Vous êtes sur la page 1sur 160

Administrator's Guide

BitDefender Security for File Servers 3.5

BitDefender Security for File Servers 3.5


Administrator's Guide

Publication date 2014.12.15

Copyright 2014 BitDefender

Legal Notice
All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means, electronic or
mechanical, including photocopying, recording, or by any information storage and retrieval system, without written
permission from an authorized representative of . The inclusion of brief quotations in reviews may be possible only
with the mention of the quoted source. The content can not be modified in any way.
Warning and Disclaimer. This product and its documentation are protected by copyright. The information in this
document is provided on an as is basis, without warranty. Although every precaution has been taken in the preparation
of this document, the authors will not have any liability to any person or entity with respect to any loss or damage
caused or alleged to be caused directly or indirectly by the information contained in this work.
This book contains links to third-party Websites that are not under the control of , therefore is not responsible for the
content of any linked site. If you access a third-party website listed in this document, you will do so at your own risk.
provides these links only as a convenience, and the inclusion of the link does not imply that endorses or accepts any
responsibility for the content of the third-party site.
Trademarks. Trademark names may appear in this book. All registered and unregistered trademarks in this document
are the sole property of their respective owners, and are respectfully acknowledged.
BitDefender Security for File Servers 3.5

She came to me one morning, one lonely Sunday morning


Her long hair flowing in the mid-winter wind
I know not how she found me, for in darkness I was walking
And destruction lay around me, from a fight I could not win
BitDefender Security for File Servers 3.5

Table of Contents
Preface ..................................................................... vii
1. Conventions Used in This Book . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vii
1.1. Typographical Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vii
1.2. Admonitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vii
2. The Book Structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . viii
3. Request for Comments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . viii

Description ....................................................... 1
1. Features and Benefits ................................................ 2
1.1. Key Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.2. Key Benefits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.3. Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.4. BitDefender Advanced Technologies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
2. Functional Diagram for End-Users .................................. 4

Installation ........................................................ 6
3. Before You Install ..................................................... 7
3.1. System Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
4. Installing BitDefender Security for File Servers ................... 8
4.1. Step 1/8 - Welcome . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
4.2. Step 2/8 - End User License Agreement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
4.3. Step 3/8 - Scan Before Install . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
4.4. Step 4/8 - Select Products to Install . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
4.5. Step 5/8 - Configure Product Update Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
4.6. Step 6/8 - Incident Reporting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
4.7. Step 7/8 - Begin Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
4.8. Step 8/8 - Installation Completed . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
5. Modifying, Repairing or Removing BitDefender ................. 14
5.1. Repair BitDefender . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
5.2. Remove BitDefender . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15

Configuration and Management ............................ 16


6. Getting Started ...................................................... 17
6.1. BitDefender Icon in the System Tray . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
6.2. Connecting to Another Computer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
6.3. Changing the Administrative Password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
6.4. Exporting/Importing Product Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
6.4.1. Exporting Product Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
6.4.2. Importing Product Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
7. Registration and My Account ...................................... 24
7.1. Step 1/3 - Register BitDefender Security for File Servers . . . . . . . . . . . . . . . . . . . . 24
7.2. Step 2/3 - Register a BitDefender Account . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
7.3. Step 3/3 - Finish . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27

iv
BitDefender Security for File Servers 3.5

8. Monitoring ............................................................ 28
8.1. Dashboard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
8.1.1. Important Links . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
8.1.2. Status Area . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
8.1.3. Scan Activity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
8.1.4. Product Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
8.2. Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
8.2.1. Clearing Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
8.3. Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
8.3.1. Managing Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
8.3.2. Creating Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
8.4. Alerts & Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
8.4.1. Alerts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
8.4.2. Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
8.5. Quarantine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
8.5.1. Managing Quarantine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
8.6. Scheduled Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
8.6.1. Managing Scheduled Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
8.6.2. On-demand Scanning Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
8.6.3. Update Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
8.6.4. Report Generation Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
9. Server Scan .......................................................... 89
9.1. Real-time Protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90
9.1.1. Setting Protection Level . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90
9.1.2. Configuring Protection Level . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
9.1.3. Configuring Number of Scanning Instances . . . . . . . . . . . . . . . . . . . . . . . . . . 100
9.2. On-demand Scanning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101
9.2.1. Scanning Files and Folders . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
9.2.2. Configuring On-Demand Scanning Settings . . . . . . . . . . . . . . . . . . . . . . . . . 109
9.3. Scanning Exceptions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117
9.3.1. Global Exceptions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117
9.3.2. Process Exclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
9.3.3. Items to Be Excluded Manually . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120
9.4. Testing Antivirus Protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121
10. Update ............................................................. 122
10.1. Update . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
10.1.1. Update Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
10.1.2. Product Update . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
10.2. Update Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125
10.2.1. Configuring Update Schedule . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125
10.2.2. Configuring Product Updates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126
10.3. Update Locations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128
10.4. Update Notifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129
10.5. Update Roll Back . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130
11. General ............................................................ 132
11.1. Report Virus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132
11.2. Report Incidents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133
11.3. Tray Icon . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134

Troubleshooting and Getting Help ........................ 135

v
BitDefender Security for File Servers 3.5

12. BitDefender Configuration Repair Tool ........................ 136


13. Support ............................................................ 138
13.1. BitDefender Support Center . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138
13.1.1. BitDefender Knowledge Base . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138
13.1.2. BitDefender Support Forum . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139
13.1.3. Video Tutorials . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139
13.1.4. Product Documentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139
13.2. Asking for Assistance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139
13.3. BitDefender Support Tool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 140
14. Contact Information .............................................. 143
14.1. Web Addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143
14.2. Local Distributors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143
14.3. BitDefender Offices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143
14.3.1. United States . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143
14.3.2. UK and Ireland . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144
14.3.3. Spain . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144
14.3.4. Germany . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144
14.3.5. Romania . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145
Glossary .................................................................. 146

vi
BitDefender Security for File Servers 3.5

Preface
This guide is intended to all companies which have chosen BitDefender Security for
File Servers as a security solution for their file servers. The information presented in
this book is suitable not only for computer literates, it is accessible to everyone who
is able to work under Windows.
This book will describe for you BitDefender Security for File Servers, the Company
and the team who built it, will guide you through the installation process, will teach
you how to configure it. You will find out how to use BitDefender Security for File
Servers, how to update, test and customize it. You will learn how to get best from
BitDefender.
We wish you a pleasant and useful lecture.

1. Conventions Used in This Book


1.1. Typographical Conventions
Several text styles are used in the book for an improved readability. Their aspect and
meaning are presented in the table below.

Appearance Description
sample syntax Syntax samples are printed with monospaced
characters.
http://www.bitdefender.com The URL links is pointing to some external location, on
http or ftp servers.
sales@bitdefender.com E-mail messages are inserted in the text for contact
information.
Preface (p. vii) This is an internal link, towards some location inside the
document.
filename File and directories are printed using monospaced font.
option All the product options are printed using strong
characters.
The code listing is printed with monospaced characters.
sample code listing

1.2. Admonitions
The admonitions are in-text notes, graphically marked, bringing to your attention
additional information related to the current paragraph.

Preface vii
BitDefender Security for File Servers 3.5

Note
The note is just a short observation. Although you can omit it, the notes can provide
valuable information, such as specific feature or a link to some related topic.

Important
This requires your attention and is not recommended to skip over it. Usually, it provides
non-critical but significant information.

Warning
This is critical information you should treat with increased caution. Nothing bad will
happen if you follow the indications. You should read and understand it, because it
describes something extremely risky.

2. The Book Structure


The book consists of 4 parts, containing the major topics: Description, Installation,
Configuration and Management, Troubleshooting and Getting Help. Moreover, a
glossary is provided to clarify some technical terms.
Description. BitDefender Security for File Servers and its features are presented to
you.
Installation. Step by step instructions for installing BitDefender on a workstation.
This is a comprehensive tutorial on installing BitDefender Security for File Servers.
Starting with the prerequisites for a successfully installation, you are guided through
the whole installation process. Finally, the removing procedure is described in case
you need to uninstall BitDefender.
Configuration and Management. Description of basic administration and maintenance
of BitDefender. The chapters explain in detail all options of BitDefender Security for
File Servers, how to register and configure the product, how to scan the file server
and how to perform the updates.
Troubleshooting and Getting Help. Where to look and where to ask for help if
something unexpected appears.
Glossary. The Glossary tries to explain some technical and uncommon terms you
will find in the pages of this document.

3. Request for Comments


We invite you to help us improve the book. We have tested and verified all of the
information to the best of our ability. Please write to tell us about any flaws you find
in this book or how you think it could be improved, to help us provide you with the best
documentation possible.
Let us know by sending an e-mail to documentation@bitdefender.com.

Important
Please write all of your documentation-related e-mails in English so that we can process
them efficiently.

Preface viii
BitDefender Security for File Servers 3.5

Description

1
BitDefender Security for File Servers 3.5

1. Features and Benefits


BitDefender Security for File Servers offers efficient protection for your company's
information storage points.
BitDefender Security for File Servers is a solution especially dedicated to
Windows-based servers. Easy to install, configure and manage, it effectively offers
world-class protection from viruses, spyware and rootkits, while lowering the burden
of administrating a server software solution.

1.1. Key Features


Superior antivirus, antispyware and antirootkit protection for the file traffic
Proactive heuristic protection against zero-day threats
Optimized scanning for faster file access
Multithread scanning significantly reducing file scanning time
On-access and on-demand scanner to fully protect the file server
Centralized management console compatibility eases administrative effort
64 bit support

1.2. Key Benefits


Increased Productivity
Scans and fingerprints "read-only" files only once during the same session and
only re-scans them if there is a new session, an update or an infection in the
system
Provides lightning-fast secure file access, thanks to its advanced multithread
scanning functionality
Provides a configurable scheduler for on-demand antivirus scans and update
tasks
Notifies of performance scans and update tasks through its efficient alerts module
Safe Sharing of Files and Documents
Scans each accessed or copied file in real-time with no impact on file server
performance
Allows you to schedule on-demand antivirus scans or perform scan-now actions
for enhanced file server safety
Increased Usability
Delivers elegant management functionality and allows fast access to the most
common settings due to its friendly and intuitive MMC-based interface
Displays critical event information and provides a direct fix button in its newly
added dashboard
Provides reports on solution activity through its robust monitoring system and
statistics module

Features and Benefits 2


BitDefender Security for File Servers 3.5

Offers customizable alerts for several event types: antivirus signature updates,
product updates, on-demand scans and viruses detected
Centralized Management Support
BitDefender Management Server allows centrally managing most of the BitDefender
business solutions installed on network computers, including BitDefender Security
for File Servers. This type of integration allows you to use the Management Server
console to get centralized access to:
Configuration settings for BitDefender Security for File Servers
Critical event information such as update-related events, configuration warnings,
license expiration
Easy-to-interpret statistics and reports based on the information received from
BitDefender Security for File Servers

1.3. Services
Advanced Update System
For permanent file protection, the solution receives the latest updates and patches
based on three configurable technologies: on-demand, scheduled and automatic.
Upgrades
Registered users benefit from free upgrades to any new version of the product
during the license period. Special price offers are also available to returning
customers.
Free 24/7 Professional Technical Support
Certified representatives provide BitDefender business customers with free
permanent support online, by telephone or e-mail. This is supplemented by an online
database with answers to Frequently Asked Questions and fixes for common issues.

1.4. BitDefender Advanced Technologies


B-HAVE. BitDefender Security for File Servers includes B-HAVE, a patent pending
technology which analyzes the behavior of potentially malicious codes, inside a virtual
computer, eliminating false positives and significantly increasing detection rates for
new and unknown malware.
Certified Antivirus Engines. BitDefender's award winning scan engines featuring
the B-HAVE technology have been recognized by ICSA Labs, Virus Bulletin and
Checkmark to provide the most proactive antivirus protection available.

Features and Benefits 3


BitDefender Security for File Servers 3.5

2. Functional Diagram for End-Users


The diagram below shows how BitDefender works.

Functional Diagram

To better serve its function as a security solution meant for servers, BitDefender
Security for File Servers is based on a modular architecture. These are its main
modules:

On-access Scanner
On-demand Scanner
Update
Scheduler
Antivirus Engines

Real-time Protection. As the files are being written on the disk or accessed, the
On-access Scanner module intercepts the event and starts the scanning process.
The scanning process comprises the following steps:

1. The file extension, the file size, the file path are sequentially checked to match the
administrator configurations. The result of the filtering process is SCAN or NO
SCAN.
2. If the result is SCAN, the file is scanned by the Antivirus Engines. First the file is
checked against the antivirus signatures database. If any part of the file matches
a signature, the file is reported as infected. If none of the signatures is matched,
the file is checked with the B-HAVE technology. In case the behavior of the file is
similar to the behavior of a piece of malware, it is reported as infected. The result
of the Antivirus engines module can be INFECTED or CLEAN.
3. If the file having passed through the Antivirus Engines module is INFECTED, one
of the following actions can be taken: disinfect, delete, move to quarantine. If these

Functional Diagram for End-Users 4


BitDefender Security for File Servers 3.5

actions fail, the Deny access action is applied so that the user will not be able to
execute the infected code.

On-demand Scanning. The On-demand Scanner can be triggered by clicking Scan


now from the user interface or by a scheduled on-demand scan task. This scanning
process is similar to the real-time protection scanning. The difference is that the
on-demand scanning will not apply to the accessed files, but to those submitted by
the user to this purpose.
Update. The Update module performs the update process and its main function is to
download the latest BitDefender files. Three types of files are available:

Antivirus signatures - These files are updated constantly as the BitDefender Lab
analyzes new viruses every day.
Antivirus engines - These files are updated as frequently as the antivirus signatures
B-HAVE, a BitDefender proprietary technology, has been implemented in the antivirus
engines.
Product files - The product file updates differ from the antivirus signature updates
and their function is to deliver bug fixes and performance improvements brought to
the product. Product updates are downloaded, but they are not automatically
installed. Please note that the installation of product updates might require a system
restart.

Note
The update process is performed automatically every hour. The interval can be modified
and the update tasks be scheduled at any time.

Functional Diagram for End-Users 5


BitDefender Security for File Servers 3.5

Installation

6
BitDefender Security for File Servers 3.5

3. Before You Install


There are a few steps to take in preparation of the product installation:

Make sure the computer meets the system requirements.


Log on to the computer as an administrator.
Remove any similar security software from the computer. Running two security
programs simultaneously may affect their operation and cause major problems with
the system.

3.1. System Requirements


Software Requirements
Operating System:
Microsoft Windows 2000 SP 4 + Update Rollup 1 Version 2
Microsoft Windows Server 2003 with Service Pack 1
Microsoft Windows Server 2008 / Microsoft Windows Server 2008 R2
Microsoft Windows Server 2012
Internet Explorer 6 or higher

Hardware Requirements
64-bit:

Any Windows machine (Intel or AMD)


Minimum 1 GB of free space on the hard drive

32-bit:

Minimum Processor - Pentium III 500 MHz


256 megabytes (MB) of RAM, 512 MB recommended
Minimum 1 GB of free space on the hard drive

Before You Install 7


BitDefender Security for File Servers 3.5

4. Installing BitDefender Security for File Servers


In order to install BitDefender Security for File Servers, you need an installation file
or an installation CD that contains the installation package. The installation file comes
under different names, depending on the BitDefender business products it contains.
You can download the installation file from www.bitdefender.com.
There are two versions of the installation package:

32-bit - use this version if you want to install BitDefender Security for File Servers
on a 32-bit computer.
64-bit - use this version if you want to install BitDefender Security for File Servers
on a 64-bit computer.

Znajd plik setup, a nastpnie kliknij go dwukrotnie. A wizard will appear and you must
follow its steps to complete installation.
Before launching the setup wizard, BitDefender will check for newer versions of the
installation package. If a newer version is available, you will be prompted to download
it. Click Yes to download the newer version or No to continue installing the version
then available in the setup file.
Follow these steps to install BitDefender Security for File Servers:

4.1. Step 1/8 - Welcome

Welcome

Click Next to continue or click Cancel if you want to quit installation.

Installing BitDefender Security for File Servers 8


BitDefender Security for File Servers 3.5

4.2. Step 2/8 - End User License Agreement

End User License Agreement

Please read the License Agreement, select I accept the terms in the License
Agreement and click Next.

Note
If you do not agree to these terms click Cancel. The installation process will be
abandoned and you will exit setup.

4.3. Step 3/8 - Scan Before Install

Scan Before Install

BitDefender can scan critical areas on your system before the installation to ensure
the server is free of infections.

Installing BitDefender Security for File Servers 9


BitDefender Security for File Servers 3.5

The scan takes a few minutes. Click Scan Now to start the scan or click Skip Scan
to install without scanning.

Important
It is highly recommended to perform the scan. Active malware could disrupt the
installation and even cause it to fail. If a threat is detected, a reboot may be required in
order to remove it.

4.4. Step 4/8 - Select Products to Install

Select Products to Install

Select BitDefender Security for File Servers, click the corresponding arrow and then
click Will be installed on local hard drive on the shortcut menu.
The default installation folder is displayed on the lower part of the window. To select
a different installation folder, click Browse, locate the folder and then click OK to set
the location.
Click Next.

Installing BitDefender Security for File Servers 10


BitDefender Security for File Servers 3.5

4.5. Step 5/8 - Configure Product Update Options

Product Update Options

Installing product updates regularly is essential to the security of your server. Depending
on the level of interference with the server, there are three types of product updates:

product updates that do not require stopping server traffic or to reboot the server
product updates that require stopping server traffic, but do not require to reboot the
server
product updates that require to reboot the server

To configure automatic downloads and installation for each type of product update,
select one of the following options:

Automatically Install
Select this option and BitDefender will automatically download and install product
updates. This is the recommended choice for product updates that do not require
stopping server traffic or a server reboot.
Install at a time I specify
Select this option if you want BitDefender to install available updates at certain
times. Select from the corresponding drop-down lists the date (day and time)
when you want this to happen.
This way you can configure BitDefender to perform product updates at times
when it is least likely for interferences to occur with server activity (during night
time, for example).
Let me decide when to install
Select this option if you want BitDefender to automatically download product
updates, but let you decide when to install them. This is the recommended choice
for product updates that require stopping server traffic or a server reboot.

Installing BitDefender Security for File Servers 11


BitDefender Security for File Servers 3.5

To disable automatic product updates, select the No automatic product updates,


even if it will make my server more vulnerable check box.
Click Next.

4.6. Step 6/8 - Incident Reporting

Incident Reporting

BitDefender Security for File Servers contains an incident management module that
allows creating incident reports during product crashes. By agreeing to send the
incident reports to the BitDefender Lab, you agree to help us find quick fixes for our
bugs. You could make a major contribution to the development of a stable product
that satisfies your needs. The reports will only be used for debugging purposes. They
will never be used as commercial data or disclosed to third parties.
To send incident reports to the BitDefender Lab, select I agree to submit incident
reports to the BitDefender Lab and specify your e-mail address.
Click Next.

Installing BitDefender Security for File Servers 12


BitDefender Security for File Servers 3.5

4.7. Step 7/8 - Begin Installation

Begin Installation

Click Install to begin the installation.


The setup takes a few minutes to complete. Detailed information will be displayed to
help you follow the progress of the installation.

4.8. Step 8/8 - Installation Completed

Installation Completed

Click Finish to close the installer. You may be asked to restart the system so that the
setup wizard can complete the installation process.

Installing BitDefender Security for File Servers 13


BitDefender Security for File Servers 3.5

5. Modifying, Repairing or Removing BitDefender


If you want to modify. repair or remove BitDefender, follow the path: Start Menu
All Programs BitDefender Security for Windows Servers Modify, Repair or
Uninstall.
Click Next in the welcome screen. A new window will appear where you can select:

Repair - to re-install BitDefender Security for File Servers.


Remove - to remove all installed components.

Modify, Repair or Remove BitDefender

5.1. Repair BitDefender


If BitDefender Security for File Servers starts to perform unexpectedly, you can repair
it in order to restore its functionality. The repair process consists in completely
re-installing the product.

Important
Before repairing the product, we recommend you to export the product settings so that
you can reload them after the repairing process is completed. For more information,
please refer to Exporting/Importing Product Settings (p. 20).

If you choose Repair, a new window will appear. Click Repair to start the process.

Important
During the repair process all BitDefender products installed on the computer will
temporarily cease to function.

Modifying, Repairing or Removing BitDefender 14


BitDefender Security for File Servers 3.5

5.2. Remove BitDefender


If you want to uninstall all BitDefender products, choose Remove.

Note
We recommend that you choose Remove for a clean re-installation.

If you choose to remove BitDefender, a new window will appear. To keep the objects
in the quarantine, make sure the corresponding check box is not selected. Click
Remove to start unsinstalling BitDefender from your computer.

Modifying, Repairing or Removing BitDefender 15


BitDefender Security for File Servers 3.5

Configuration and Management

16
BitDefender Security for File Servers 3.5

6. Getting Started
BitDefender Security for File Servers can be configured and managed through a
centralized, MMC-based management console. The management console provides
access to all features and settings of BitDefender Security for File Servers.
To open the management console, use the Windows Start menu, by following the
path: Start All Programs BitDefender Security for Windows Servers
BitDefender Security for File Servers or quicker, double click the BitDefender icon
from the system tray.

Management Console

On the left side of the management console you can see the tree menu:

Monitoring - displays the dashboard. The dashboard provides you with useful
information on the status of BitDefender Security for File Servers and helps you
easily solve the issues that require your attention.
Statistics - offers statistic information on the product activity.
Reports - allows creating customized reports on the product activity.
Alerts & Logs - allows configuring the logging options and sending alerts about
the events that occur during product operation, such as an update error or an
infected file detected.

Getting Started 17
BitDefender Security for File Servers 3.5

Quarantine - shows the quarantined files. These files were found to be infected
or suspect and were moved to the quarantine folder, according to the specified
action.
Scheduled Tasks - allows creating scheduled tasks through an intuitive wizard.
You can schedule updates, on-demand scanning processes and reports to be
generated.
Server Scan - allows configuring BitDefender to scan the file server.
Update - allows updating BitDefender and configuring update settings.
General - allows configuring BitDefender to send the BitDefender Lab reports
regarding the viruses found on the server and the incidents that occurred during
product operation.

If you want to open the help file, click Help -> About BitDefender Security for File
Servers. Contextual help is available for each window. Click ? to open it.

6.1. BitDefender Icon in the System Tray


After the product installation is over (including computer restarting), an icon will appear
in the system tray.

System Tray

Contextual Menu

You can double-click this icon to open the management console Also, by right-clicking
the icon, a contextual menu will allow you to quickly manage BitDefender.

Start console - opens the management console.


Enable / Disable real-time protection - enables / disables real-time protection.
Exit - shuts down the application. By selecting this option, the icon from the system
tray will disappear but the BitDefender protection will remain active (in case it was
enabled).

Getting Started 18
BitDefender Security for File Servers 3.5

Note
The icon turns into gray in 3 situations:

Real-time protection is disabled.


The BitDefender for File Servers service is stopped.
The license has expired.

In this way, you will know if BitDefender is not working without opening the management
console.

To enable/disable the tray icon for different categories of users, open the management
console, go to the General section and select the Tray Icon tab.

6.2. Connecting to Another Computer


The management console allows you to remotely manage other BitDefender Security
for File Servers products.

Important
To remotely manage a BitDefender Security for File Servers product, you must first set
an administrative password to the respective product. Please note that when connecting
remotely to BitDefender Security for File Servers, you will not have access to all the
product features. However, you will be able to perform an update by user request and
to enable/disable real-time protection.

To connect to a BitDefender Security for File Servers product installed on a remote


computer, follow these steps:

1. Right-click BitDefender Security for File Servers in the tree menu.


2. From the contextual menu, select Connect to another computer. A new window
will appear.

Connect to another computer

3. In the Connect to computer field, type the IP address or the name of the remote
computer.
4. In the Password field, type the administrative password of the respective product.
5. Click OK

Getting Started 19
BitDefender Security for File Servers 3.5

6.3. Changing the Administrative Password


In order to remotely manage BitDefender Security for File Servers, you must set an
administrative password. The administrative password is also required for users with
limited accounts in order to access BitDefender Security for File Servers through
Terminal Services.
To set or change the administrative password, follow these steps:

1. Right-click BitDefender Security for File Servers in the tree menu.


2. From the contextual menu, select Change administrative password. A new
window will appear.

Change administrative password

3. In the Old password field, type the current administrative password, if any.
4. In the Password field, type the desired administrative password.
5. In the Confirm password field, type the password again.
6. Click OK.

6.4. Exporting/Importing Product Settings


You can export and import the product settings. This helps you easily configure other
BitDefender Security for File Servers products within the network and restore configured
settings in case you repair or reinstall the product.

6.4.1. Exporting Product Settings


To export the current product settings, follow these steps:

1. Right-click BitDefender Security for File Servers in the tree menu.


2. From the contextual menu, select Export product settings.

Getting Started 20
BitDefender Security for File Servers 3.5

Import Tool

3. Select the folder where to save the product settings and click OK.

6.4.2. Importing Product Settings


To import previously saved product settings, follow these steps:

1. Right-click BitDefender Security for File Servers in the tree menu.


2. From the contextual menu, select Import product settings to open the Import
Tool.

Import Tool

3. Click Import. A new window will appear.

Getting Started 21
BitDefender Security for File Servers 3.5

Import Tool

4. Select the folder where the product settings were saved and click OK to import
them.

Note
Please note that BitDefender does not protect the file server while importing product
settings. Therefore, it is recommended that you remove the file server from the
network before initiating this process.

5. Wait until the Import Tool completes the importing process.

Importing Settings

The Import Tool first the BitDefender Security for File Servers services. Then, it
imports the product settings from the selected folder. Finally, the Import Tool restarts
the processes previously stopped.
6. The Import Tool informs you when the settings have been successfully imported.

Getting Started 22
BitDefender Security for File Servers 3.5

Finish

Click Exit to close the window.

Getting Started 23
BitDefender Security for File Servers 3.5

7. Registration and My Account


BitDefender Security for File Servers comes with a 30-day trial period. If you decide
that BitDefender Security for File Servers is the best choice for your organization,
proceed to register its full version. You should also register a BitDefender account in
order to benefit from free BitDefender technical support and other free services.
Go to Monitoring in the tree menu to perform the product and account registration.

Click Register to register BitDefender Security for File Servers, change the license
key, create or sign in to your account or see how many days are left until the licensing
period expires.
Click My account if you only want to register or sign in to a BitDefender account.

Note
If BitDefender Security for File Servers is under the management of BitDefender
Management Server, the product and account registration are performed from the
management console of BitDefender Management Server.

7.1. Step 1/3 - Register BitDefender Security for File


Servers

Registration

If you do not have a BitDefender license, click the provided link to go to the BitDefender
online store and purchase a license key.

Registration and My Account 24


BitDefender Security for File Servers 3.5

To register BitDefender Security for File Servers, select Register the product, type
the license key in the Enter key field and click the Register button.
If the trial period has not expired and you want to continue evaluating the product,
select Continue evaluating the product. You can see the current license key and
when it expires.
Click Next to continue.

Note
If the provided license key is not valid, you will be prompted to provide another license
key.

7.2. Step 2/3 - Register a BitDefender Account

Account Registratiion

I do not have a BitDefender account


To create a BitDefender account, select Create a new BitDefender account and
provide the required information. The data you provide here will remain confidential.

Note
If you want to create an account later, select the corresponding option.

E-mail - type in your e-mail address.


Password - type in a password for your BitDefender account. The password must
be at least four characters long.

Registration and My Account 25


BitDefender Security for File Servers 3.5

Re-type password - type in again the previously specified password.


First name - type in your first name.
Last name - type in your last name.

Note
Use the provided e-mail address and password to log in to your account at
http://myaccount.bitdefender.com.

Click Create account.


To successfully create an account you must first activate your e-mail address. Check
your e-mail address and follow the instructions in the e-mail sent to you by the
BitDefender registration service.
Click Next to continue.

I already have a BitDefender account


BitDefender will automatically detect if you have previously registered a BitDefender
account on your computer. In this case, all you have to do is to click Next.
If you already have an active account, but BitDefender does not detect it, select Sign
in to an existing BitDefender account, provide the e-mail address and the password
of your account and click Sign In.

Note
If you provide an incorrect password, you will be prompted to re-type it when you click
Next. Click Ok to enter the password again or Cancel to exit the wizard.

If you have forgotten your password, click Forgot your password? and follow the
instructions.
Click Next to continue.

Registration and My Account 26


BitDefender Security for File Servers 3.5

7.3. Step 3/3 - Finish

Finish

Click Finish to close the window.

Note
To log in to your BitDefender account, click My account.

Registration and My Account 27


BitDefender Security for File Servers 3.5

8. Monitoring
The Monitoring snap-in provides you with all the necessary means to monitor and
control the product activity.
If you click Monitoring in the tree menu, the dashboard is displayed. The dashboard
provides you with useful information on the status of BitDefender Security for File
Servers and helps you easily solve the issues that require your attention.
In the tree menu, grouped under the Monitoring snap-in, you can access the following
sections:

Statistics - offers statistic information on the product activity.


Reports - allows creating customized reports on the product activity.
Alerts & Logs - allows configuring the logging options and sending alerts about the
events that occur during product operation, such as an update error or an infected
file detected.
Quarantine - shows the quarantined files. These files were found to be infected or
suspect and were moved to the quarantine folder, according to the specified action.
Scheduled Tasks - allows creating scheduled tasks through an intuitive wizard. You
can schedule updates, on-demand scanning processes and reports to be generated.

In this chapter, you can find a detailed description of each section.

Monitoring 28
BitDefender Security for File Servers 3.5

8.1. Dashboard
Click Monitoring in the tree menu to see the dashboard.

Dashboard

The dashboard provides you with useful information on the status of BitDefender
Security for File Servers and helps you easily solve the issues that require your
attention. You should check the dashboard frequently in order to quickly identify and
solve the issues affecting the security of the file server.

Monitoring 29
BitDefender Security for File Servers 3.5

8.1.1. Important Links


At the top of the dashboard there are several useful links.

Link Description
Buy Opens a web page where you can buy the product from.
My Account Opens your BitDefender account web page.
Register Opens the registration wizard.
Support Opens the BitDefender support web page.
Help Opens the help file.
About Opens a window where you can see details about the product.

8.1.2. Status Area


The Status area contains information about and helps you fix the existing issues.
Three status buttons, monitoring three categories of issues, immediately inform you
about the existence of specific issues:

Server scan
Update status
License status

Note
The License Status button and the related issues are not available if BitDefender Security
for File Servers is managed by BitDefender Management Server.

To the left of the status buttons you can see the number of issues affecting the security
of the file server, if any.
The status buttons can be displayed in green, orange or red, depending on the existing
issues that affect the security of the file server:

Green indicates that no issue requires your attention.


Orange indicates the existence of issues that pose medium security risks. These
issues do not require your immediate attention, but you should check them as soon
as possible.
Red indicates the existence of critical security issues, which require your immediate
attention.

To find out details about these issues, do one of the following:

Click a status button to see the respective category of issues.


Click corresponding to Issue details to expand this section and see all possible
issues.

Monitoring 30
BitDefender Security for File Servers 3.5

The Issue details section contains three tables, one for each status button. Each
table displays the monitored items and their current status. When there is an issue
concerning one of the monitored items, a red Fix link is displayed. To quickly solve
the existing issues, click the Fix links, one by one, or the Fix all issues button.

Important
For every monitored item, there is a check box selected by default in the Monitor
column. If you do not want a specific item to be monitored, just clear the corresponding
check box.

Server Scan
If the Server Scan button is orange or red, there are issues affecting the scanning
activity of BitDefender Security for File Servers.
Click the button to see the respective issues. A table named Server scan will be
displayed and you will be able to see the monitored items and their current status.

Real-time protection. The issues that can be reported are listed in the following
table:

Status Description
Scan files is off Critical issue. Real-time protection is disabled and the file
server is not protected against malware.
Click Fix to enable real-time protection.
Registration has Critical issue. The licensing period has expired.
expired Click Fix to open the registration wizard and register
BitDefender Security for File Servers with a new license
key.

Update Status
If the Update Status button is orange or red, there are update issues affecting
BitDefender Security for File Servers.
Click the button to see the respective issues. A table named Update Status will be
displayed and you will be able to see the monitored items and their current status.

Last signature update. The issues that can be reported are listed in the following
table:

Status Description
At least one update location Critical issue. Contacting one or both update
failed locations was not possible during the last update
process.

Monitoring 31
BitDefender Security for File Servers 3.5

Status Description
Click Fix to initiate a new update.
No update was performed Critical issue.
Click Fix to initiate a new update. The status
will change to Downloading.
Update failed because the Critical issue.
updates on your server are not You need to go to Update > Locations and
signed, and you chose not to select the Allow unsigned updates check box
allow unsigned updates for your server.

Last product update. The issues that can be reported are listed in the following
table:

Status Description
Product update Critical issue. Automatic product updates are disabled,
disabled making you server more vulnerable to security threats.
Click Fix to enable automatic product updates.
Product update Critical issue. A new product update has been downloaded
downloaded, please and it is not installed on your system.
install it Clicking Fix will install the update. If the update requires
stopping traffic or rebooting the server, you will have to
confirm your choice by clicking OK.
To be able to schedule the installation of available product
updates that require stopping traffic or rebooting the
server, click the Fix all issues button instead.
A new kit is available Critical issue. The new kit may come with new features
and it is not installed and functionalities.
on your system Click Fix to install the kit. You will have to confirm your
choice by clicking OK. Please note that installing the kit
might require a server restart.

Signature update older than one day. The issues that can be reported are listed
in the following table:

Status Description
Updates are old Critical issue. More than one day passed since the last update.
Click Fix to initiate a new update. The status will change to
Downloading.

Monitoring 32
BitDefender Security for File Servers 3.5

Automatic update. The issues that can be reported are listed in the following table:

Status Description
Automatic update is off and Critical issue. BitDefender Security for File Servers
no scheduled update task is is not automatically updated on a regular basis.
defined and on Click Fix to enable automatic update. If not already
configured, the update interval is set to one hour.

License Status
If the License Status button is orange or red, there are issues concerning the license
of your BitDefender Security for File Servers.

Note
The License Status button and the related issues are not available if BitDefender Security
for File Servers is managed by BitDefender Management Server. In this case, the
registration procedure is performed from the management console of BitDefender
Management Server.

Click the button to see the respective issues. A table named License Status will be
displayed and you will be able to see the monitored items and their current status.

Registration. The issues that can be reported are listed in the following table:

Status Description
You are using a trial version Requires attention. This status is displayed during
of the product and you the trial period.
should register it Click Fix to open the registration wizard and register
BitDefender Security for File Servers with a new
license key.
Your product registration Requires attention. This status is displayed during
will expire in x days. You the last 30 days of the licensing period.
should renew your Click Fix to open the registration wizard and register
registration BitDefender Security for File Servers with a new
license key.
Product registration expired. Critical issue. The licensing period has expired.
You should register it Click Fix to open the registration wizard and register
BitDefender Security for File Servers with a new
license key.
The serial number you Requires attention. You have entered an invalid
introduced is not valid license key.

Monitoring 33
BitDefender Security for File Servers 3.5

Status Description
Click Fix to open the registration wizard where you
can register BitDefender Security for File Servers
with a new license key.

My account. The issues that can be reported are listed in the following table:

Status Description
You do not have an Requires attention. You have not registered an
account. Please create an account yet.
account Click Fix to open the registration wizard and create
a new account or provide the details of an existing
one.
The password you Click Fix to open the registration wizard where you
introduced is incorrect. can create a new account or log in to an existing
Please try again one.
Server error! Please try Requires attention. A connection with the
again later BitDefender server could not be established.
Click Fix to open the registration wizard and try
again.
Account locked Click Fix to open the registration wizard where you
can create a new account or log in to an existing
one.

Registration will expire alert. The issues that can be reported are listed in the
following table:

Status Description
You have x days Requires attention. This status is displayed during the
remaining from your last 30 days of the licensing period.
license key Click Fix to open the registration wizard and register
BitDefender Security for File Servers with a new license
key.
Product is expired Critical issue. The licensing period has expired.
Click Fix to open the registration wizard and register
BitDefender Security for File Servers with a new license
key.

Monitoring 34
BitDefender Security for File Servers 3.5

8.1.3. Scan Activity


To see graphical statistics regarding the scanning activity of BitDefender Security for
File Servers, click corresponding to the Scan activity section.

Note
If you want to see detailed statistics, click Statistics in the tree menu.

8.1.4. Product Status


To see information on the product status, click corresponding to the Product status
section.
You can see the name of the server BitDefender Security for File Servers is installed
on, as well as the product version and the number of available malware signatures.

8.2. Statistics
If you want to see detailed statistics regarding the real-time scanning activity of
BitDefender Security for File Servers, click Statistics in the tree menu.

Statistics

Monitoring 35
BitDefender Security for File Servers 3.5

BitDefender stores data about the objects scanned in real time in a database. Using
this database, BitDefender offers detailed statistics that allow you to assess:

the security status of the file server.


the existing threats and their damage potential.

The following types of statistics are available:

Type Description
Summary Provides overall statistics on the real-time scanning activity of
BitDefender Security for File Servers:

number of scanned items.


number of items found infected / suspicious / clean.
number of items that could not be scanned.
number of viruses detected.
number of riskware detected, as a total and by riskware type.
number of solved issues, as a total and by action type.

A pie chart displays the percentage of infected, suspicious, not


scannable and clean files representing the total number of scanned
files.
Top Malware Shows the top 10 malware detected. Click the Top Malware tab to
see these statistics.

The statistics are grouped into 4 time intervals: today, last week, last month and total.
Click a link to access the corresponding statistics.

Note
The statistics are refreshed every 60 seconds in order to provide you with real-time
information.

8.2.1. Clearing Statistics


By default, BitDefender automatically clears statistical information older than 30 days.
You can configure the purge options at the bottom of the Statistics section. Type in
the edit box how many days / weeks / months statistic information should be stored.
To clear statistics manually, right-click Statistics in the tree menu and select Clear
all statistics.

Note
Please note that reports and statistics are created using the same database. Clearing
statistics will also affect the accuracy of the reports.

Monitoring 36
BitDefender Security for File Servers 3.5

8.3. Reports
BitDefender allows creating reports regarding its scanning activity conducted over a
certain period of time. You may find reports very useful, as you can print them or send
them to other people interested in the status of the file server security.
Reports can be generated in HTML or comma-separated values (CSV) format. You
can create the following types of reports:

Report Type Description


Total Provides complete information on the threats detected during a specific
time period.
Top Viruses Provides a table containing the threats detected during a specific time
period, ordered by number of files infected.

The reports are saved in ?:\Program Files\BitDefender\BitDefender


Security for File Servers\Reports\.

Note
Reports are created based on the information in the BitDefender database, which is by
default deleted every week. If the records were deleted sometime during the time period
covered by the report, then the report will provide inaccurate information.

To create, view and manage reports, click Reports in the tree menu (under
Monitoring).

Important
In the Reports section you can also find the on-demand scan reports.

Monitoring 37
BitDefender Security for File Servers 3.5

Reports

You can see all the existing reports listed in the table. For each report, the following
information is provided: the report name, the date when the report was generated, the
type of information it contains and the format.

8.3.1. Managing Reports


To manage the reports, use the provided buttons:

New Report - launches a wizard that will help you create a new report.
Delete - deletes one or several selected reports. You will have to confirm your choice
by clicking Yes.
View Report - opens a selected report.

Note
To open a report you can also double-click it.

Purge Options - opens a new window where you can specify how long reports
should be kept. Enter the number of hours / days / weeks / months during which to
store reports and click OK to save changes.

Monitoring 38
BitDefender Security for File Servers 3.5

Note
Reports older than the specified period will be automatically deleted.

8.3.2. Creating Reports


To create reports on the product activity, click New Report and follow the wizard that
will appear.

Step 1/5 - Welcome to the Report Wizard

Welcome

Click Next to continue.

Monitoring 39
BitDefender Security for File Servers 3.5

Step 2/5 - Select Report Type

Select Report Type

Select one of the report types available.

Report Type Description


Total Provides complete information on the threats detected during a specific
time period.
Top Viruses Provides a table containing the threats detected during a specific time
period, ordered by number of files infected.

Click Next.

Monitoring 40
BitDefender Security for File Servers 3.5

Step 3/5 - Select Report Format

Select Report Format

Select the format of the report file (HTML or CSV).


Click Next.

Step 4/5 - Select Time Interval

Select Time Interval

Select the time interval covered in the report:

Last day
Last week
Last month
Custom

Monitoring 41
BitDefender Security for File Servers 3.5

If you need information about the BitDefender activity related to a specific time interval,
select Custom and specify the start and end date. To specify the start and end date,
either click the numbers in the date field and enter new values or click the arrow to
choose a date from the calendar.

Note
The date format is month/day/year.

Only the records from the specified period will appear in the report.
Click Next.

Step 5/5 - View Summary

View Summary

This window displays the selected report settings. You can make any changes by
returning to the previous steps (click Back).
Click Finish to generate the report. The report will appear in the Reports section.

Monitoring 42
BitDefender Security for File Servers 3.5

8.4. Alerts & Logs


The Alerts & Logs snap-in allows configuring the BitDefender notification system.
BitDefender is by default configured to keep a log of its activity. The BitDefender log
provides you with a comprehensive list of the events that occured during product
operation. To configure logging or view the log files, go to the Logging tab.
Moreover, you can configure BitDefender to immediately alert designated people about
the occurrence of certain events during product operation. Alerts can be sent through
mail or using the net send command. To configure the mail and net send alert
notification services, go to the Alerts tab.

Note
Please note that Windows Server 2008 does not provide support for net send alerts.

The Alerts tab also displays the list of events that may occur during product operation.
You can completely disable notifications for each event or you can configure
BitDefender to send mail and net send alerts when the event occurs. For more
information, please refer to Configuring Event Notification (p. 49).

8.4.1. Alerts
Alerts are messages that include product-related information and which are meant to
inform their recipients about the product activity. BitDefender can be set to notify users
and administrators about occurring events through mail or net send alerts.
To configure the alert notification services and the events you want to be informed
about, click Alerts & Logs in the tree menu (under Monitoring) and then the Alerts
tab.

Monitoring 43
BitDefender Security for File Servers 3.5

Alerts

All of the events that may occur are listed in the table. There are 3 types of events:

Information - such events provide information about the product activity.


Warning - such events provide critical information about aspects of the product
activity which require your attention.
Error - such events provide information about errors that appear during product
operation.

Here is the list of the events that may appear:

Event Description
BitDefender Error Groups all the errors that may appear during product
operation, such as service start failure.
Update Error Refers to the occurrence of an error during the update
process.
Infected/suspect file Occurs when an infected or suspect file has been
detected detected.
BitDefender Warning Groups critical information regarding the activity of
BitDefender.

Monitoring 44
BitDefender Security for File Servers 3.5

Event Description
File not scanned Occurs when a file could not be scanned by
BitDefender.
BitDefender information Groups information regarding the activity of
BitDefender.
Key expired Indicates the expiration of the registration period.
Key will expire Indicates that there are 3 days left before the product
expires.
On-demand scanning Occurs whenever an on-demand scan is performed.
Update information Contains information about the update process.
Product update Occurs when a product update is available.

Configuring Alert Notification Services


To configure the alert notification services and their global settings, click Common
alerts settings. The configuration window will appear.

Mail Alerts
BitDefender can notify the network administrator by sending configurable mail alerts
in case an event for which they have been set takes place. Enabling this type of alert
will provide you with relevant and timely information about the status of your server
and may eliminate the need to access the BitDefender management console.

Note
This module integrates with an SMTP Server. It works with an ESMTP server as well,
but it does not use the ESMTP protocol because it is implemented on SMTP.

The Mail Alert tabs allows you to configure the mail alert notification service.

Monitoring 45
BitDefender Security for File Servers 3.5

Mail Alerts

In order to use the mail notification service, follow these steps:

1. Select Enable Mail Alerts to activate the mail notification service.


2. Specify the SMTP settings required for sending the mail alerts.
SMTP Server - type in the IP address of the SMTP server that your network uses
to send messages.
From address - type in the e-mail address that will appear in the sender field.

Important
Provide a valid e-mail address for the SMTP server, otherwise the server may decline
to send an e-mail whose sender (e-mail address) is unknown to it.

3. If the SMTP server used to send messages requires authentication, select Use
SMTP Server Authentication and enter the user name and password in the
corresponding fields.

Note
NTLM authentication is not supported.

4. Specify the global recipients of the mail alerts.


In the edit box, type the e-mail addresses of the global recipients of mail alerts.

Monitoring 46
BitDefender Security for File Servers 3.5

To import e-mail addresses from a txt file, click Import, select the file and then
click Open. You can also copy the e-mail addresses from the text file and paste
them in the edit box.
5. Click Apply to save the changes and OK to close the window.
6. Configure the events for which mail alerts should be sent.

To export the list of e-mail addresses to a txt file, click Export and save the file to
the desired location.

Note
The recipients specified here will be alerted upon the occurrence of an event for which
this type of alert has been set. To specify different recipients for each event, go to the
Alerts section and configure the events. For more information, please refer to Configuring
Event Notification (p. 49).

If you want to disable this service, clear the check box corresponding to Enable Mail
Alerts and then click Apply to save the changes.

Net Send Alerts


BitDefender can notify the network administrator by sending configurable alerts through
the net send command upon the occurrence of an event for which they have been
set.

Note
This module integrates with the Net Send command of the Windows Operating System
on which the product is installed and it provides alerts regarding the product activity. In
order to receive such alerts, the Messenger and Alert services must be enabled by the
administrator on the server and on the client workstations. Windows Server 2008 does
not provide support for net send alerts.

Monitoring 47
BitDefender Security for File Servers 3.5

Net Send Alerts

In order to use the net send notification service, follow these steps:

1. Select Enable Net Send Alerts to activate the net send notification service.
2. Specify the global recipients of the net send alerts.
In the edit box, type the computer names of the global recipients of mail alerts.
To import computer names from a txt file, click Import, select the file and then
click Open. You can also copy the computer names from the text file and paste
them in the edit box.
3. Click Apply to save the changes and OK to close the window.
4. Configure the events for which net send alerts should be sent, as described in the
Configuring Event Notification (p. 49) section.

Note
The recipients specified here will be alerted upon the occurrence of an event for which
this type of alert has been set. To specify different recipients for each event, go to the
Alerts section and configure the events. For more information, please refer to Configuring
Event Notification (p. 49).

To export the list to a txt file, click Export and save the file to the desired location.
If you want to disable this service, clear the check box corresponding to Enable Net
Send Alerts and then click Apply to save the changes.

Monitoring 48
BitDefender Security for File Servers 3.5

Important
In case of a virus outbreak it is not advisable to use this type of alert.

Configuring Event Notification


You can configure the notification methods separately for each event in the list. To
configure the notification methods for a specific event, select it and click Configure
event. The configuration window will appear.
Follow these steps to configure event notification:

Step 1/3 - Select Event Importance


Open the configuration window to select the importance of the event.

Select Event Importance

You can see the name and category of the event.


By default, event notification is enabled for each event that may occur. To disable
event notification for this event, clear the Enable event notification check box.

Note
If event notification is disabled, the event is not logged and no alert is sent when it takes
place.

When an event takes place, based on its importance, it can be logged and, possibly,
specified recipients may be notified through mail and net send alerts of its occurrence.
Choose one of the following options to set the importance level:

Low (File Log) - to keep a record of the event in the log file. No alert is sent when
the event takes place.
Medium (File Log and SMTP) - to log the event and send mail alerts when the
event takes place.

Monitoring 49
BitDefender Security for File Servers 3.5

High (File Log, SMTP and Net Send) - to log the event and send mail and net
send alerts when the event takes place.

Note
To make sure that logging and the mail and net send notification services are enabled,
go to the Logs and Alerts sections.

Click Apply to save the changes and OK if you want to close the window.

Step 2/3 - Configure Mail Alerts


If the importance of the event is medium or high, mail alerts will be sent. Click the Mail
Alerts tab to configure the recipients and the text of the mail alerts.

Configure Mail Alerts

Mail alerts are sent to the e-mail addresses listed in the box.

Note
Beside these recipients, mail alerts are also sent to the global alert recipients. For more
information, please refer to Mail Alerts (p. 45).

Configure Alert Recipients


To specify the recipients of the mail alerts:

In the edit box, type the recipients' e-mail addresses.


To import e-mail addresses from a txt file, click Import, select the file and then
click Open. You can also copy the e-mail addresses from the text file and paste
them in the edit box.

If you want to export the list to a txt file, click Export and save the file to the desired
location.

Monitoring 50
BitDefender Security for File Servers 3.5

Configure Alert Text


Mail alerts have a default text, which differs depending on the event.
To see the default text, click Configure alert text.
You can make any changes to the alert content.

Important
You should NOT modify the strings that begin with the $ symbol as they provide valuable
information about the event.

Click Apply to save the changes and OK if you want to close the window.

Step 3/3 - Configure Net Send Alerts


If the importance of the event is high, net send alerts will be sent. Click the Net Send
Alerts tab to configure the recipients and the text of the net send alerts.

Configure Net Send Alerts

Net send alerts are sent to the computers listed in the box.

Configure Alert Recipients


To specify the recipients of the net send alerts:

In the edit box, type the recipients' computer names.


To import computer names from a txt file, click Import, select the file and then
click Open. You can also copy the computer names from the text file and paste
them in the edit box.

If you want to export the list to a txt file, click Export and save the file to the desired
location.

Monitoring 51
BitDefender Security for File Servers 3.5

Note
Beside the recipients defined here, alerts are also sent to the global recipients defined
in the Alerts section (see Net Send Alerts (p. 47)).

Configure Alert Text


Net send alerts have a default text, which differs depending on the event.
To see the default text, click Configure alert text.
You can make any changes to the alert content.

Important
You should NOT modify the strings that begin with the $ symbol as they provide valuable
information about the event.

Click Apply to save the changes and OK to close the window.

Monitoring 52
BitDefender Security for File Servers 3.5

8.4.2. Logs
BitDefender is by default configured to keep a log of its activity. The BitDefender log
provides you with a comprehensive list of the events that occured during product
operation.

Note
By default, the log file is saved in: ?:\Program
Files\BitDefender\BitDefender for Windows Servers
Services\BDLog.

To configure logging and to view the log files, click Alerts & Logs in the tree menu
(under Monitoring) and then the Logging tab.

Logs

Examining Logs
Click View last log to open the last log file.
If you have set a size limit for the log file, you can see any saved log file. Click View
saved logs, locate the log file you want to see and double-click it.

Monitoring 53
BitDefender Security for File Servers 3.5

Configuring Logging
To log the product activity to a file, select Enable file logging.
BitDefender creates the log file in ?:\Program Files\BitDefender\BitDefender
for Windows Servers Services\BDLog. By default, when the file reaches the
size limit of 1024 KB, a new log file is created.
Specify the size limit of the log files in the Maximum log file size field. If you do not
want to limit the size of the log file, enter 0 in the edit field.
You can specify a folder where files exceeding the specified size limit should be saved.
Either provide its path in the corresponding field or click Browse, locate the folder and
then click OK to set the new location.
To set the time period for which logs are to be stored, click Purge logs. Enter the
number of hours / days / weeks / months during which to store reports and click OK.
Click Apply to save the changes.

Monitoring 54
BitDefender Security for File Servers 3.5

8.5. Quarantine
BitDefender allows isolating infected or suspicious files in a secure area, named
quarantine. By isolating these files, the risk of getting infected disappears.

Important
The quarantine folder is common for both on-access and on-demand scanning.

To see the quarantined files and manage them, click Quarantine in the tree menu
(under Monitoring).

Quarantine

You can see the quarantined files listed in the table. For each quarantined file, the
following information is provided: the date and time when it was quarantined, the status
(infected / suspect), the virus name and the original location and file name.
Quarantined files are encrypted. If you want to open or execute a quarantined file,
select it and then click Save to disk to decrypt the file.

8.5.1. Managing Quarantine


To manage the quarantined files, use the provided buttons:

Delete - deletes one or several selected files.

Monitoring 55
BitDefender Security for File Servers 3.5

Save to - decrypts selected quarantined files and saves them to the disk. In this
way you can open or execute these files.
Restore - decrypts selected quarantined files and restores them to their original
locations.
Rescan - rescans selected quarantined files.
Scanning older quarantined files with the latest malware signatures can lead to them
being repaired and restored to their original location.
Properties - opens a window where you can configure quarantine settings.

Configuring Quarantine Settings


To configure the quarantine settings, click the Properties button.

Quarantine Properties

The following settings can be configured.

Quarantine location
You can change the folder the quarantine is located in. Provide the new path in the
edit field or click Browse to set a new location. The default location of the quarantine
folder is: C:\Program Files\BitDefender\BitDefender for Windows
Servers Services\Quarantine.
Purge settings
By default, quarantined files older than 30 days are automatically deleted. To change
the time interval during which files are stored in the quarantine, type the number of
hours / days / weeks / months in the corresponding field.

Monitoring 56
BitDefender Security for File Servers 3.5

Rescan settings
BitDefender is configured to automatically rescan all quarantined files every 30
days. You can change the frequency to any number of hours / days / weeks / months,
rescan after each malware signature update, or disable this feature altogether.

Note
It is recommended to rescan quarantined items after each malware signature update.

Restore settings
By default, repaired items are automatically restored to their original location.
Restoration can sometimes fail (if, for example, the original location is no longer
available). For this reason, you can configure an alternative location by selecting
the corresponding check box and entering a new target.
To disable the restoration of repaired files, select Repair files and leave them in
quarantine.

Click OK to save the changes and close the window.

8.6. Scheduled Tasks


Scheduled tasks provide great flexibility and help perform administrative security tasks
without increasing the workload and affecting the performance of the file server. You
can set BitDefender to perform specific tasks one-time only or on a regular basis
according to a convenient schedule. You can schedule the following tasks:

on-demand scanning processes.


update processes.
report generation tasks.

To create or configure scheduled tasks, click Scheduled Tasks (under Monitoring)


in the tree menu.

Monitoring 57
BitDefender Security for File Servers 3.5

Scheduled Tasks

You can see all the existing scheduled tasks listed in the table. For each task, the
following information is provided: the task type and name, the last time when it was
performed, the next time it is scheduled to run and the status.

8.6.1. Managing Scheduled Tasks


To manage the scheduled tasks, use these buttons:

Run Now - runs a selected scheduled task.


New Task - launches a wizard that will help you create a new scheduled task.

Note
The configuration wizard is different for each type of scheduled task.

Copy - copies one or several selected scheduled tasks.


Delete - deletes one or several selected scheduled tasks. You will have to confirm
your choice by clicking Yes.
Enable / Disable - enables / disables one or several selected scheduled tasks.
Properties - opens the configuration window of a selected scheduled task, allowing
you to modify it and to configure more advanced settings.

Monitoring 58
BitDefender Security for File Servers 3.5

8.6.2. On-demand Scanning Tasks


Scheduling Tasks
To create a new scheduled task, click New task. The configuration wizard will appear
and it will guide you through the process of creating a scheduled task.
Follow these steps to schedule an on-demand scanning task:

Step 1/7 - Welcome to the Scheduled Tasks Wizard

Welcome

Click Next.

Step 2/7 - Select Task Type

Select Task Type

Provide the task name and then select On-demand Scanning Task.

Monitoring 59
BitDefender Security for File Servers 3.5

Click Next.

Step 3/7 - Configure Schedule

Configure Task Schedule

Specify the task schedule.


You must choose one of the following options from the menu:

Once - to run the task one time only, at a given moment.


Specify the start date and time in the Start Date / Start Time fields.
Periodically - to run the task periodically, at certain time intervals (minutes, hours,
days, weeks, months, years), starting with a specified date and time.
To configure the necessary settings, follow these steps:
1. Specify the start date in the Start Date field.
2. If you want to run the task repeatedly until a certain date, check End Date and
specify the end date in the corresponding field.
3. Specify the start time in the Start Time field.
4. Specify the task frequency by specifying the number of minutes / hours / days /
weeks / months / years between two successive occurrences of such task, in the
corresponding field.
Week Days - to run the task repeatedly only in certain days of the week starting
with a specified date and time.
To configure the necessary settings, follow these steps:
1. Specify the start date in the Start Date field.
2. If you want to run the task repeatedly until a certain date, check End Date and
specify the end date in corresponding field.
3. Specify the start time in the Start Time field.

Monitoring 60
BitDefender Security for File Servers 3.5

4. Specify the day or days of the week on which the task should be run.

Click Next.

Step 4/7 - Select Scan Mode

Select Scan Mode

You can use one of the following scan modes:

Scan Mode Description


Quick System Scan Allows quickly scanning the Program Files and Windows
folders using a pre-defined configuration of the scan settings.
Please note that only the application files that do not exceed
10 megabytes (MB) are scanned.
Deep System Scan Allows performing a comprehensive scan of the entire file
server. The pre-defined scan settings offer the highest detection
efficiency.
Custom Scan Allows scanning specific locations on the file server using a
custom configuration of the scan settings.

Important
To configure the settings available for the selected scan mode, open the task
configuration window and go to:

Scan settings tab to configure the scan target and the scan settings, if you have
selected to perform a custom scan.
Actions tab to configure the actions to be taken on the detected files.
Notifications tab to configure the notification options.

For more information, please refer to Configuring Properties (p. 64).

Click Next.

Monitoring 61
BitDefender Security for File Servers 3.5

Step 5/7 - Set Actions

Set Actions

You can configure different actions for each type of detected file: infected, suspect or
rootkit. Select the actions to be taken on the detected files from the corresponding
menus.

Note
You can configure two actions for infected and suspect files. The second action is
enabled only in case the first action fails.

Actions for infected files. The following actions are available for infected files:

Action Description
Disinfect Remove the malware code from the infected files detected.
Disinfection may fail in some cases, such as when the file is inside
specific mail archives or it is used by a running process.
Move to Move infected files from their original location to the quarantine
Quarantine folder. Quarantined files cannot be executed or opened; therefore,
the risk of getting infected disappears.
Delete Immediately remove infected files from the disk, without any
warning.
Ignore Just log the infected files detected in the scan report. To view the
scan report, go to Reports in the tree menu after the scan is
completed.

Actions for suspect files. The following actions are available for suspect files:

Monitoring 62
BitDefender Security for File Servers 3.5

Action Description
Move to Move infected files from their original location to the quarantine
Quarantine folder. Quarantined files cannot be executed or opened;
therefore, the risk of getting infected disappears.
Delete Immediately remove suspect files from the disk, without any
warning.
Ignore Just log the suspect files detected in the scan report. To view
the scan report, go to Reports in the tree menu after the scan
is completed.

Actions for rootkits (hidden objects). The following actions are available for rootkits:

Action Description
Disinfect Remove the malware code from the infected files detected. Disinfection
may fail in some cases, such as when the file is inside specific mail archives
or it is used by a running process.
Ignore Just log the rootkits detected in the scan report. To view the scan report,
go to Reports in the tree menu after the scan is completed.

Click Next.

Step 6/7 - Configure Notifications Options

Configure Notifications Options

Select Log start/end of on-demand scanning to record the start and the end of the
scan in the BitDefender log. If you want BitDefender to also send mail or net send
alerts to designated people, go to Alerts & Logs, Alerts tab, and configure the
On-demand scanning event appropriately. For more information, please refer to
Configuring Event Notification (p. 49).

Monitoring 63
BitDefender Security for File Servers 3.5

Click Next.

Step 7/7 - View Summary

View Summary

This window displays the task settings. You can make any changes by returning to
the previous steps (click Back).
Select Open the advanced properties of this task when I click "Finish" if you want
the Properties window of this task to be opened after you complete the wizard. In this
window you can modify the task and configure more advanced settings. For more
information, please refer to Configuring Properties (p. 64).
Click Finish to save the scheduled task.

Note
The task will appear in the Scheduled Tasks section.

Configuring Properties
In order to modify an existing scheduled task or to configure more advanced settings,
unavailable in the configuration wizard, just double-click the task or select it and click
Properties. The configuration window will appear.

Note
To open the configuration window, you can also select Open the advanced properties
of this task when I click "Finish" in the last step of the wizard.

Viewing General Information


Open the configuration window to check general information.

Monitoring 64
BitDefender Security for File Servers 3.5

General

You can see general information about the task (the name, the status, the last time
when the task ran). If you want to change the task name, enter a new name in the
corresponding field.
To enable the task, select Enable Task. Otherwise, clear this check box.
Click Apply to save the changes. If you want to save the changes and close the
configuration window, click OK.
If you want to close the configuration window without making any changes, click
Cancel.

Modifying Schedule
Click the Schedule tab in the configuration window to modify the schedule.

Monitoring 65
BitDefender Security for File Servers 3.5

Schedule

Specify the task schedule.


You must choose one of the following options from the menu:

Once - to run the task one time only, at a given moment.


Specify the start date and time in the Start Date / Start Time fields.
Periodically - to run the task periodically, at certain time intervals (minutes, hours,
days, weeks, months, years), starting with a specified date and time.
To configure the necessary settings, follow these steps:
1. Specify the start date in the Start Date field.
2. If you want to run the task repeatedly until a certain date, check End Date and
specify the end date in the corresponding field.
3. Specify the start time in the Start Time field.
4. Specify the task frequency by specifying the number of minutes / hours / days /
weeks / months / years between two successive occurrences of such task, in the
corresponding field.
Week Days - to run the task repeatedly only in certain days of the week starting
with a specified date and time.

Monitoring 66
BitDefender Security for File Servers 3.5

To configure the necessary settings, follow these steps:


1. Specify the start date in the Start Date field.
2. If you want to run the task repeatedly until a certain date, check End Date and
specify the end date in corresponding field.
3. Specify the start time in the Start Time field.
4. Specify the day or days of the week on which the task should be run.

Select Delete if not scheduled to run again to delete the task after its last execution.
Click Apply to save the changes. If you want to save the changes and close the
configuration window, click OK.
If you want to close the configuration window without making any changes, click
Cancel.

Configuring Settings
Click the Scan settings tab in the configuration window to configure the scan target
and the scan settings.

Note
If you have scheduled a quick or deep system scan, you can only view the pre-defined
scan target and scan settings.

Monitoring 67
BitDefender Security for File Servers 3.5

Settings

Excluding Specific Malware from Scanning


You can configure BitDefender to use, besides virus signatures, the signatures of any
of the following threats:

spyware
adware
applications
dialers
rootkits

To this purpose, keep selected the check boxes corresponding to Scan for riskware
and to the specific malware threats you want to scan for.

Important
All malware detected is treated as infected.

If you want BitDefender to only use virus signatures for the signature-based scan,
clear the Scan for riskware check box.

Monitoring 68
BitDefender Security for File Servers 3.5

Setting Scan Target


To specify the items (drives, files, folders) to be scanned, do any of the following:

In the edit box, type the full path to the items to be scanned, separating each of
them by enter, comma or semicolon.
Click Browse and select the items to be scanned.
If you have a text file containing a list of locations (files and folders) to be scanned,
click Import and load the respective file. You can also copy the locations from the
text file and paste them in the edit box.

To save the list of files and folders to a text file, click Export.

Scanning Files by Extension


Some file types are more likely to carry viruses than others. For example, the risk of
getting infected when executing an .exe file is much higher than when opening a
.txt or a .gif file.
To specify the file types to be scanned, select one of the following options:

Option Description
Scan all All files are scanned regardless of their type.
extensions
Scan only Only application files are scanned. This category is limited to files
application with the following extensions: 386; a6p; ac; accda; accdb;
files accdc; accde; accdp; accdr; accdt; accdu; acl;
acr; action; ade; adp; air; app; as; asd; asp;
awk; bas; bat; bin; cgi; chm; cla; class; cmd;
cnv; com; cpl; csc; csh; dat; dek; dld; dll; doc;
docm; docx; dot; dotm; dotx; drv; ds; ebm; esh;
exe; ezs; fky; frs; fxp; gadget; grv; hlp; hms;
hta; htm; html; iaf; icd; ini; inx; ipf; isu; jar;
js; jse; jsx; kix; laccdb; lnk; maf; mam; maq;
mar; mat; mcr; mda; mdb; mde; mdt; mdw; mem; mhtml;
mpp; mpt; mpx; ms; msg; msi; msp; mst; msu; oab;
obi; obs; ocx; oft; ole; one; onepkg; ost; ovl;
pa; paf; pex; pfd; php; pif; pip; pot; potm; potx;
ppa; ppam; pps; ppsm; ppsx; ppt; pptm; pptx; prc;
prf; prg; pst; pub; puz; pvd; pwc; py; pyc; pyo;
qpx; rbx; rgs; rox; rpj; rtf; scar; scr; script;
sct; shb; shs; sldm; sldx; smm; snp; spr; svd;
sys; thmx; tlb; tms; u3p; udf; url; vb; vbe; vbs;
vbscript; vxd; wbk; wcm; wdm; wiz; wll; wpk; ws;
wsf; xar; xl; xla; xlam; xlb; xlc; xll; xlm; xls;

Monitoring 69
BitDefender Security for File Servers 3.5

Option Description
xlsb; xlsm; xlsx; xlt; xltm; xltx; xlw; xml; xqt;
xsf; xsn; xtp
Viruses usually infect application files. Therefore, these file types
should always be scanned.
Scan custom Only the files with the specified extensions are scanned. You must
extensions type in the edit field the file extensions to be scanned by BitDefender,
separating them by semicolons (";").
Scan all except The files with the specified extensions are NOT scanned. You must
the following type in the edit field the file extensions NOT to be scanned by
extensions BitDefender, separating them by semicolons (";").
You should not exclude from scanning file types commonly known
to carry viruses, such as .exe, .doc, .ppt, .xls, .rtf, .pif,
.bat and others.

Scanning Files by Size


Scanning large files requires additional system resources, which slows down the
system and increases access times.
You can specify the maximum size (in kilobytes) of the files to be scanned in the
Maximum file size to be scanned field. For example, if you type 2000, all files larger
than 2000 KB will be excluded from scanning.
If you want BitDefender to scan the files in the scan target regardless of their size, do
one of the following:

Clear the check box corresponding to Maximum file size to be scanned.


Set the size limit to 0 KB.

Configuring Advanced Settings and Exceptions


To configure more advanced scanning settings or to specify exceptions to on-demand
scanning, click Advanced. A new configuration window will appear.

Monitoring 70
BitDefender Security for File Servers 3.5

Advanced Settings

You can configure the following advanced scanning settings:

Option Description
Scan boot sectors Scan the boot sectors of the available drives.
Scan memory Scan the systems memory.
Scan registry Scan Windows registry.
Scan cookies Scan cookie files.
Scan inside archives Scan archived files. You can specify a maximum archive
depth in order to scan files archived several times. If you want
to scan files no matter how many times they were archived,
set the maximum archive depth to 0.
Selecting this option slows down the system and may increase
scanning time.
Scan packed files Scan packed files.

To exclude files and folders only from on-demand scanning:

1. Select Do not scan the following files and folders.


2. Do any of the following:
In the edit box, type the full path to the files and folders not to be scanned,
separating each of them by enter, comma or semicolon.

Monitoring 71
BitDefender Security for File Servers 3.5

Click Browse and select the files and folders not to be scanned.
If you have a text file containing a list of locations (files and folders) not to be
scanned, click Import and load the respective file. You can also copy the locations
from the text file and paste them in the edit box.

To save the list of files and folders to a text file, click Export. In this way, you can
import this list on other file servers in order to configure the scanning exceptions.
Click Apply to save the changes. If you want to save the changes and close the
configuration window, click OK.
If you want to close the configuration window without making any changes, click
Cancel.

Configuring Actions
Click the Actions tab in the configuration window to configure the actions to be taken
on the detected files.

Actions

You can configure different actions for each type of detected file: infected, suspect or
rootkit. Select the actions to be taken on the detected files from the corresponding
menus.

Monitoring 72
BitDefender Security for File Servers 3.5

Note
You can configure two actions for infected and suspect files. The second action is
enabled only in case the first action fails.

Actions for infected files. The following actions are available for infected files:

Action Description
Disinfect Remove the malware code from the infected files detected.
Disinfection may fail in some cases, such as when the file is inside
specific mail archives or it is used by a running process.
Move to Move infected files from their original location to the quarantine
Quarantine folder. Quarantined files cannot be executed or opened; therefore,
the risk of getting infected disappears.
Delete Immediately remove infected files from the disk, without any
warning.
Ignore Just log the infected files detected in the scan report. To view the
scan report, go to Reports in the tree menu after the scan is
completed.

Actions for suspect files. The following actions are available for suspect files:

Action Description
Move to Move infected files from their original location to the quarantine
Quarantine folder. Quarantined files cannot be executed or opened;
therefore, the risk of getting infected disappears.
Delete Immediately remove suspect files from the disk, without any
warning.
Ignore Just log the suspect files detected in the scan report. To view
the scan report, go to Reports in the tree menu after the scan
is completed.

Actions for rootkits (hidden objects). The following actions are available for rootkits:

Action Description
Disinfect Remove the malware code from the infected files detected. Disinfection
may fail in some cases, such as when the file is inside specific mail archives
or it is used by a running process.
Ignore Just log the rootkits detected in the scan report. To view the scan report,
go to Reports in the tree menu after the scan is completed.

Click Apply to save the changes. If you want to save the changes and close the
configuration window, click OK.

Monitoring 73
BitDefender Security for File Servers 3.5

If you want to close the configuration window without making any changes, click
Cancel.

Configuring Notifications
Click the Notifications tab in the configuration window to configure the notification
options.

Notifications

Select Log start/end of on-demand scanning to record the start and the end of the
scan in the BitDefender log. If you want BitDefender to also send mail or net send
alerts to designated people, go to Alerts & Logs, Alerts tab, and configure the
On-demand scanning event appropriately. For more information, please refer to
Configuring Event Notification (p. 49).
A detailed scan report is created every time you perform an on-demand scan. The
report is generated in XML format and it can be viewed using a browser. To view the
scan report, go to Reports.
By default, the on-demand scan reports are saved in ?:\Program
Files\BitDefender\BitDefender Security for File Servers\Reports\.
To change this location, either type in the edit field the new location or click Browse
and select the folder in which reports are to be saved.

Monitoring 74
BitDefender Security for File Servers 3.5

Click Apply to save the changes. If you want to save the changes and close the
configuration window, click OK.
If you want to close the configuration window without making any changes, click
Cancel.

8.6.3. Update Tasks


Scheduling Tasks
To create a new scheduled task, click New task. The configuration wizard will appear
and it will guide you through the process of creating a scheduled task.

Note
The scheduled update tasks will not deactivate the automatic update.

Follow these steps to schedule an update task:

Step 1/4 - Welcome to the Scheduled Tasks Wizard

Welcome

Click Next.

Monitoring 75
BitDefender Security for File Servers 3.5

Step 2/4 - Select Task Type

Select Task Type

Provide the task name and then select Update Task.


Click Next.

Step 3/4 - Configure Schedule

Configure Task Schedule

Specify the task schedule.


You must choose one of the following options from the menu:

Once - to run the task one time only, at a given moment.


Specify the start date and time in the Start Date / Start Time fields.
Periodically - to run the task periodically, at certain time intervals (minutes, hours,
days, weeks, months, years), starting with a specified date and time.

Monitoring 76
BitDefender Security for File Servers 3.5

To configure the necessary settings, follow these steps:


1. Specify the start date in the Start Date field.
2. If you want to run the task repeatedly until a certain date, check End Date and
specify the end date in the corresponding field.
3. Specify the start time in the Start Time field.
4. Specify the task frequency by specifying the number of minutes / hours / days /
weeks / months / years between two successive occurrences of such task, in the
corresponding field.
Week Days - to run the task repeatedly only in certain days of the week starting
with a specified date and time.
To configure the necessary settings, follow these steps:
1. Specify the start date in the Start Date field.
2. If you want to run the task repeatedly until a certain date, check End Date and
specify the end date in corresponding field.
3. Specify the start time in the Start Time field.
4. Specify the day or days of the week on which the task should be run.

Click Next.

Step 4/4 - View Summary

View Summary

This window displays the task settings. You can make any changes by returning to
the previous steps (click Back).
Select Open the advanced properties of this task when I click "Finish" if you want
the Properties window of this task to be opened after you complete the wizard. In this
window you can modify the task and configure more advanced settings. For more
information, please refer to Configuring Properties (p. 78).

Monitoring 77
BitDefender Security for File Servers 3.5

Click Finish to save the scheduled task.

Note
The task will appear in the Scheduled Tasks section.

Configuring Properties
In order to modify an existing scheduled task or to configure more advanced settings,
unavailable in the configuration wizard, just double-click the task or select it and click
Properties. The configuration window will appear.

Note
To open the configuration window, you can also select Open the advanced properties
of this task when I click "Finish" in the last step of the wizard.

Viewing General Information


Open the configuration window to check general information.

General

You can see general information about the task (the name, the status, the last time
when the task ran). If you want to change the task name, enter a new name in the
corresponding field.
To enable the task, select Enable Task. Otherwise, clear this check box.
Click Apply to save the changes. If you want to save the changes and close the
configuration window, click OK.

Monitoring 78
BitDefender Security for File Servers 3.5

If you want to close the configuration window without making any changes, click
Cancel.

Modifying Schedule
Click the Schedule tab in the configuration window to modify the schedule.

Schedule

Specify the task schedule.


You must choose one of the following options from the menu:

Once - to run the task one time only, at a given moment.


Specify the start date and time in the Start Date / Start Time fields.
Periodically - to run the task periodically, at certain time intervals (minutes, hours,
days, weeks, months, years), starting with a specified date and time.
To configure the necessary settings, follow these steps:
1. Specify the start date in the Start Date field.
2. If you want to run the task repeatedly until a certain date, check End Date and
specify the end date in the corresponding field.
3. Specify the start time in the Start Time field.
4. Specify the task frequency by specifying the number of minutes / hours / days /
weeks / months / years between two successive occurrences of such task, in the
corresponding field.

Monitoring 79
BitDefender Security for File Servers 3.5

Week Days - to run the task repeatedly only in certain days of the week starting
with a specified date and time.
To configure the necessary settings, follow these steps:
1. Specify the start date in the Start Date field.
2. If you want to run the task repeatedly until a certain date, check End Date and
specify the end date in corresponding field.
3. Specify the start time in the Start Time field.
4. Specify the day or days of the week on which the task should be run.

Select Delete if not scheduled to run again to delete the task after its last execution.
Click Apply to save the changes. If you want to save the changes and close the
configuration window, click OK.
If you want to close the configuration window without making any changes, click
Cancel.

8.6.4. Report Generation Tasks


Scheduling Tasks
To create a new scheduled task, click New task. The configuration wizard will appear
and it will guide you through the process of creating a scheduled task.
Follow these steps to schedule a report generation task:

Step 1/7 - Welcome to the Scheduled Tasks Wizard

Welcome

Click Next.

Monitoring 80
BitDefender Security for File Servers 3.5

Step 2/7 - Select Task Type

Select Task Type

Provide the task name and then select Generate Report Task.
Click Next.

Step 3/7 - Configure Schedule

Configure Task Schedule

Specify the task schedule.


You must choose one of the following options from the menu:

Once - to run the task one time only, at a given moment.


Specify the start date and time in the Start Date / Start Time fields.
Periodically - to run the task periodically, at certain time intervals (minutes, hours,
days, weeks, months, years), starting with a specified date and time.

Monitoring 81
BitDefender Security for File Servers 3.5

To configure the necessary settings, follow these steps:


1. Specify the start date in the Start Date field.
2. If you want to run the task repeatedly until a certain date, check End Date and
specify the end date in the corresponding field.
3. Specify the start time in the Start Time field.
4. Specify the task frequency by specifying the number of minutes / hours / days /
weeks / months / years between two successive occurrences of such task, in the
corresponding field.
Week Days - to run the task repeatedly only in certain days of the week starting
with a specified date and time.
To configure the necessary settings, follow these steps:
1. Specify the start date in the Start Date field.
2. If you want to run the task repeatedly until a certain date, check End Date and
specify the end date in corresponding field.
3. Specify the start time in the Start Time field.
4. Specify the day or days of the week on which the task should be run.

Click Next.

Step 4/7 - Select Report Type

Select Report Type

Select one of the report types available.

Report Type Description


Total Provides complete information on the threats detected during a specific
time period.

Monitoring 82
BitDefender Security for File Servers 3.5

Report Type Description


Top Viruses Provides a table containing the threats detected during a specific time
period, ordered by number of files infected.

Click Next.

Step 5/7 - Select Report Format

Select Report Format

Select the format of the report file (HTML or CSV).


Click Next.

Step 6/7 - Select Time Interval

Select Time Interval

Select the time interval covered in the report:

Monitoring 83
BitDefender Security for File Servers 3.5

Last day
Last week
Last month
Custom

If you need information about the BitDefender activity related to a specific time interval,
select Custom and specify the start and end date. To specify the start and end date,
either click the numbers in the date field and enter new values or click the arrow to
choose a date from the calendar.

Note
The date format is month/day/year.

Only the records from the specified period will appear in the report.
Click Next.

Step 7/7 - View Summary

View Summary

This window displays the task settings. You can make any changes by returning to
the previous steps (click Back).
Select Open the advanced properties of this task when I click "Finish" if you want
the Properties window of this task to be opened after you complete the wizard. In this
window you can modify the task and configure more advanced settings. For more
information, please refer to Configuring Properties (p. 85).
Click Finish to save the scheduled task.

Note
The task will appear in the Scheduled Tasks section.

Monitoring 84
BitDefender Security for File Servers 3.5

Configuring Properties
In order to modify an existing scheduled task or to configure more advanced settings,
unavailable in the configuration wizard, just double-click the task or select it and click
Properties. The configuration window will appear.

Note
To open the configuration window, you can also select Open the advanced properties
of this task when I click "Finish" in the last step of the wizard.

Viewing General Information


Open the configuration window to check general information.

General

You can see general information about the task (the name, the status, the last time
when the task ran). If you want to change the task name, enter a new name in the
corresponding field.
To enable the task, select Enable Task. Otherwise, clear this check box.
Click Apply to save the changes. If you want to save the changes and close the
configuration window, click OK.
If you want to close the configuration window without making any changes, click
Cancel.

Modifying Schedule
Click the Schedule tab in the configuration window to modify the schedule.

Monitoring 85
BitDefender Security for File Servers 3.5

Schedule

Specify the task schedule.


You must choose one of the following options from the menu:

Once - to run the task one time only, at a given moment.


Specify the start date and time in the Start Date / Start Time fields.
Periodically - to run the task periodically, at certain time intervals (minutes, hours,
days, weeks, months, years), starting with a specified date and time.
To configure the necessary settings, follow these steps:
1. Specify the start date in the Start Date field.
2. If you want to run the task repeatedly until a certain date, check End Date and
specify the end date in the corresponding field.
3. Specify the start time in the Start Time field.
4. Specify the task frequency by specifying the number of minutes / hours / days /
weeks / months / years between two successive occurrences of such task, in the
corresponding field.
Week Days - to run the task repeatedly only in certain days of the week starting
with a specified date and time.
To configure the necessary settings, follow these steps:
1. Specify the start date in the Start Date field.
2. If you want to run the task repeatedly until a certain date, check End Date and
specify the end date in corresponding field.

Monitoring 86
BitDefender Security for File Servers 3.5

3. Specify the start time in the Start Time field.


4. Specify the day or days of the week on which the task should be run.

Select Delete if not scheduled to run again to delete the task after its last execution.
Click Apply to save the changes. If you want to save the changes and close the
configuration window, click OK.
If you want to close the configuration window without making any changes, click
Cancel.

Configuring Settings
Click the Settings tab in the configuration window to modify the report settings.

Settings

Follow these steps to configure the report settings:

1. Select one of the report types available.

Report Type Description


Total Provides complete information on the threats detected during a
specific time period.
Top Viruses Provides a table containing the threats detected during a specific
time period, ordered by number of files infected.

2. Select the format of the report file (HTML or CSV).

Monitoring 87
BitDefender Security for File Servers 3.5

3. Select the time interval covered in the report:


Last day
Last week
Last month
Custom

Click Apply to save the changes. If you want to save the changes and close the
configuration window, click OK.
If you want to close the configuration window without making any changes, click
Cancel.

Monitoring 88
BitDefender Security for File Servers 3.5

9. Server Scan
Server Scan allows configuring the way in which BitDefender scans the file server.
BitDefender Security for File Servers protects Windows-based file servers against
various kinds of malware, such as viruses, spyware, adware, rootkits and so on. The
product offers two layers of protection:

Real-time protection - prevents users from accessing or copying infected files and
thus causing the infection to spread throughout the network. BitDefender scans files
as they are accessed or copied on the disk, according to the current protection level
settings. The actions to be taken on the infected and suspect files detected also
depend on the current protection level.
By default, real-time protection is set to the Medium level, which provides reasonable
detection efficiency with low use of system resources. BitDefender is configured to
disinfect infected files (deny access if disinfection fails) and to deny access to suspect
files. To change the protection level or to fully customize real-time protection, go to
the Real-time tab.

Note
Real-time protection is also referred to as on-access scanning - files are scanned as
the users access them.

On-demand scanning - allows detecting and removing the malware that already
resides in the system. This is the classic scan initiated by the administrator - you
choose what drive, folder or file BitDefender should scan, and BitDefender scans
it - on-demand.
To configure and initiate on-demand scanning, go to the Scan Tasks tab. There
are several scan modes that you can run. Use the custom mode to fully configure
the scanning settings and the scan target.
You can also easily scan any file or folder using the Scan with BitDefender option
from the Windows context menu.
You can schedule on-demand scanning tasks to run at a specific time or on a regular
basis. To learn more, please refer to Scheduled Tasks (p. 57).

Depending on the configuration of the system BitDefender Security for File Servers
is installed on, specific files, folders and processes are automatically excluded from
scanning during installation. You can also specify other files, folders and processes
that you do not want to be scanned. For more information, please refer to Scanning
Exceptions (p. 117).

Server Scan 89
BitDefender Security for File Servers 3.5

9.1. Real-time Protection


Real-time protection keeps the file server safe from new viruses, spyware and riskware.
It also prevents users from accessing or copying infected files and thus causing the
infection to spread throughout the network.
BitDefender scans files as they are accessed or copied on the disk according to the
current protection level settings. The actions to be taken on the infected and suspect
files detected also depend on the current protection level.
To configure real-time protection, click Server Scan in the tree menu and then the
Real-time tab.

Real-time Protection

Real-time protection is enabled by default. If you want to disable it, clear the Real-time
protection is enabled check box and click Apply.

Important
Keep real-time protection enabled in order to protect the file server and the workstations
that use its resources against viruses, spyware and other malware.

9.1.1. Setting Protection Level


The protection level allows you to easily configure real-time protection using predefined
configurations of the scanning settings or a custom configuration. The actions to be

Server Scan 90
BitDefender Security for File Servers 3.5

taken on the infected and suspect files detected are configurable for each protection
level.
Move the slider to the protection level that best suits your security needs. You can
choose one of the four protection levels:

Protection level Description


High Offers high security. The resource consumption level is moderate.

All accessed files, regardless of their extension and size, are


scanned. The boot sectors of the available drives are scanned as
well.
Accessed files are scanned for all kinds of malware (viruses,
Trojans, spyware, adware, riskware, dialers and so on).
BitDefender scans inside archives.
The default action taken on infected files is Disinfect. If disinfection
fails, the files will be deleted.
The default action taken on suspect files is Delete.

Medium Offers standard security. The resource consumption level is low.

Only the accessed files that do not exceed 10 megabytes (MB) are
scanned. The boot sectors of the available drives are scanned as
well.
Accessed files are scanned only for viruses, Trojans and spyware.
BitDefender does not scan inside archives.
The default action taken on infected files is Disinfect. If disinfection
fails, access to such files is denied.
The default action taken on suspect files is Deny access.

Low Covers basic security needs. The resource consumption level is very
low.

Only the accessed application files that do not exceed 5 megabytes


(MB) are scanned.
Accessed files are scanned only for viruses, Trojans and spyware.
BitDefender does not scan inside archives.
The default action taken on infected files is Disinfect. If disinfection
fails, access to such files is denied.
The default action taken on suspect files is Deny access.

Custom Allows customizing the real-time protection settings. To configure


these settings, click Configure current protection level.

To view the settings of a protection level in detail:

1. Set the slider to the respective level.

Server Scan 91
BitDefender Security for File Servers 3.5

2. Click Configure current protection level to open the configuration window.


3. Click the tabs to see the configured scanning settings, actions and notifications.

If you have set a new protection level, click Apply to save the changes.

9.1.2. Configuring Protection Level


Each protection level allows configuring the actions to be taken on infected and suspect
files and event notification for real-time protection. If you want to configure the scan
settings too, use the Custom level.
To configure the current protection level settings:

1. Click Configure current protection level. The configuration window will appear.
2. Click the tabs and configure the respective settings, as needed.
3. Click OK to save the changes and close the window.

The configuration window has three tabs:

Tab Description
Scan settings This tab allows you to configure the scan settings of real-time
protection. You can set BitDefender to scan only files having specific
extensions or to skip from scanning specific file formats, archives or
files exceeding a configured size limit.
Actions This tab allows you to configure the actions to be taken on the infected
and suspect files detected by BitDefender.
Notifications This tab allows you to specify the on-access scanning events
BitDefender should notify you about.

Scan Settings Tab


This tab allows you to configure the scan settings of real-time protection.

Note
The scan settings can be configured only for the Custom protection level.

Server Scan 92
BitDefender Security for File Servers 3.5

Scan Settings Tab

The scan settings BitDefender offers may help you fully adapt real-time protection to
the specific security needs of your file server. You can configure real-time protection
as follows:

to scan only files from specific locations on the file server.


to scan only files with specific extensions or not to scan specific file formats.
not to scan files exceeding a configured size limit.
not to scan archives.
not to scan specific files and folders.

Fine-tuning the scan settings may greatly reduce scanning times and improve the
system's responsiveness.

Setting Scan Target


By default, BitDefender is set to scan accessed files regardless of their location on
the file server. In this way, the entire file server is protected against viruses and
spyware.
If you want only files from specific locations to be scanned on-access, follow these
steps:

1. Select Custom scan.

Server Scan 93
BitDefender Security for File Servers 3.5

2. Do any of the following:


In the edit box, type the full path to the files and folders to be scanned, separating
each of them by enter, comma or semicolon.
Click Browse and select the files and folders to be scanned.
If you have a text file containing a list of locations (files and folders) to be scanned,
click Import and load the respective file. You can also copy the locations from
the text file and paste them in the edit box.

To save the list of files and folders to a text file, click Export.

Scanning Files by Extension


Some file types are more likely to carry viruses than others. For example, the risk of
getting infected when executing an .exe file is much higher than when opening a
.txt or a .gif file.
To specify the file types to be scanned, select one of the following options:

Option Description
Scan all Accessed files are scanned regardless of their type.
extensions
Scan only Only application files are scanned. This category is limited to files
application with the following extensions: 386; a6p; ac; accda; accdb;
files accdc; accde; accdp; accdr; accdt; accdu; acl;
acr; action; ade; adp; air; app; as; asd; asp;
awk; bas; bat; bin; cgi; chm; cla; class; cmd;
cnv; com; cpl; csc; csh; dat; dek; dld; dll; doc;
docm; docx; dot; dotm; dotx; drv; ds; ebm; esh;
exe; ezs; fky; frs; fxp; gadget; grv; hlp; hms;
hta; htm; html; iaf; icd; ini; inx; ipf; isu; jar;
js; jse; jsx; kix; laccdb; lnk; maf; mam; maq;
mar; mat; mcr; mda; mdb; mde; mdt; mdw; mem; mhtml;
mpp; mpt; mpx; ms; msg; msi; msp; mst; msu; oab;
obi; obs; ocx; oft; ole; one; onepkg; ost; ovl;
pa; paf; pex; pfd; php; pif; pip; pot; potm; potx;
ppa; ppam; pps; ppsm; ppsx; ppt; pptm; pptx; prc;
prf; prg; pst; pub; puz; pvd; pwc; py; pyc; pyo;
qpx; rbx; rgs; rox; rpj; rtf; scar; scr; script;
sct; shb; shs; sldm; sldx; smm; snp; spr; svd;
sys; thmx; tlb; tms; u3p; udf; url; vb; vbe; vbs;
vbscript; vxd; wbk; wcm; wdm; wiz; wll; wpk; ws;
wsf; xar; xl; xla; xlam; xlb; xlc; xll; xlm; xls;
xlsb; xlsm; xlsx; xlt; xltm; xltx; xlw; xml; xqt;
xsf; xsn; xtp

Server Scan 94
BitDefender Security for File Servers 3.5

Option Description
Viruses usually infect application files. Therefore, these file types
should always be scanned on access.
Scan custom Only the files with the specified extensions are scanned. You must
extensions type in the edit field the file extensions to be scanned by BitDefender,
separating them by semicolons (";").
Scan all except The files with the specified extensions are NOT scanned. You must
the following type in the edit field the file extensions NOT to be scanned by
extensions BitDefender, separating them by semicolons (";").
You should not exclude from scanning file types commonly known
to carry viruses, such as .exe, .doc, .ppt, .xls, .rtf, .pif,
.bat and others.

Scanning Files by Size


Scanning large files requires additional system resources, which slows down the
system and increases access times.
You can specify the maximum size (in kilobytes) of the files to be scanned in the
Maximum file size to be scanned field. For example, if you type 2000, all files larger
than 2000 KB will be excluded from scanning.
If you want BitDefender to scan accessed files regardless of their size, do one of the
following:

Clear the check box corresponding to Maximum file size to be scanned.


Set the size limit to 0 KB.

Configuring Advanced Settings and Exceptions


To configure more advanced scanning settings or to specify exceptions to on-access
scanning, click Advanced. A new configuration window will appear.

Server Scan 95
BitDefender Security for File Servers 3.5

Advanced Settings

You can configure the following advanced scanning settings:

Option Description
Malware scanned Scan accessed files not only for viruses, but also for known
riskware threats. The riskware category contains spyware,
adware, dialers and other applications that may be used for
malicious purposes.
Detected files will be treated as infected. The software that
includes adware components might stop working if this option
is enabled.
Scan boot sectors Scan the boot sectors of the available drives.
Scan packed files Scan packed files.
Do not scan BitDefender will not scan the network shares on the file server,
network shares allowing for a faster network access.
You should not select this option if the network computers are
not protected by an antivirus solution.
Scan inside Scan archived files. You can specify a maximum archive depth
archives in order to scan files archived several times. If you want to
scan files no matter how many times they were archived, set
the maximum archive depth to 0.

Server Scan 96
BitDefender Security for File Servers 3.5

Option Description
Selecting this option slows down the system and may increase
access times.

To exclude files and folders only from on-access scanning:

1. Select Do not scan the following files and folders.


2. Do any of the following:
In the edit box, type the full path to the files and folders not to be scanned,
separating each of them by enter, comma or semicolon.
Click Browse and select the files and folders not to be scanned.
If you have a text file containing a list of locations (files and folders) not to be
scanned, click Import and load the respective file. You can also copy the locations
from the text file and paste them in the edit box.

To save the list of files and folders to a text file, click Export. In this way, you can
import this list on other file servers in order to configure the scanning exceptions.
You can also specify whether the global exceptions defined in the Exceptions section
should apply to real-time scanning.

Actions Tab
This tab allows you to configure the actions to be taken on the infected and suspect
files detected by BitDefender.

Server Scan 97
BitDefender Security for File Servers 3.5

Actions Tab

You can configure different actions for infected and suspect files. There is a list of
actions for each type of detected files (infected or suspect). When an infected or
suspect file is detected, the first action in the corresponding list is applied. If this action
fails, the next action in the list is applied and so on.
You can change the order in which actions are to be applied. Select an action and
click or to move it up or down in the list.
Actions for infected files. The following actions are available for infected files:

Action Description
Disinfect Remove the malware code from the requested infected files before
delivery. Disinfection may fail in some cases, such as when the
file is inside specific mail archives or it is used by a running
process.
Deny Deny users' access to the requested files if BitDefender detects
them to be infected.
Move to Move infected files from their original location to the quarantine
Quarantine folder. Quarantined files cannot be executed or opened; therefore,
the risk of getting infected disappears.

Server Scan 98
BitDefender Security for File Servers 3.5

Action Description
Delete Immediately remove infected files from the disk, without any
warning.

Actions for suspect files. The following actions are available for suspect files:

Action Description
Deny Deny users' access to the requested files if BitDefender detects
them to be suspect.
Move to Quarantine Move suspect files from their original location to the quarantine
folder. Quarantined files cannot be executed or opened;
therefore, the risk of getting infected disappears.
Delete Immediately remove suspect files from the disk, without any
warning.

If you want BitDefender to automatically send the suspect files to the BitDefender Lab
for further analysis, select the corresponding check box.

Notifications Tab
BitDefender can be configured to notify you about special events that occur during its
operation. This tab allows you to specify the on-access scanning events BitDefender
should notify you about.

Server Scan 99
BitDefender Security for File Servers 3.5

Notifications Tab

Select the scanning events you want to be informed about:

Infected/suspect file detected - when an infected or suspicious file was detected.


File not scanned - when a file could not be scanned.

To configure BitDefender only to log the occurrence of an event, or also to alert you
or other person about it through mail or net send, go to Alerts & Logs, Alerts tab, and
configure the corresponding event. For more information, please refer to Configuring
Event Notification (p. 49).

9.1.3. Configuring Number of Scanning Instances


If you want to modify the number of scanning instances configured during installation,
click Advanced. A new window will appear.

Server Scan 100


BitDefender Security for File Servers 3.5

Scanning Instances

Type a new value in the edit field and click OK to save the changes.

9.2. On-demand Scanning


On-demand scanning provides an additional protection layer for the file server. You
should periodically scan the file server to make sure it is free from malware threats
(viruses, spyware or rootkits). It is recommended to perform a comprehensive system
scan every week.

Important
Immediately after installing BitDefender Security for File Servers, please run an
On-Demand Scan to detect/clean any infections already on your computer.

To configure and initiate on-demand scanning, click Server Scan in the tree menu
and then the Scan Tasks tab.

Server Scan 101


BitDefender Security for File Servers 3.5

Scan Tasks

On-demand scanning is based on scan modes. A scan mode specifies:

the locations (drives, folders, files) to be scanned.


the scan settings.
the items excluded from scanning.
the actions to be taken on the infected, suspect or hidden files detected.

You can use one of the following scan modes:

Scan Mode Description


Quick System Allows quickly scanning the Program Files and Windows folders
Scan using a pre-defined configuration of the scan settings. Please note
that only the application files that do not exceed 10 megabytes
(MB) are scanned.
By default, BitDefender is configured to take the following actions:

Disinfect infected files and rootkits (hidden objects). If disinfection


fails, infected files will be moved to the quarantine.
Move to quarantine for suspect files.

Server Scan 102


BitDefender Security for File Servers 3.5

Scan Mode Description


Deep System Allows performing a comprehensive scan of the entire file server.
Scan The pre-defined scan settings offer the highest detection efficiency.
By default, BitDefender is configured to take the following actions:

Disinfect infected files and rootkits (hidden objects). If disinfection


fails, infected files will be moved to the quarantine.
Move to quarantine for suspect files.

Custom Scan Allows scanning specific locations on the file server using a custom
configuration of the scan settings. To configure these settings, click
Customize.

9.2.1. Scanning Files and Folders


Here are some tips regarding on-demand scanning:

Avoid scanning the file server when the server workload is at high levels, especially
in the case of a thorough scanning. It is recommended to perform scans when the
server is idle or nearly idle. For example, you should perform (plan) deep system
scans in weekends or at night.
Before you start scanning, you should update BitDefender to enable it to detect the
latest malware discovered. To immediately update BitDefender, follow these steps:
1. In the tree menu, click Update.
2. Click the Update tab.
3. Click Update Now.
If you have created a scheduled scan task to run periodically, you should also create
a scheduled update task to run a few minutes before the scan task.

Important
If you have disabled Automatic update or the update frequency is low, updating
BitDefender before scanning is a MUST.

Perform a deep system scan once a week to make sure that no malware is lodged
in the system. To this purpose, you can conveniently schedule an on-demand
scanning task to run every week. To learn more, please refer to Scheduled Tasks
(p. 57).

There are three ways in which to initiate an on-demand scan:

Running a scan task from the BitDefender Management Console.


Using the Scan with BitDefender option from the Windows context menu.

Server Scan 103


BitDefender Security for File Servers 3.5

Using the BitDefender Manual Scanner to directly select files or folders to be


scanned.

Running Scan Tasks


To scan files and folders for malware threats using scan tasks, follow these steps:

1. Select a scan mode from the Scan tasks tab. Use the custom mode to fully configure
the scanning settings and the scan target.
2. If you have selected to perform a custom scan, specify the scan target and configure
the scanning settings. For more information, please refer to Configuring On-Demand
Scanning Settings (p. 109).
3. Click Start Scan and follow the steps of the BitDefender Scanner.

Context Menu Scanning


This is the easiest and recommended way to scan a file or folder on your computer.
Right-click the object you want to scan and select Scan with BitDefender from the
menu. The BitDefender Scanner will appear and guide you through the scanning
process.
To find out how to configure context menu scan settings, please refer to Configuring
On-Demand Scanning Settings (p. 109).

Manual Scanning
Manual scanning consists in directly selecting the object to be scanned using the
BitDefender On-Demand Scan option from the BitDefender program group in the Start
Menu. The scanning options are pre-configured for the best detection results.

Note
Manual scanning is very useful, as it can be performed when Windows works in Safe
Mode, too.

To select the object to be scanned by BitDefender, in the Windows Start menu, follow
the path Start Menu All Programs BitDefender Security for Windows Servers
BitDefender On-Demand Scan. The following window will appear:

Server Scan 104


BitDefender Security for File Servers 3.5

Select Scan Target

Select the location you want to scan and click OK. The BitDefender Scanner will
appear and guide you through the scanning process.

BitDefender Scanner
The BitDefender Scanner appears whenever you initiate an on-demand scan. Follow
the three-step guided procedure to complete the scanning process.

Step 1/3 - Scanning


BitDefender will start scanning the selected objects.

Server Scan 105


BitDefender Security for File Servers 3.5

Scanning

You can see the scan status and statistics (scanning speed, elapsed time, number of
scanned / infected / suspicious / hidden objects and other).

Note
The scanning process may take a while, depending on the complexity of the scan.

To temporarily stop the scanning process, just click Pause. You will have to click
Resume to resume scanning.
You can stop scanning anytime you want by clicking Stop&Yes. You will go directly
to the last step of the wizard.
Wait for BitDefender to finish scanning.

Step 2/3 - Select Actions


When the scanning is completed, a new window will appear, where you can see the
scan results.

Server Scan 106


BitDefender Security for File Servers 3.5

Actions

You can see the number of issues affecting your system.


The infected objects are displayed in groups, based on the malware they are infected
with. Click the link corresponding to a threat to find out more information about the
infected objects.
You can choose an overall action to be taken for each group of issues or you can
select separate actions for each issue.

Note
You need to choose the action manually only when the BitDefender Scanner starts as
a result of a manual scan being initiated.

The following options can appear on the menu:

Action Description
Take No Action Ignore the detected files. They will only be logged in the scan report.
Disinfect Remove the malware code from infected files.
Delete Remove detected files from the disk.

Click Continue to apply the specified actions.

Server Scan 107


BitDefender Security for File Servers 3.5

Step 3/3 - View Results


When BitDefender finishes fixing the issues, the scan results will appear in a new
window.

Summary

You can see the results summary. To see the scan report, go to Reports.

Important
If required, please restart your system in order to complete the cleaning process.

Click Exit to close the results window.

BitDefender Could Not Solve Some Issues


In most cases BitDefender successfully disinfects the infected files it detects or it
isolates the infection. However, there are issues that cannot be solved.
In these cases, we recommend you to contact the BitDefender Support Team at
www.bitdefender.com. Our support representatives will help you solve the issues you
are experiencing.

BitDefender Detected Password-protected Items


The password-protected category includes two types of items: archives and installers.
They do not present a real threat to the security of the system unless they contain
infected files and only if executed.

Server Scan 108


BitDefender Security for File Servers 3.5

To make sure that these items are clean:

If the password-protected item is an archive you protected with a password, extract


the files it contains and scan them separately.
If the password-protected item is an installer, make sure that real-time protection
is enabled before you execute the installer. If the installer is infected, BitDefender
will detect and isolate the infection.

If you do not want these objects to be detected again by BitDefender you must add
them as exceptions to the scanning process. To add scan exceptions, go to Server
Scan > Exceptions . For more information, please refer to Scanning Exceptions (p.
117).

BitDefender Detected Suspect Files


Suspect files are files detected by the heuristic analysis as potentially infected with
malware the signature of which has not been released yet.
If suspect files were detected during the scan, you will be requested to submit them
to the BitDefender Lab. Click OK to send these files to the BitDefender Lab for further
analysis.

9.2.2. Configuring On-Demand Scanning Settings


Each scan mode allows configuring the actions to be taken on infected, suspect and
hidden files, and the event notifications. If you want to configure the scan target and
the scan settings too, use the custom scan mode.
For context menu scanning, you can configure the scan settings, the actions to be
taken on infected, suspect and hidden files and the event notifications.

Note
To schedule an on-demand scan and configure its settings, use the provided link to
access the Scheduled Tasks section.

To configure the settings of a scan mode or the context menu scan settings:

1. On-demand Scan Modes


Click the corresponding Customize link.
Context Menu Scan
Click the Configure scan options link.
The configuration window will appear.
2. Click the tabs and configure the respective settings, as needed.
3. Click OK to save the changes and close the window.

The configuration window has three tabs:

Server Scan 109


BitDefender Security for File Servers 3.5

Tab Description
Scan settings This tab allows you to configure the scan settings and the scan target.
You can set BitDefender to scan only files having specific extensions
or to skip from scanning specific file formats, archives or files exceeding
a configured size limit.
Actions This tab allows you to configure the actions to be taken on the infected,
suspect and hidden files detected by BitDefender.
Notifications This tab allows you to configure the notification options for on-demand
scanning.

Scan Settings Tab


This tab allows you to configure the scan settings and the scan target.

Note
The scan settings can be configured only for the custom scan mode and context menu
scanning.

Scan Settings Tab

Excluding Specific Malware from Scanning


You can configure BitDefender to use, besides virus signatures, the signatures of any
of the following threats:

Server Scan 110


BitDefender Security for File Servers 3.5

spyware
adware
applications
dialers
rootkits

To this purpose, keep selected the check boxes corresponding to Scan for riskware
and to the specific malware threats you want to scan for.

Important
All malware detected is treated as infected.

If you want BitDefender to only use virus signatures for the signature-based scan,
clear the Scan for riskware check box.

Setting Scan Target


Note
Not available for context menu scanning.

To specify the items (drives, files, folders) to be scanned, do any of the following:

In the edit box, type the full path to the items to be scanned, separating each of
them by enter, comma or semicolon.
Click Browse and select the items to be scanned.
If you have a text file containing a list of locations (files and folders) to be scanned,
click Import and load the respective file. You can also copy the locations from the
text file and paste them in the edit box.

To save the list of files and folders to a text file, click Export.

Scanning Files by Extension


Some file types are more likely to carry viruses than others. For example, the risk of
getting infected when executing an .exe file is much higher than when opening a
.txt or a .gif file.
To specify the file types to be scanned, select one of the following options:

Option Description
Scan all All files are scanned regardless of their type.
extensions
Scan only Only application files are scanned. This category is limited to files
application with the following extensions: 386; a6p; ac; accda; accdb;
files accdc; accde; accdp; accdr; accdt; accdu; acl;
acr; action; ade; adp; air; app; as; asd; asp;

Server Scan 111


BitDefender Security for File Servers 3.5

Option Description
awk; bas; bat; bin; cgi; chm; cla; class; cmd;
cnv; com; cpl; csc; csh; dat; dek; dld; dll; doc;
docm; docx; dot; dotm; dotx; drv; ds; ebm; esh;
exe; ezs; fky; frs; fxp; gadget; grv; hlp; hms;
hta; htm; html; iaf; icd; ini; inx; ipf; isu; jar;
js; jse; jsx; kix; laccdb; lnk; maf; mam; maq;
mar; mat; mcr; mda; mdb; mde; mdt; mdw; mem; mhtml;
mpp; mpt; mpx; ms; msg; msi; msp; mst; msu; oab;
obi; obs; ocx; oft; ole; one; onepkg; ost; ovl;
pa; paf; pex; pfd; php; pif; pip; pot; potm; potx;
ppa; ppam; pps; ppsm; ppsx; ppt; pptm; pptx; prc;
prf; prg; pst; pub; puz; pvd; pwc; py; pyc; pyo;
qpx; rbx; rgs; rox; rpj; rtf; scar; scr; script;
sct; shb; shs; sldm; sldx; smm; snp; spr; svd;
sys; thmx; tlb; tms; u3p; udf; url; vb; vbe; vbs;
vbscript; vxd; wbk; wcm; wdm; wiz; wll; wpk; ws;
wsf; xar; xl; xla; xlam; xlb; xlc; xll; xlm; xls;
xlsb; xlsm; xlsx; xlt; xltm; xltx; xlw; xml; xqt;
xsf; xsn; xtp
Viruses usually infect application files. Therefore, these file types
should always be scanned.
Scan custom Only the files with the specified extensions are scanned. You must
extensions type in the edit field the file extensions to be scanned by BitDefender,
separating them by semicolons (";").
Scan all except The files with the specified extensions are NOT scanned. You must
the following type in the edit field the file extensions NOT to be scanned by
extensions BitDefender, separating them by semicolons (";").
You should not exclude from scanning file types commonly known
to carry viruses, such as .exe, .doc, .ppt, .xls, .rtf, .pif,
.bat and others.

Scanning Files by Size


Scanning large files requires additional system resources, which slows down the
system and increases access times.
You can specify the maximum size (in kilobytes) of the files to be scanned in the
Maximum file size to be scanned field. For example, if you type 2000, all files larger
than 2000 KB will be excluded from scanning.
If you want BitDefender to scan the files in the scan target regardless of their size, do
one of the following:

Clear the check box corresponding to Maximum file size to be scanned.

Server Scan 112


BitDefender Security for File Servers 3.5

Set the size limit to 0 KB.

Configuring Advanced Settings and Exceptions


To configure more advanced scanning settings or to specify exceptions to on-demand
scanning, click Advanced. A new configuration window will appear.

Advanced Settings

You can configure the following advanced scanning settings:

Option Description
Scan boot sectors Scan the boot sectors of the available drives.
Scan memory Scan the systems memory.
Scan registry Scan Windows registry.
Scan cookies Scan cookie files.
Scan inside archives Scan archived files. You can specify a maximum archive
depth in order to scan files archived several times. If you want
to scan files no matter how many times they were archived,
set the maximum archive depth to 0.
Selecting this option slows down the system and may increase
scanning time.
Scan packed files Scan packed files.

Server Scan 113


BitDefender Security for File Servers 3.5

To exclude files and folders only from on-demand scanning:

1. Select Do not scan the following files and folders.


2. Do any of the following:
In the edit box, type the full path to the files and folders not to be scanned,
separating each of them by enter, comma or semicolon.
Click Browse and select the files and folders not to be scanned.
If you have a text file containing a list of locations (files and folders) not to be
scanned, click Import and load the respective file. You can also copy the locations
from the text file and paste them in the edit box.

To save the list of files and folders to a text file, click Export. In this way, you can
import this list on other file servers in order to configure the scanning exceptions.
By default, the global exceptions defined in the Exceptions section apply to on-demand
scaning. You can select not to apply the exceptions for the current scan mode.

Actions Tab
This tab allows you to configure the actions to be taken on the infected, suspect and
hidden files detected by BitDefender.

Actions Tab

Server Scan 114


BitDefender Security for File Servers 3.5

You can configure different actions for each type of detected file: infected, suspect or
rootkit. Select the actions to be taken on the detected files from the corresponding
menus.

Note
You can configure two actions for infected and suspect files. The second action is
enabled only in case the first action fails.

Actions for infected files. The following actions are available for infected files:

Action Description
Disinfect Remove the malware code from the infected files detected.
Disinfection may fail in some cases, such as when the file is inside
specific mail archives or it is used by a running process.
Move to Move infected files from their original location to the quarantine
Quarantine folder. Quarantined files cannot be executed or opened; therefore,
the risk of getting infected disappears.
Delete Immediately remove infected files from the disk, without any
warning.
Ignore Just log the infected files detected in the scan report. To view the
scan report, go to Reports in the tree menu after the scan is
completed.

Actions for suspect files. The following actions are available for suspect files:

Action Description
Move to Move infected files from their original location to the quarantine
Quarantine folder. Quarantined files cannot be executed or opened;
therefore, the risk of getting infected disappears.
Delete Immediately remove suspect files from the disk, without any
warning.
Ignore Just log the suspect files detected in the scan report. To view
the scan report, go to Reports in the tree menu after the scan
is completed.

If you want BitDefender to automatically send the suspect files to the BitDefender Lab
for further analysis, select the corresponding check box.
Actions for rootkits (hidden objects). The following actions are available for rootkits:

Server Scan 115


BitDefender Security for File Servers 3.5

Action Description
Disinfect Remove the malware code from the infected files detected. Disinfection
may fail in some cases, such as when the file is inside specific mail archives
or it is used by a running process.
Ignore Just log the rootkits detected in the scan report. To view the scan report,
go to Reports in the tree menu after the scan is completed.

Notifications Tab
BitDefender can be configured to notify you about special events that occur during its
operation. This tab allows you to configure the notification options for on-demand
scanning.

Notifications Tab

Select Log start/end of on-demand scanning to record the start and the end of the
scan in the BitDefender log. If you want BitDefender to also send mail or net send
alerts to designated people, go to Alerts & Logs, Alerts tab, and configure the
On-demand scanning event appropriately. For more information, please refer to
Configuring Event Notification (p. 49).

Server Scan 116


BitDefender Security for File Servers 3.5

A detailed scan report is created every time you perform an on-demand scan. The
report is generated in XML format and it can be viewed using a browser. To view the
scan report, go to Reports.
By default, the on-demand scan reports are saved in ?:\Program
Files\BitDefender\BitDefender Security for File Servers\Reports\.
To change this location, either type in the edit field the new location or click Browse
and select the folder in which reports are to be saved.

9.3. Scanning Exceptions


According to the Microsoft recommendations, BitDefender Security for File Servers
automatically excludes from scanning a number of files, folders and processes
belonging to or used by the Microsoft server products:

Microsoft Exchange 2007 / 2003 / 2000 / 5.5


Microsoft ISA Server 2006 / 2004 / 2000
Microsoft SharePoint 2003

Similarly, BitDefender Security for File Servers does not scan specific locations and
processes related to BitDefender Security for Windows Servers products and
BitDefender Management Server in order to avoid interfering with their operation and
to improve their performance.
The exclusion process occurs during installation. You can see the locations and the
processes excluded from scanning under the Global Exceptions tab and the Process
Exclusions tab, respectively. Later on, if you add or remove Microsoft server products
or BitDefender security solutions, you can go to these tabs and update exclusions
automatically.
You can manually exclude from scanning other files, folders and processes. For
example, you can exclude a backup process in order to avoid interference and to
speed it up. You can also remove current exclusions at your choice.
Besides the automatic exclusions, you may need to manually exclude specific items.
For more information, please refer to Items to Be Excluded Manually (p. 120).

9.3.1. Global Exceptions


To manage the files and folders excluded from both real-time and on-demand scanning,
click Server Scan in the tree menu and then the Global Exceptions tab.

Server Scan 117


BitDefender Security for File Servers 3.5

Scan Exceptions

The files and folders excluded from both real-time and on-demand scanning are listed
in the box.
To exclude files and folders from scanning, do any of the following:

In the edit box, type the full path to the files and folders not to be scanned, separating
each of them by enter, comma or semicolon.
Click Browse and select the files and folders not to be scanned.
If you have a text file containing a list of locations (files and folders) not to be
scanned, click Import list and load the respective file. You can also copy the
locations from the text file and paste them in the edit box.

To save the list of files and folders to a text file, click Export list. In this way, you can
import this list on other file servers in order to configure the scanning exceptions.
You can click Update Exclusions to automatically check for and exclude files and
folders that Microsoft or BitDefender recommend not to be scanned. You should update
exclusions if you have removed them accidentally and if you install a new Microsoft
server product or BitDefender security solution.
Click Apply to save the changes.

Server Scan 118


BitDefender Security for File Servers 3.5

9.3.2. Process Exclusions


To manage the processes excluded from real-time scanning, click Server Scan in the
tree menu and then the Process Exclusions tab.

Scan Exceptions

The first time you access this section, you can see the processes automatically
excluded from real-time scanning as recommended by Microsoft or BitDefender. You
can add new applications to the list or remove current applications.
To exclude a specific process from real-time scanning, follow these steps:

1. Click Add. A new window will appear.

Server Scan 119


BitDefender Security for File Servers 3.5

Add Application

2. Click Browse and select the application.


3. Click OK to add the process to the list.

To modify an exclusion from the list, double-click it or select it and click Modify. If you
no longer want to exclude an application from real-time scanning, select it and click
Delete.
You can click Update Exclusions to automatically check for and exclude applications
that Microsoft or BitDefender recommend not to be scanned in real time. You should
update exclusions if you have removed them accidentally and if you install a new
Microsoft server product or BitDefender security solution.

9.3.3. Items to Be Excluded Manually


Depending on the applications running on the server and the exclusions recommended
for them, you may need to add additional exclusions manually.
For example:

1. If a mail server different than Exchange Server is running on the machine , the
following locations must be excluded:
the folder where the mail server is installed.
the folder where the mailboxes and mail queues are stored.
2. If Exchange Server 2003 is running on the machine:
a. If you use Microsoft BackOffice POP3 Connector to pull emails from an external
POP3 account, exclude the incoming folder. The default location is:
%ProgramFiles%\Microsoft Windows Small Business
Server\Networking\POP3\Incoming Mail\
b. Exclude the Internet Information Services (IIS) 6.0 compression folder that is
used with Outlook Web Access 2003. The default location is the following folder:
%SystemRoot%\IIS Temporary Compressed Files\

Server Scan 120


BitDefender Security for File Servers 3.5

c. If clusters are used, exclude the following folders:


Quorum disk
%Winnt%\Cluster folder\
\Exchsrvr\Conndata folder\

%SystemRoot% and %ProgramFiles% are system variables dependent on the


operating system and computer configuration. They can be determined using the
command SET.

Note
For an updated list of exclusions recommended by Microsoft, please refer to this article.

9.4. Testing Antivirus Protection


You can verify that the BitDefender Antivirus component works properly by the help
of a special test file, known as the EICAR Standard Anti-virus Test file. EICAR stands
for the European Institute of Computer Anti-virus Research. This is a dummy file,
detected by antivirus products.
The file can be created using any text editor, provided the file is saved in standard
MS-DOS ASCII format and is 68 bytes long. It might also be 70 bytes if the editor puts
a CR/LF at the end.
The file must contain the following single line:

X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*

Copy this line and save the file with any name and .COM extension, for example
EICAR.COM. BitDefender must treat this file as an infected one.
There is no reason to worry, because this file is not a real virus. All that EICAR.COM
does when executed is display the text EICAR-STANDARD-ANTIVIRUS-TEST-FILE
and exit.

Note
The reason we do not include the file in the package is that we want to avoid generating
any false alarms for those who use BitDefender or any other virus scanner. You can
keep the EICAR.COM in a safe place and periodically test the server protection.

You can visit the EICAR website at http://eicar.com, read the documentation and
download the file from one of the locations on the following web page:
http://eicar.com/anti_virus_test_file.htm.

Server Scan 121


BitDefender Security for File Servers 3.5

10. Update
New viruses and spyware are found and identified every day. This is why it is very
important to keep BitDefender up to date with the latest signatures.
The automatic update feature allows updating BitDefender automatically, on a regular
basis, without the administrator's intervention. By default, BitDefender automatically
checks for updates every hour. If new malware signatures or scanning engine updates
are detected, BitDefender will automatically download and install them. To change
the update frequency, go to the Settings tab.
The automatic update can also be done anytime you want by clicking Update now
from the Update section or by creating a scheduled update task.

Note
In order not to interfere with the server's operation, product updates are not automatically
installed. Go to the Update section periodically to see if there are any product updates
available and to install them.

Updates can be classified in the following ways:

Antivirus updates - the files containing virus and spyware signatures, as well as
the scanning engine, are updated to ensure permanent protection against the new
threats that appear.
Product updates - when a new product version is released, new features and scan
techniques are introduced to the effect of improving the product's performance.

Update 122
BitDefender Security for File Servers 3.5

10.1. Update
To find out information on the update status and if product updates are available, click
Update in the tree menu and then the Update tab.

Update

If you want to update BitDefender immediately, just click Update Now. The Update
module will check for updates at the specified update locations. If new malware
signatures or scanning engine updates are detected, BitDefender will automatically
download and install them.

10.1.1. Update Information


In the Update Information box, you can see the update status and when the last
update check and update were performed.

10.1.2. Product Update


The product updates are different from the signature updates. Their function is to
deliver bug fixes and new features to the product.
There are two types of updates for the product:

Update 123
BitDefender Security for File Servers 3.5

product updates - these are cumulative .exe files that include all the files that
have been changed since the first release of a specific version.
version updates - these are installation packages (kits) with a new released version
of the product.

Whenever product updates are available or a newer version is released, you will see
information about the updates in this section.
By default, product updates and version updates are not automatically installed because
they may require a system reboot or stopping server traffic. It is recommended to
install the latest updates as soon as possible. To find out how to enable and configure
automatic product updates, please refer to Configuring Product Updates (p. 126).

Update 124
BitDefender Security for File Servers 3.5

10.2. Update Settings


To configure the update frequency and the update settings, click Update in the tree
menu and then the Settings tab.

Update Settings

10.2.1. Configuring Update Schedule


There are two ways to update BitDefender Security for File Servers on a regular basis:

Using the automatic update. The automatic update feature allows updating
BitDefender automatically, on a regular basis, without the administrator's intervention.
By default, BitDefender checks for updates at the specified update locations, every
hour. If new malware signatures or scanning engine updates are detected,
BitDefender will automatically download and install them.

Important
Keep automatic update enabled in order to be protected against the latest threats.

To change the frequency BitDefender checks for updates, follow these steps:
1. Type the number of hours between two consecutive checks for updates in the
Automatic update interval field.

Update 125
BitDefender Security for File Servers 3.5

2. Click Apply to save the changes.


To disable automatic update, follow these steps:
1. Clear the check box corresponding to Automatic update interval.
2. Click Apply to save the changes.
Using a scheduled update task. Scheduled update tasks allow automatically
updating the BitDefender malware signatures and scanning engines according to
a convenient schedule. Click Schedule Update to create a scheduled update task.
For more information, please refer to Update Tasks (p. 75).

Note
Scheduled update tasks will not de-activate automatic update so that the update
locations will be checked for new updates on a regular basis.

10.2.2. Configuring Product Updates


Installing product updates regularly is essential to the security of your server. Depending
on the level of interference with the server, there are three types of product updates:

product updates that do not require stopping server traffic or to reboot the server
product updates that require stopping server traffic, but do not require to reboot the
server
product updates that require to reboot the server

To configure automatic downloads and installation for each type of product update,
select one of the following options:

Download updates and install automatically


Select this option and BitDefender will automatically download and install product
updates. This is the recommended choice for product updates that do not require
stopping server traffic or a server reboot.
Download updates automatically and install... at...
Select this option if you want BitDefender to install available updates at certain
times. Select from the corresponding drop-down lists the date (day and time)
when you want this to happen.
This way you can configure BitDefender to perform product updates at times
when it is least likely for interferences to occur with server activity (during night
time, for example).
Download updates and let me decide when to install them
Select this option if you want BitDefender to automatically download product
updates, but let you decide when to install them. This is the recommended choice
for product updates that require stopping server traffic or a server reboot.

To disable automatic product updates, select the No automatic product updates


check box.

Update 126
BitDefender Security for File Servers 3.5

Note
Your server will be more vulnerable unless you install updates regularly.

Click Apply to save the changes.

Update 127
BitDefender Security for File Servers 3.5

10.3. Update Locations


To set the update locations, click Update in the tree menu and then the Locations
tab.

Update Locations

BitDefender can update from the local network, over the Internet, directly or through
a proxy server.
For more reliable and faster updates, you can configure two update locations: a First
update location and a Second update location. Both require the configuration of
the following options:

Update location - type the address of the update server. By default, the primary
update location is: upgrade.bitdefender.com.
If multiple BitDefender products are installed in your network, you can setup a local
server as the first update location for all the products and make
upgrade.bitdefender.com the second location, to be used in case the first
becomes unavailable. In this way you can reduce Internet traffic during updates.

Note
The local update location can be setup using BitDefender Update Server (included
in BitDefender Management Server), or published using a web server such as Apache
or IIS.

Update 128
BitDefender Security for File Servers 3.5

Allow unsigned updates - select this option to allow updates from a local server
to be installed.
Use proxy - select this option if the company uses a proxy server. The following
settings must be specified:
Server IP - type the IP of the proxy server.
Port - type the port BitDefender uses to connect to the proxy server.
User name - type a user name recognized by the proxy.
Password - type the valid password of the previously specified user.

Click Apply to save the changes.

10.4. Update Notifications


BitDefender can be configured to notify you about special events that occur during its
operation. To specify which update events should BitDefender notify you about, click
Update in the tree menu and then the Notifications tab.

Update Notifications

Select the update events you want to be informed about:

Update performed - when an update was performed.

Update 129
BitDefender Security for File Servers 3.5

No update available - when no update is available.


Update failed - when an error occurred during an update and the update failed.
Product update available - when a product update is available.

To configure BitDefender only to log the occurrence of an event, or also to alert you
about it through mail or netsend, go to Alerts & Logs, Alerts tab, and configure the
corresponding event. For more information, please refer to Configuring Event
Notification (p. 49).
Click Apply to save the changes.

10.5. Update Roll Back


If you have performed a product update since first installing BitDefender, you can
always revert to the previous product version using the Rollback feature. This feature
is very useful in case the product starts behaving unexpectedly.
To see if there is any rollback available, click Update in the tree menu and then the
Roll Back tab.

Update Rollback

If a rollback is available, the current product version and the version you can roll back
to will be displayed. Click Roll Back and confirm your choice by clicking Yes in the
confirmation window to perform the rollback action.

Update 130
BitDefender Security for File Servers 3.5

After a rollback is performed, the version currently in use and the previous version will
be displayed. You can use the provided link to update back to the newer version.

Update 131
BitDefender Security for File Servers 3.5

11. General
The General snap-in allows configuring BitDefender to send the BitDefender Lab
reports regarding the viruses found on the server and the incidents that occurred
during product operation.
This is where you can also set general settings for the BitDefender tray icon.

11.1. Report Virus


Real-time Virus Reporting (RTVR) allows sending reports about the viruses found on
your server to the BitDefender Lab in order to help us identify new viruses and find
quick remedies for them. Your contribution could be essential for developing new tools
to protect you and other users against virus threats.
The reports will not contain any personally identifiable data, such as your name, IP
address or others. The information supplied will contain only the name of the country,
the virus name, the number of infected files and the total number of scanned files.
The reports themselves are used only for statistic purposes and will never be used
as commercial data or disclosed to third parties.
To configure Real-time Virus Reporting, click General in the tree menu and then the
Report Virus tab.

Report Virus

General 132
BitDefender Security for File Servers 3.5

Real-time Virus Reporting is disabled by default. To activate it, follow these steps:

1. Select Enable real-time virus reports.


2. Click Apply to save the changes.

11.2. Report Incidents


BitDefender Security for File Servers contains an incident management module that
allows creating incident reports during product crashes. By agreeing to send the
incident reports to the BitDefender Lab, you agree to help us find quick fixes for our
bugs. You could make a major contribution to the development of a stable product
that satisfies your needs. The reports will only be used for debugging purposes. They
will never be used as commercial data or disclosed to third parties.
To configure the incident management module, click General in the tree menu and
then the Report Incidents tab.

Report Incidents

By default, the reports created automatically during product crashes are not sent to
the BitDefender Lab. To configure BitDefender to send incident reports to the
BitDefender Lab, follow these steps:

1. Select I agree to submit incident reports to the BitDefender Lab.

General 133
BitDefender Security for File Servers 3.5

2. Specify your e-mail address.


3. Click Apply to save the changes.

11.3. Tray Icon


To enable/disable the tray icon for different types of users, click General in the tree
menu and then the Tray Icon tab.

Tray Icon

You can enable or disable the tray icon for local users or users connected using
Remote Desktop by selecting or clearing the corresponding check boxes.
Click Apply to save the changes.

Note
The changes will take effect the next time a user logs in.

General 134
BitDefender Security for File Servers 3.5

Troubleshooting and Getting Help

135
BitDefender Security for File Servers 3.5

12. BitDefender Configuration Repair Tool


If you have problems with BitDefender Security for File Servers, you can use the
BitDefender Configuration Repair Tool to restore the last known good configuration.
The BitDefender Configuration Repair Tool backs the configuration file up every hour
so that you can restore it if needed. This tool can be successfully used to fix a corrupt
configuration file issue, which may occur in extreme situations such as a forced system
shutdown caused by a blackout.
To restore the last known good version of the configuration file, follow these steps:

1. Open the BitDefender Configuration Repair Tool using this path: Start Menu All
Programs BitDefender Security for Windows Servers BitDefender
Configuration Repair Tool.

BitDefender Configuration Repair Tool

2. Click Restore to begin restoring the backup copy of the configuration file.
3. Wait until the BitDefender Configuration Repair Tool completes the restoration
process.

BitDefender Configuration Repair Tool 136


BitDefender Security for File Servers 3.5

Repairing Configuration

The window displays the status of the restoration process. First, the BitDefender
Configuration Repair Tool stops the services belonging to the BitDefender Security
for Windows Servers products installed on the system (services belonging to
Microsoft applications may also be stopped; for example, Microsoft Exchange
Transport, if BitDefender Security for Exchange is installed). Then, the BitDefender
Configuration Repair Tool replaces the corrupt configuration file with the backup
file (an older working copy of the configuration file). Finally, the BitDefender
Configuration Repair Tool restarts the processes previously stopped.
4. The BitDefender Configuration Repair Tool informs you when the backup copy of
the configuration file has been successfully restored.

Finish

Click Exit to close the window.

BitDefender Configuration Repair Tool 137


BitDefender Security for File Servers 3.5

13. Support
BitDefender strives to provide its customers with an unparalleled level of fast and
accurate support. If you experience any issue with or if you have any question about
your BitDefender product, go to our online Support Center. It provides several resources
that you can use to quickly find a solution or an answer. Or, if you prefer, you can
contact the BitDefender Customer Care team. Our support representatives will answer
your questions in a timely manner and they will provide you with the assistance you
need.

Note
You can find out information about the support services we provide and our support
policy at the Support Center.

13.1. BitDefender Support Center


BitDefender Support Center, available at http://www.bitdefender.com/businesshelp,
is the place where you will find all the assistance you need with your BitDefender
product.
You can use several resources to quickly find a solution or an answer:

BitDefender Knowledge Base


BitDefender Support Forum
Video Tutorials
Product Documentation

You can also use your favorite search engine to find out more information about
computer security, the BitDefender products and the company.

13.1.1. BitDefender Knowledge Base


The BitDefender Knowledge Base is an online repository of information about the
BitDefender products. It stores, in an easily accessible format, reports on the results
of the ongoing technical support and bugfixing activities of the BitDefender support
and development teams, along with more general articles about virus prevention, the
management of BitDefender solutions with detailed explanations, and many other
articles.
The BitDefender Knowledge Base is open to the public and freely searchable. The
extensive information it contains is yet another means of providing BitDefender
customers with the technical knowledge and insight they need. All valid requests for
information or bug reports coming from BitDefender clients eventually find their way
into the BitDefender Knowledge Base, as bugfix reports, workaround cheatsheets or
informational articles to supplement product helpfiles.

Support 138
BitDefender Security for File Servers 3.5

The BitDefender Knowledge Base for business products is available any time at
http://www.bitdefender.com/businesshelp.

13.1.2. BitDefender Support Forum


The BitDefender Support Forum provides BitDefender users with an easy way to get
help and to help others. You can post any problem or question related to your
BitDefender product.
BitDefender support technicians monitor the forum for new posts in order to assist
you. You may also get an answer or a solution from a more experienced BitDefender
user.
Before posting your problem or question, please search the forum for a similar or
related topic.
The BitDefender Support Forum is available at http://forum.bitdefender.com, in 5
different languages: English, German, French, Spanish and Romanian. Click the
Business Protection link to access the section dedicated to business products.

13.1.3. Video Tutorials


The video tutorials will walk you step-by-step through configuring the product.
The main goal is to replace the need for specialized help using product video tutorials
that provide information specifically on how to use and configure BitDefender. For
instance, instead of calling the BitDefender support for guidance or trying to follow
complicated procedures, you can watch and follow the steps presented by the video
tutorials.
To view the Video Tutorials for business products, go to Support Center > Video
Tutorials.

13.1.4. Product Documentation


Product documentation is the most complete source of information about your product.
You can check and download the latest version of documentation for BitDefender
business products at Support Center > Documentation.

13.2. Asking for Assistance


You can contact us for assistance through our online Support Center:

1. Go to http://www.bitdefender.com/businesshelp.
2. Search the Knowledge Base for articles that may provide a solution to your problem.
3. Read the relevant articles or documents and try the proposed solutions.
4. If you have not found a solution, click Contact Us in the the left-side menu.

Support 139
BitDefender Security for File Servers 3.5

5. Use the contact form to open an e-mail support ticket or access other available
contact options.

For detailed contact information, please refer to Contact Information (p. 143).

13.3. BitDefender Support Tool


The BitDefender Support Tool creates a zip archive of files required by our support
technicians to troubleshoot BitDefender Security for File Servers.
To use the Support Tool, follow these steps:

1. Open the BitDefender Support Tool by following the path: Start Menu All
Programs BitDefender Security for Windows Servers BitDefender Support
Tool.

BitDefender Support Tool

2. Select the agreement check box and click Next.

Support 140
BitDefender Security for File Servers 3.5

Submission Details

3. Complete the submission form with the necessary data:


a. Enter your e-mail address.
b. Enter your name.
c. Choose from the corresponding menu the type of issue you have encountered.
d. Choose your country from the corresponding menu.
e. Enter a description of the issue you encountered.
4. Click Next. The Support Tool gathers product information, information related to
other applications installed on the machine and the software and hardware
configuration.
5. Wait for the process to complete.

Support 141
BitDefender Security for File Servers 3.5

Finish

A zip archive has been created on your desktop. Click Finish to close the window.
You can send the zip archive together with your request for support in order to
reduce the time needed to resolve the query.

Support 142
BitDefender Security for File Servers 3.5

14. Contact Information


Efficient communication is the key to a successful business. During the past 10 years
BITDEFENDER has established an unquestionable reputation by constantly striving
for better communication so as to exceed the expectations of our clients and partners.
Should you have any questions, do not hesitate to contact us.

14.1. Web Addresses


Sales Department: sales@bitdefender.com
Support Center: http://www.bitdefender.com/businesshelp
Documentation: documentation@bitdefender.com
Local Distributors: http://www.bitdefender.com/partners
Partner Program: partners@bitdefender.com
Media Relations: pr@bitdefender.com
Job Opportunities: jobs@bitdefender.com
Virus Submissions: virus_submission@bitdefender.com
Spam Submissions: spam_submission@bitdefender.com
Report Abuse: abuse@bitdefender.com
Web site: http://www.bitdefender.com

14.2. Local Distributors


The BitDefender local distributors are ready to respond to any inquiries regarding their
areas of operation, both in commercial and in general matters.
To find a BitDefender distributor in your country:

1. Go to http://www.bitdefender.com/site/Partnership/list.
2. The contact information of the BitDefender local distributors should be displayed
automatically. If this does not happen, select the country you reside in to view the
information.
3. If you do not find a BitDefender distributor in your country, feel free to contact us
by e-mail at sales@bitdefender.com. Please write your e-mail in English in order
for us to be able to assist you promptly.

14.3. BitDefender Offices


The BitDefender offices are ready to respond to any inquiries regarding their areas of
operation, both in commercial and in general matters. Their respective addresses and
contacts are listed below.

14.3.1. United States


BitDefender, LLC

Contact Information 143


BitDefender Security for File Servers 3.5

PO Box 667588
Pompano Beach, Fl 33066
United States
Phone (sales&technical support): 1-954-776-6262
Sales: sales@bitdefender.com
Web: http://www.bitdefender.com
Support Center: http://www.bitdefender.com/businesshelp

14.3.2. UK and Ireland


Genesis Centre Innovation Way
Stoke-on-Trent, Staffordshire
ST6 4BF
Phone (sales&technical support): +44 (0) 8451-305096
E-mail: info@bitdefender.co.uk
Sales: sales@bitdefender.co.uk
Website: http://www.bitdefender.co.uk
Support Center: http://www.bitdefender.co.uk/businesshelp

14.3.3. Spain
BitDefender Espaa, S.L.U.
Avda. Diagonal, 357, 1 1
08037 Barcelona
Espaa
Fax: (+34) 93 217 91 28
Phone (office&sales): (+34) 93 218 96 15
Phone (technical support): (+34) 93 502 69 10
Sales: comercial@bitdefender.es
Website: http://www.bitdefender.es
Support Center: http://www.bitdefender.es/businesshelp

14.3.4. Germany
BitDefender GmbH
Airport Office Center
Robert-Bosch-Strae 2
59439 Holzwickede
Deutschland
Phone (office&sales): +49 (0)2301 91 84 222
Phone (technical support): +49 (0)2301 91 84 444
Sales: vertrieb@bitdefender.de
Website: http://www.bitdefender.de
Support Center: http://www.bitdefender.de/businesshelp

Contact Information 144


BitDefender Security for File Servers 3.5

14.3.5. Romania
BITDEFENDER SRL
West Gate Park, Building H2, 24 Preciziei Street
Bucharest, Sector 6
Fax: +40 21 2641799
Phone (sales&technical support): +40 21 2063470
Sales: sales@bitdefender.ro
Website: http://www.bitdefender.ro
Support Center: http://www.bitdefender.ro/businesshelp

Contact Information 145


BitDefender Security for File Servers 3.5

Glossary
ActiveX
ActiveX is a model for writing programs so that other programs and the operating
system can call them. ActiveX technology is used with Microsoft Internet Explorer
to make interactive Web pages that look and behave like computer programs,
rather than static pages. With ActiveX, users can ask or answer questions, use
push buttons, and interact in other ways with the Web page. ActiveX controls are
often written using Visual Basic.
Active X is notable for a complete lack of security controls; computer security
experts discourage its use over the Internet.

Adware
Adware is often combined with a host application that is provided at no charge
as long as the user agrees to accept the adware. Because adware applications
are usually installed after the user has agreed to a licensing agreement that states
the purpose of the application, no offense is committed.
However, pop-up advertisements can become an annoyance, and in some cases
degrade system performance. Also, the information that some of these applications
collect may cause privacy concerns for users who were not fully aware of the
terms in the license agreement.

Archive
A disk, tape, or directory that contains files that have been backed up.
A file that contains one or more files in a compressed format.

Backdoor
A hole in the security of a system deliberately left in place by designers or
maintainers. The motivation for such holes is not always sinister; some operating
systems, for example, come out of the box with privileged accounts intended for
use by field service technicians or the vendor's maintenance programmers.

Boot sector
A sector at the beginning of each disk that identifies the disk's architecture (sector
size, cluster size, and so on). For startup disks, the boot sector also contains a
program that loads the operating system.

Boot virus
A virus that infects the boot sector of a fixed or floppy disk. An attempt to boot
from a diskette infected with a boot sector virus will cause the virus to become
active in memory. Every time you boot your system from that point on, you will
have the virus active in memory.

Glossary 146
BitDefender Security for File Servers 3.5

Browser
Short for Web browser, a software application used to locate and display Web
pages. The two most popular browsers are Netscape Navigator and Microsoft
Internet Explorer. Both of these are graphical browsers, which means that they
can display graphics as well as text. In addition, most modern browsers can
present multimedia information, including sound and video, though they require
plug-ins for some formats.

Command line
In a command line interface, the user types commands in the space provided
directly on the screen using command language.

Cookie
Within the Internet industry, cookies are described as small files containing
information about individual computers that can be analyzed and used by
advertisers to track your online interests and tastes. In this realm, cookie
technology is still being developed and the intention is to target ads directly to
what you've said your interests are. It's a double-edge sword for many people
because on one hand, it's efficient and pertinent as you only see ads about what
you're interested in. On the other hand, it involves actually "tracking" and
"following" where you go and what you click. Understandably so, there is a debate
over privacy and many people feel offended by the notion that they are viewed
as a "SKU number" (you know, the bar code on the back of packages that gets
scanned at the grocery check-out line). While this viewpoint may be extreme, in
some cases it is accurate.

Disk drive
It's a machine that reads data from and writes data onto a disk.
A hard disk drive reads and writes hard disks.
A floppy drive accesses floppy disks.
Disk drives can be either internal (housed within a computer) or external (housed
in a separate box that connects to the computer).

Download
To copy data (usually an entire file) from a main source to a peripheral device.
The term is often used to describe the process of copying a file from an online
service to one's own computer. Downloading can also refer to copying a file from
a network file server to a computer on the network.

E-mail
Electronic mail. A service that sends messages on computers via local or global
networks.

Glossary 147
BitDefender Security for File Servers 3.5

Events
An action or occurrence detected by a program. Events can be user actions, such
as clicking a mouse button or pressing a key, or system occurrences, such as
running out of memory.

False positive
Occurs when a scanner identifies a file as infected when in fact it is not.

Filename extension
The portion of a filename, following the final point, which indicates the kind of
data stored in the file.
Many operating systems use filename extensions, e.g. Unix, VMS, and MS-DOS.
They are usually from one to three letters (some sad old OSes support no more
than three). Examples include "c" for C source code, "ps" for PostScript, "txt" for
arbitrary text.

Heuristic
A rule-based method of identifying new viruses. This method of scanning does
not rely on specific virus signatures. The advantage of the heuristic scan is that
it is not fooled by a new variant of an existing virus. However, it might occasionally
report suspicious code in normal programs, generating the so-called "false
positive".

IP
Internet Protocol - A routable protocol in the TCP/IP protocol suite that is
responsible for IP addressing, routing, and the fragmentation and reassembly of
IP packets.

Java applet
A Java program which is designed to run only on a web page. To use an applet
on a web page, you would specify the name of the applet and the size (length
and width, in pixels) that the applet can utilize. When the web page is accessed,
the browser downloads the applet from a server and runs it on the user's machine
(the client). Applets differ from applications in that they are governed by a strict
security protocol.
For example, even though applets run on the client, they cannot read or write
data onto the client's machine. Additionally, applets are further restricted so that
they can only read and write data from the same domain that they are served
from.

Macro virus
A type of computer virus that is encoded as a macro embedded in a document.
Many applications, such as Microsoft Word and Excel, support powerful macro
languages.
These applications allow you to embed a macro in a document, and have the
macro execute each time the document is opened.

Glossary 148
BitDefender Security for File Servers 3.5

Mail client
An e-mail client is an application that enables you to send and receive e-mail.

Memory
Internal storage areas in the computer. The term memory identifies data storage
that comes in the form of chips, and the word storage is used for memory that
exists on tapes or disks. Every computer comes with a certain amount of physical
memory, usually referred to as main memory or RAM.

Non-heuristic
This method of scanning relies on specific virus signatures. The advantage of the
non-heuristic scan is that it is not fooled by what might seem to be a virus, and
does not generate false alarms.

Packed programs
A file in a compression format. Many operating systems and applications contain
commands that enable you to pack a file so that it takes up less memory. For
example, suppose you have a text file containing ten consecutive space
characters. Normally, this would require ten bytes of storage.
However, a program that packs files would replace the space characters by a
special space-series character followed by the number of spaces being replaced.
In this case, the ten spaces would require only two bytes. This is just one packing
technique - there are many more.

Path
The exact directions to a file on a computer. These directions are usually described
by means of the hierarchical filing system from the top down.
The route between any two points, such as the communications channel between
two computers.

Phishing
The act of sending an e-mail to a user falsely claiming to be an established
legitimate enterprise in an attempt to scam the user into surrendering private
information that will be used for identity theft. The e-mail directs the user to visit
a Web site where they are asked to update personal information, such as
passwords and credit card, social security, and bank account numbers, that the
legitimate organization already has. The Web site, however, is bogus and set up
only to steal the users information.

Polymorphic virus
A virus that changes its form with each file it infects. Since they have no consistent
binary pattern, such viruses are hard to identify.

Port
An interface on a computer to which you can connect a device. Personal
computers have various types of ports. Internally, there are several ports for
connecting disk drives, display screens, and keyboards. Externally, personal

Glossary 149
BitDefender Security for File Servers 3.5

computers have ports for connecting modems, printers, mice, and other peripheral
devices.
In TCP/IP and UDP networks, an endpoint to a logical connection. The port number
identifies what type of port it is. For example, port 80 is used for HTTP traffic.

Report file
A file that lists actions that have occurred. BitDefender maintains a report file
listing the path scanned, the folders, the number of archives and files scanned,
how many infected and suspicious files were found.

Rootkit
A rootkit is a set of software tools which offer administrator-level access to a
system. The term was first used for the UNIX operating systems and it referred
to recompiled tools which provided intruders administrative rights, allowing them
to conceal their presence so as not to be seen by the system administrators.
The main role of rootkits is to hide processes, files, logins and logs. They may
also intercept data from terminals, network connections or peripherals, if they
incorporate the appropriate software.
Rootkits are not malicious in nature. For example, systems and even some
applications hide critical files using rootkits. However, they are mostly used to
hide malware or to conceal the presence of an intruder into the system. When
combined with malware, rootkits pose a great threat to the integrity and the security
of a system. They can monitor traffic, create backdoors into the system, alter files
and logs and avoid detection.

Script
Another term for macro or batch file, a script is a list of commands that can be
executed without user interaction.

Spam
Electronic junk mail or junk newsgroup postings. Generally known as any
unsolicited e-mail.

Spyware
Any software that covertly gathers user information through the user's Internet
connection without his or her knowledge, usually for advertising purposes. Spyware
applications are typically bundled as a hidden component of freeware or shareware
programs that can be downloaded from the Internet; however, it should be noted
that the majority of shareware and freeware applications do not come with
spyware. Once installed, the spyware monitors user activity on the Internet and
transmits that information in the background to someone else. Spyware can also
gather information about e-mail addresses and even passwords and credit card
numbers.
Spyware's similarity to a Trojan horse is the fact that users unwittingly install the
product when they install something else. A common way to become a victim of

Glossary 150
BitDefender Security for File Servers 3.5

spyware is to download certain peer-to-peer file swapping products that are


available today.
Aside from the questions of ethics and privacy, spyware steals from the user by
using the computer's memory resources and also by eating bandwidth as it sends
information back to the spyware's home base via the user's Internet connection.
Because spyware is using memory and system resources, the applications running
in the background can lead to system crashes or general system instability.

Startup items
Any files placed in this folder will open when the computer starts. For example,
a startup screen, a sound file to be played when the computer first starts, a
reminder calendar, or application programs can be startup items. Normally, an
alias of a file is placed in this folder rather than the file itself.

System tray
Introduced with Windows 95, the system tray is located in the Windows taskbar
(usually at the bottom next to the clock) and contains miniature icons for easy
access to system functions such as fax, printer, modem, volume, and more.
Double click or right click an icon to view and access the details and controls.

TCP/IP
Transmission Control Protocol/Internet Protocol - A set of networking protocols
widely used on the Internet that provides communications across interconnected
networks of computers with diverse hardware architectures and various operating
systems. TCP/IP includes standards for how computers communicate and
conventions for connecting networks and routing traffic.

Trojan
A destructive program that masquerades as a benign application. Unlike viruses,
Trojan horses do not replicate themselves but they can be just as destructive.
One of the most insidious types of Trojan horse is a program that claims to rid
your computer of viruses but instead introduces viruses onto your computer.
The term comes from a story in Homer's Iliad, in which the Greeks give a giant
wooden horse to their foes, the Trojans, ostensibly as a peace offering. But after
the Trojans drag the horse inside their city walls, Greek soldiers sneak out of the
horse's hollow belly and open the city gates, allowing their compatriots to pour in
and capture Troy.

Update
A new version of a software or hardware product designed to replace an older
version of the same product. In addition, the installation routines for updates often
check to make sure that an older version is already installed on your computer;
if not, you cannot install the update.
BitDefender has it's own update module that allows you to manually check for
updates, or let it automatically update the product.

Glossary 151
BitDefender Security for File Servers 3.5

Virus
A program or piece of code that is loaded onto your computer without your
knowledge and runs against your will. Most viruses can also replicate themselves.
All computer viruses are manmade. A simple virus that can copy itself over and
over again is relatively easy to produce. Even such a simple virus is dangerous
because it will quickly use all available memory and bring the system to a halt.
An even more dangerous type of virus is one capable of transmitting itself across
networks and bypassing security systems.

Virus definition
The binary pattern of a virus, used by the antivirus program to detect and eliminate
the virus.

Worm
A program that propagates itself over a network, reproducing itself as it goes. It
cannot attach itself to other programs.

Glossary 152

Vous aimerez peut-être aussi