Scan Mail - Scan the mail database QuarDir – The default path to the quarantine folder is: /ramdisk/BitDefender/var/quarantine .
BitDefender Rescue System Start the scan process Click the Scan tab. Figure 3 In the Scan Dir field you must specify the path to the hard disk you want to scan. Examples: If you have one hard disk with 3 partitions, you must scan each partition separately.
Product installation System requirements To ensure a proper functioning of the product, before installation, verify that the following system requirements are met: Minimum Processor : Pentium 200MHz Minimum hard disk space : 40MB Minimum RAM Memory : 64MB (128MB Recommended) Operating system : Windows 98/NT-SP6/ME/2000/XP; Internet Explorer 4.
Installation Figure 4 Installation steps: 1. Click Next to continue or click Cancel if you want to quit installation. 2. Click Next to continue or click Back to return to the first step. 3. Please read the License Agreement , select I accept the terms in the License Agreement and click Next .
Installation You can select the folder where you want to install the product. The default folder is C:Program FilesSoftwinBitDefender 8 . If you want t select the fo o select another folder, click Browse and in the window that will open, lder you wish BitDefender to be installed in.
Description and features Description BitDefender Standard Edition is a powerful antivirus tool with features that best meet your security needs. Ease of use and automatic updating make BitDefender Standard Edition an "install and forget" antivirus product.
Description and features Quarantine zone Suspicious/infected files can optionally be backed up into a safe quarantine area before being disinfected or deleted. The contents of the quarantine can be sent to BitDefender Labs, for detailed analysis. Files that proved harmless can be easily moved out of quarantine, back to their original place.
The Management Console General view BitDefender 8 Standard was designed with a centralized management console, which allows the configuration of the protection options for all BitDefender modules. In other words, it is enough to open the management console in order to have access to all modules: Antivirus and Update .
The management console When the console is minimized, an icon will appear in the system tray ( Figure 6 ). Figure 6 Figure 7 If you double-click this icon, the management console will open. Also, by right-clicking it, a pop menu, as in Figure 7 , containing the following options, will appear.
The management console General module BitDefender comes fully configured for maximum security. Essential status information about all the BitDefender modules is displayed in the General module. The General module contains 4 different sections: Status , Registration , Settings and About .
The management console Automatic Update New viruses are found and identified every day. This is why it is very important to keep BitDefender up to date with the latest virus signatures. It displays the date of the last update and the number of viruses that can be detected (and therefore disinfected) from your BitDefender database.
The management console Figure 11 Type in the license key in the Serial field. Click Register to finish the registration process. If you mistype the license key you will be prompted to re-enter it. If you type in a valid license key a success message box appears.
The management console The next window will appear: Figure 13 Input the password in the Password field, re-type it in the Retype password field and click OK . From now on, if you want to change the BitDefender configuration options, you will be asked to type in the password.
The management console About In this section you can find the contact information and the product details. BitDefender TM provides security solutions to satisfy the protection requirements of today's computing environment, delivering effective threat management for over 38 million home and corporate users in more than 100 countries.
The management console Antivirus module BitDefender protects you from viruses entering your system by scanning your files, e- mail messages, downloads and all other content as it enters your system. More features From the antivirus module you have access to all BitDefender antivirus settings and features.
The management console On access scanning In case you haven’t already opened the managem ent console, you can access it from the Windows Start menu, following the path Start → Programs → BitDefender → BitDefender 8 Standard or quicker, double click the BitDefender icon from the system tray.
The management console Registry Control keeps an eye on the Windows Registry - this is again useful for detecting Trojan horses. It will alert you whenever a program will try to modify a registry entry in order to be executed at Windows start-up. Figure 15 You can deny this modification by clicking No or you can allow it by clicking Yes .
The management console Select the most important settings To select an option, just click with the mouse on the corresponding check box: Scan incoming email – all the incoming e-mail messages will be scanned by BitDefender. This is highly recommended! Scan accessed files – all the accessed files will be scanned by BitDefender.
The management console Select Scan accessed files and P2P transfers to scan the accessed files and the communications through Instant Messaging Software applications (ICQ, NetMeeting, Yahoo Messenger, MSN Messenger). Further on, select the type of the files you want to be scanned.
The management console The following options are available. Action Description Deny access and continue In case an infected file is detected, the access to this will be denied. Clean file To disinfect the infected file. Delete file Deletes the infected files immediately, without any warning.
The management console On demand scanning The main objective for BitDefender is to keep your computer clean of viruses. This is first and foremost done by keeping new viruses out of your computer and by scanning your e-mail messages and any new files downloaded or copied to your system.
The management console Figure 18 The section contains the following buttons: Add file(s) – opens, a browsing window, where you can select the file(s), you want to scan. Add folder(s) – same as above, but you select which folder(s) you want BitDefender to scan instead of which file(s).
The management console 4. Select the scan options – only for advanced users Advanced users might want to take advantage of the scan-settings BitDefender offers. The scanner can be set to skip file extensions, di rectories or archives that you know to be harmless.
The management console Option Description Use heuristic detection To use heuristic scanning of the files. The aim of heuristic scanning is to identify new viruses, based on certain patterns and algorithms, before a virus definition is found. False alarm messages can appear.
The management console Action Description Rename To change the extension of the infected files. The new extension of the infected files will be .vir . By renaming the infected files, the possibility of executing and thus of spreading the infection is removed.
The management console 5. Scan for viruses With the scan options selected, all you have to do is to effectively start the system scanning. For that, just click Scan . This may take a while, depending on the size of your hard disk drive! Figure 20 While scanning, BitDefender will show you its progress and alert you if any viruses are found.
The management console 6. Alternative scanning methods BitDefender has two alternative methods for scanning files immediately: using the contextual menu and by drag & drop feature. Contextual scanning Figure 21 Right click the file or folder you want scanned and select the Scan with BitDefender 8 option.
The management console Figure 24 You can view the name of the file and the name of the virus. You can select one of the following actions on the infected file: Disinfect - to disinfect the infected file. Delete – to delete the infected file.
The management console Scheduled scanning Since the scanning will take some time, and works best if you have closed all other programs, it is best for you to schedule the scanning at a time when you are not using your computer and it is standing idly by.
The management console The Scheduler's screen also contains a list where all the scan tasks can be seen, with their names, the date of the first execution, the date of the next execution and the task's type (periodically or one time only). The Scheduler includes a wizard for creating new scan tasks.
The management console Figure 27 Type in the At every edit box the number of minutes / hours / days / weeks / months / years you want to repeat this process. You can click the up/down arrows of this box in order to increase / decrease the number of minutes / hours / days / weeks / months / years.
The management console 4. Target Path Here you have to specify the path to the objects that will be scanned, as observed in the picture. This step is necessary if you have selected to scan files in the previous step. Figure 29 This screen is actually an exploring window that lets you select the partitions and folders to be scanned.
The management console If you wish to see information about all scanned files, infected or not, select the option List all scanned files . But remember, w ith this option on, the computer will slow down. Click Next . 6. Analysis Ty pe Select the scan type.
The management console We recommend you to select the first action Clean and the second action Move to quarantine . For the first action the following options are available: First Action Description Clean file To disinfect the infected files. Delete file To automatically delete, without any warning, all the infected files.
The management console 8. Report Info Choose how to create a scan report file. Figure 33 To create a scan report, click Create report file . At this moment all the other options for the creation of a report file will be enabled. Type the name of the report file in Report file name box.
The management console For each scheduled scan event, you can view its name, its description, the starting date, the next moment when it will be launched, the scan type (periodically or one time scan), the target, the files extensions, the analysis type and the action on the infected files.
The management console Isolating the infected files BitDefender allows isolating the infected or suspicious files in a secure area, named quarantine. By isolating these files in the quarantine, the risk of getting infected disappears and, at the same time, you have the possibility to send these files for further analysis to the BitDefender lab.
The management console Delete – deletes the selected file from your computer. Restore – returns the selected file to its original location. Send – sends the selected files for further analysis to the BitDefender lab. You must specify some information before you may submit these files.
The management console Viewing the report files When launching a scan process, the user has the possibility to opt for creating a report file where he can see information about the scan process. The user may view these reports straight from the management console.
The management console Refresh – if the management console is open at the Report section and in the meantime you perform a scan of your com puter, the new report file with the scan results (if you selected the Create report file option) will be visible only after you click Refresh .
The management console Removing a found virus Viruses are much easier to stop from entering your system, rather than removing them once they are inside your computer. This is why the virus protection should always be enabled and updated. If BitDefender does detect a resident virus it is recommended to let BitDefender try to remove it.
The management console Update module New viruses are found and identified every day. This is why it is very important to keep BitDefender up to date with the latest virus signatures. By default, BitDefender automatically checks for updates every three hours.
The management console Manual update In case you haven’t already opened the managem ent console, you can access it from the Windows Start menu, following the path Start → Programs → BitDefender → BitDefender 8 Standard or quicker, double click the BitDefender icon from the system tray.
The management console Automatic update If you're an advanced user, click the Settings tab in order to configure the Update module. Figure 40 Updates can be performed from the local network, over the Internet, directly or through a proxy server.
The management console Syntax: domainuser . • Proxy password - type in the valid password for the previously specified user Automatic update options Automatic check for updates – This ensures that BitDefender automatically checks our servers for available updates.
Best practices Antivirus Steps to follow in order to ensure a computer free from viruses: 1. After the installation process is over, please register your product, as described in the Product registration section. 2. Perform a manual update of your virus signatures.
Frequently Asked Questions General 1. Q : How can I tell if BitDefender is actually working ? A: In the General module, access the Status A: In the General module, access the Status section and look at the statistics. 2. Q : What are the system requirements? A: You can see the system requirements in the Installation section.
Frequently Asked Questions Update 10. Q : Why is it necessary to update BitDefender? A: Every time you perform an update new virus signatures will be added to the scan engines, new rules will be added to the Heuristic & URL filters. 11. Q : How can I update BitDefender? A: By default, BitDefender will automatically update every 3 hours.
Vocabulary ActiveX ActiveX is a model for writing programs so that other programs and the operating system can call them. ActiveX technology is used with Microsoft Internet Explorer to make interactive Web pages that look and behave like computer programs, rather than static pages.
Vocabulary Cookie Within the Internet industry, cookies are described as small files containing information about individual computers that can be analyzed and used by advertisers to track your online interests and tastes.
Vocabulary 60 Java applet A Java program which is designed to run only on a web page. To use an applet on a web page, you would specify the name of the applet and the size (length and width--in pixels) that the applet can utilize.
Vocabulary Port (1) An interface on a computer to which you can connect a device. Personal computers have various types of ports. Internally, there are several ports for connecting disk drives, display screens, and keyboards. Externally, personal computers have ports for connecting modems, printers, mice, and other peripheral devices.
Vocabulary Virus A program or piece of code that is loaded onto your computer without your knowledge and runs against your will. Most viruses can also replicate themselves. All computer viruses are manmade. A simple virus that can copy itself over and over again is relatively easy to produce.
Contact information As a valued provider, SOFTWIN strives to provide its customers an unparallel level of fast and accurate support. The Support Center is continually updated with the newest virus descriptions and answers to common questions to help you find answers to your problems in a timely manner.
Ein wichtiger Punkt beim Kauf des Geräts Bitdefender 8 Standard (oder sogar vor seinem Kauf) ist das durchlesen seiner Bedienungsanleitung. Dies sollten wir wegen ein paar einfacher Gründe machen:
Wenn Sie Bitdefender 8 Standard noch nicht gekauft haben, ist jetzt ein guter Moment, um sich mit den grundliegenden Daten des Produkts bekannt zu machen. Schauen Sie zuerst die ersten Seiten der Anleitung durch, die Sie oben finden. Dort finden Sie die wichtigsten technischen Daten für Bitdefender 8 Standard - auf diese Weise prüfen Sie, ob das Gerät Ihren Wünschen entspricht. Wenn Sie tiefer in die Benutzeranleitung von Bitdefender 8 Standard reinschauen, lernen Sie alle zugänglichen Produktfunktionen kennen, sowie erhalten Informationen über die Nutzung. Die Informationen, die Sie über Bitdefender 8 Standard erhalten, werden Ihnen bestimmt bei der Kaufentscheidung helfen.
Wenn Sie aber schon Bitdefender 8 Standard besitzen, und noch keine Gelegenheit dazu hatten, die Bedienungsanleitung zu lesen, sollten Sie es aufgrund der oben beschriebenen Gründe machen. Sie erfahren dann, ob Sie die zugänglichen Funktionen richtig genutzt haben, aber auch, ob Sie keine Fehler begangen haben, die den Nutzungszeitraum von Bitdefender 8 Standard verkürzen könnten.
Jedoch ist die eine der wichtigsten Rollen, die eine Bedienungsanleitung für den Nutzer spielt, die Hilfe bei der Lösung von Problemen mit Bitdefender 8 Standard. Sie finden dort fast immer Troubleshooting, also die am häufigsten auftauchenden Störungen und Mängel bei Bitdefender 8 Standard gemeinsam mit Hinweisen bezüglich der Arten ihrer Lösung. Sogar wenn es Ihnen nicht gelingen sollte das Problem alleine zu bewältigen, die Anleitung zeigt Ihnen die weitere Vorgehensweise – den Kontakt zur Kundenberatung oder dem naheliegenden Service.