Académique Documents
Professionnel Documents
Culture Documents
Legal Notice
All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means, electronic or
mechanical, including photocopying, recording, or by any information storage and retrieval system, without written
permission from an authorized representative of . The inclusion of brief quotations in reviews may be possible only
with the mention of the quoted source. The content can not be modified in any way.
Warning and Disclaimer. This product and its documentation are protected by copyright. The information in this
document is provided on an as is basis, without warranty. Although every precaution has been taken in the preparation
of this document, the authors will not have any liability to any person or entity with respect to any loss or damage
caused or alleged to be caused directly or indirectly by the information contained in this work.
This book contains links to third-party Websites that are not under the control of , therefore is not responsible for the
content of any linked site. If you access a third-party website listed in this document, you will do so at your own risk.
provides these links only as a convenience, and the inclusion of the link does not imply that endorses or accepts any
responsibility for the content of the third-party site.
Trademarks. Trademark names may appear in this book. All registered and unregistered trademarks in this document
are the sole property of their respective owners, and are respectfully acknowledged.
BitDefender Security for File Servers 3.5
Table of Contents
Preface ..................................................................... vii
1. Conventions Used in This Book . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vii
1.1. Typographical Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vii
1.2. Admonitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vii
2. The Book Structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . viii
3. Request for Comments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . viii
Description ....................................................... 1
1. Features and Benefits ................................................ 2
1.1. Key Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.2. Key Benefits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.3. Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.4. BitDefender Advanced Technologies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
2. Functional Diagram for End-Users .................................. 4
Installation ........................................................ 6
3. Before You Install ..................................................... 7
3.1. System Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
4. Installing BitDefender Security for File Servers ................... 8
4.1. Step 1/8 - Welcome . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
4.2. Step 2/8 - End User License Agreement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
4.3. Step 3/8 - Scan Before Install . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
4.4. Step 4/8 - Select Products to Install . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
4.5. Step 5/8 - Configure Product Update Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
4.6. Step 6/8 - Incident Reporting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
4.7. Step 7/8 - Begin Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
4.8. Step 8/8 - Installation Completed . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
5. Modifying, Repairing or Removing BitDefender ................. 14
5.1. Repair BitDefender . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
5.2. Remove BitDefender . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
iv
BitDefender Security for File Servers 3.5
8. Monitoring ............................................................ 28
8.1. Dashboard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
8.1.1. Important Links . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
8.1.2. Status Area . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
8.1.3. Scan Activity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
8.1.4. Product Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
8.2. Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
8.2.1. Clearing Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
8.3. Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
8.3.1. Managing Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
8.3.2. Creating Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
8.4. Alerts & Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
8.4.1. Alerts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
8.4.2. Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
8.5. Quarantine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
8.5.1. Managing Quarantine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
8.6. Scheduled Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
8.6.1. Managing Scheduled Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
8.6.2. On-demand Scanning Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
8.6.3. Update Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
8.6.4. Report Generation Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
9. Server Scan .......................................................... 89
9.1. Real-time Protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90
9.1.1. Setting Protection Level . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90
9.1.2. Configuring Protection Level . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
9.1.3. Configuring Number of Scanning Instances . . . . . . . . . . . . . . . . . . . . . . . . . . 100
9.2. On-demand Scanning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101
9.2.1. Scanning Files and Folders . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
9.2.2. Configuring On-Demand Scanning Settings . . . . . . . . . . . . . . . . . . . . . . . . . 109
9.3. Scanning Exceptions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117
9.3.1. Global Exceptions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117
9.3.2. Process Exclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
9.3.3. Items to Be Excluded Manually . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120
9.4. Testing Antivirus Protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121
10. Update ............................................................. 122
10.1. Update . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
10.1.1. Update Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
10.1.2. Product Update . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
10.2. Update Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125
10.2.1. Configuring Update Schedule . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125
10.2.2. Configuring Product Updates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126
10.3. Update Locations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128
10.4. Update Notifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129
10.5. Update Roll Back . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130
11. General ............................................................ 132
11.1. Report Virus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132
11.2. Report Incidents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133
11.3. Tray Icon . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134
v
BitDefender Security for File Servers 3.5
vi
BitDefender Security for File Servers 3.5
Preface
This guide is intended to all companies which have chosen BitDefender Security for
File Servers as a security solution for their file servers. The information presented in
this book is suitable not only for computer literates, it is accessible to everyone who
is able to work under Windows.
This book will describe for you BitDefender Security for File Servers, the Company
and the team who built it, will guide you through the installation process, will teach
you how to configure it. You will find out how to use BitDefender Security for File
Servers, how to update, test and customize it. You will learn how to get best from
BitDefender.
We wish you a pleasant and useful lecture.
Appearance Description
sample syntax Syntax samples are printed with monospaced
characters.
http://www.bitdefender.com The URL links is pointing to some external location, on
http or ftp servers.
sales@bitdefender.com E-mail messages are inserted in the text for contact
information.
Preface (p. vii) This is an internal link, towards some location inside the
document.
filename File and directories are printed using monospaced font.
option All the product options are printed using strong
characters.
The code listing is printed with monospaced characters.
sample code listing
1.2. Admonitions
The admonitions are in-text notes, graphically marked, bringing to your attention
additional information related to the current paragraph.
Preface vii
BitDefender Security for File Servers 3.5
Note
The note is just a short observation. Although you can omit it, the notes can provide
valuable information, such as specific feature or a link to some related topic.
Important
This requires your attention and is not recommended to skip over it. Usually, it provides
non-critical but significant information.
Warning
This is critical information you should treat with increased caution. Nothing bad will
happen if you follow the indications. You should read and understand it, because it
describes something extremely risky.
Important
Please write all of your documentation-related e-mails in English so that we can process
them efficiently.
Preface viii
BitDefender Security for File Servers 3.5
Description
1
BitDefender Security for File Servers 3.5
Offers customizable alerts for several event types: antivirus signature updates,
product updates, on-demand scans and viruses detected
Centralized Management Support
BitDefender Management Server allows centrally managing most of the BitDefender
business solutions installed on network computers, including BitDefender Security
for File Servers. This type of integration allows you to use the Management Server
console to get centralized access to:
Configuration settings for BitDefender Security for File Servers
Critical event information such as update-related events, configuration warnings,
license expiration
Easy-to-interpret statistics and reports based on the information received from
BitDefender Security for File Servers
1.3. Services
Advanced Update System
For permanent file protection, the solution receives the latest updates and patches
based on three configurable technologies: on-demand, scheduled and automatic.
Upgrades
Registered users benefit from free upgrades to any new version of the product
during the license period. Special price offers are also available to returning
customers.
Free 24/7 Professional Technical Support
Certified representatives provide BitDefender business customers with free
permanent support online, by telephone or e-mail. This is supplemented by an online
database with answers to Frequently Asked Questions and fixes for common issues.
Functional Diagram
To better serve its function as a security solution meant for servers, BitDefender
Security for File Servers is based on a modular architecture. These are its main
modules:
On-access Scanner
On-demand Scanner
Update
Scheduler
Antivirus Engines
Real-time Protection. As the files are being written on the disk or accessed, the
On-access Scanner module intercepts the event and starts the scanning process.
The scanning process comprises the following steps:
1. The file extension, the file size, the file path are sequentially checked to match the
administrator configurations. The result of the filtering process is SCAN or NO
SCAN.
2. If the result is SCAN, the file is scanned by the Antivirus Engines. First the file is
checked against the antivirus signatures database. If any part of the file matches
a signature, the file is reported as infected. If none of the signatures is matched,
the file is checked with the B-HAVE technology. In case the behavior of the file is
similar to the behavior of a piece of malware, it is reported as infected. The result
of the Antivirus engines module can be INFECTED or CLEAN.
3. If the file having passed through the Antivirus Engines module is INFECTED, one
of the following actions can be taken: disinfect, delete, move to quarantine. If these
actions fail, the Deny access action is applied so that the user will not be able to
execute the infected code.
Antivirus signatures - These files are updated constantly as the BitDefender Lab
analyzes new viruses every day.
Antivirus engines - These files are updated as frequently as the antivirus signatures
B-HAVE, a BitDefender proprietary technology, has been implemented in the antivirus
engines.
Product files - The product file updates differ from the antivirus signature updates
and their function is to deliver bug fixes and performance improvements brought to
the product. Product updates are downloaded, but they are not automatically
installed. Please note that the installation of product updates might require a system
restart.
Note
The update process is performed automatically every hour. The interval can be modified
and the update tasks be scheduled at any time.
Installation
6
BitDefender Security for File Servers 3.5
Hardware Requirements
64-bit:
32-bit:
32-bit - use this version if you want to install BitDefender Security for File Servers
on a 32-bit computer.
64-bit - use this version if you want to install BitDefender Security for File Servers
on a 64-bit computer.
Znajd plik setup, a nastpnie kliknij go dwukrotnie. A wizard will appear and you must
follow its steps to complete installation.
Before launching the setup wizard, BitDefender will check for newer versions of the
installation package. If a newer version is available, you will be prompted to download
it. Click Yes to download the newer version or No to continue installing the version
then available in the setup file.
Follow these steps to install BitDefender Security for File Servers:
Welcome
Please read the License Agreement, select I accept the terms in the License
Agreement and click Next.
Note
If you do not agree to these terms click Cancel. The installation process will be
abandoned and you will exit setup.
BitDefender can scan critical areas on your system before the installation to ensure
the server is free of infections.
The scan takes a few minutes. Click Scan Now to start the scan or click Skip Scan
to install without scanning.
Important
It is highly recommended to perform the scan. Active malware could disrupt the
installation and even cause it to fail. If a threat is detected, a reboot may be required in
order to remove it.
Select BitDefender Security for File Servers, click the corresponding arrow and then
click Will be installed on local hard drive on the shortcut menu.
The default installation folder is displayed on the lower part of the window. To select
a different installation folder, click Browse, locate the folder and then click OK to set
the location.
Click Next.
Installing product updates regularly is essential to the security of your server. Depending
on the level of interference with the server, there are three types of product updates:
product updates that do not require stopping server traffic or to reboot the server
product updates that require stopping server traffic, but do not require to reboot the
server
product updates that require to reboot the server
To configure automatic downloads and installation for each type of product update,
select one of the following options:
Automatically Install
Select this option and BitDefender will automatically download and install product
updates. This is the recommended choice for product updates that do not require
stopping server traffic or a server reboot.
Install at a time I specify
Select this option if you want BitDefender to install available updates at certain
times. Select from the corresponding drop-down lists the date (day and time)
when you want this to happen.
This way you can configure BitDefender to perform product updates at times
when it is least likely for interferences to occur with server activity (during night
time, for example).
Let me decide when to install
Select this option if you want BitDefender to automatically download product
updates, but let you decide when to install them. This is the recommended choice
for product updates that require stopping server traffic or a server reboot.
Incident Reporting
BitDefender Security for File Servers contains an incident management module that
allows creating incident reports during product crashes. By agreeing to send the
incident reports to the BitDefender Lab, you agree to help us find quick fixes for our
bugs. You could make a major contribution to the development of a stable product
that satisfies your needs. The reports will only be used for debugging purposes. They
will never be used as commercial data or disclosed to third parties.
To send incident reports to the BitDefender Lab, select I agree to submit incident
reports to the BitDefender Lab and specify your e-mail address.
Click Next.
Begin Installation
Installation Completed
Click Finish to close the installer. You may be asked to restart the system so that the
setup wizard can complete the installation process.
Important
Before repairing the product, we recommend you to export the product settings so that
you can reload them after the repairing process is completed. For more information,
please refer to Exporting/Importing Product Settings (p. 20).
If you choose Repair, a new window will appear. Click Repair to start the process.
Important
During the repair process all BitDefender products installed on the computer will
temporarily cease to function.
Note
We recommend that you choose Remove for a clean re-installation.
If you choose to remove BitDefender, a new window will appear. To keep the objects
in the quarantine, make sure the corresponding check box is not selected. Click
Remove to start unsinstalling BitDefender from your computer.
16
BitDefender Security for File Servers 3.5
6. Getting Started
BitDefender Security for File Servers can be configured and managed through a
centralized, MMC-based management console. The management console provides
access to all features and settings of BitDefender Security for File Servers.
To open the management console, use the Windows Start menu, by following the
path: Start All Programs BitDefender Security for Windows Servers
BitDefender Security for File Servers or quicker, double click the BitDefender icon
from the system tray.
Management Console
On the left side of the management console you can see the tree menu:
Monitoring - displays the dashboard. The dashboard provides you with useful
information on the status of BitDefender Security for File Servers and helps you
easily solve the issues that require your attention.
Statistics - offers statistic information on the product activity.
Reports - allows creating customized reports on the product activity.
Alerts & Logs - allows configuring the logging options and sending alerts about
the events that occur during product operation, such as an update error or an
infected file detected.
Getting Started 17
BitDefender Security for File Servers 3.5
Quarantine - shows the quarantined files. These files were found to be infected
or suspect and were moved to the quarantine folder, according to the specified
action.
Scheduled Tasks - allows creating scheduled tasks through an intuitive wizard.
You can schedule updates, on-demand scanning processes and reports to be
generated.
Server Scan - allows configuring BitDefender to scan the file server.
Update - allows updating BitDefender and configuring update settings.
General - allows configuring BitDefender to send the BitDefender Lab reports
regarding the viruses found on the server and the incidents that occurred during
product operation.
If you want to open the help file, click Help -> About BitDefender Security for File
Servers. Contextual help is available for each window. Click ? to open it.
System Tray
Contextual Menu
You can double-click this icon to open the management console Also, by right-clicking
the icon, a contextual menu will allow you to quickly manage BitDefender.
Getting Started 18
BitDefender Security for File Servers 3.5
Note
The icon turns into gray in 3 situations:
In this way, you will know if BitDefender is not working without opening the management
console.
To enable/disable the tray icon for different categories of users, open the management
console, go to the General section and select the Tray Icon tab.
Important
To remotely manage a BitDefender Security for File Servers product, you must first set
an administrative password to the respective product. Please note that when connecting
remotely to BitDefender Security for File Servers, you will not have access to all the
product features. However, you will be able to perform an update by user request and
to enable/disable real-time protection.
3. In the Connect to computer field, type the IP address or the name of the remote
computer.
4. In the Password field, type the administrative password of the respective product.
5. Click OK
Getting Started 19
BitDefender Security for File Servers 3.5
3. In the Old password field, type the current administrative password, if any.
4. In the Password field, type the desired administrative password.
5. In the Confirm password field, type the password again.
6. Click OK.
Getting Started 20
BitDefender Security for File Servers 3.5
Import Tool
3. Select the folder where to save the product settings and click OK.
Import Tool
Getting Started 21
BitDefender Security for File Servers 3.5
Import Tool
4. Select the folder where the product settings were saved and click OK to import
them.
Note
Please note that BitDefender does not protect the file server while importing product
settings. Therefore, it is recommended that you remove the file server from the
network before initiating this process.
Importing Settings
The Import Tool first the BitDefender Security for File Servers services. Then, it
imports the product settings from the selected folder. Finally, the Import Tool restarts
the processes previously stopped.
6. The Import Tool informs you when the settings have been successfully imported.
Getting Started 22
BitDefender Security for File Servers 3.5
Finish
Getting Started 23
BitDefender Security for File Servers 3.5
Click Register to register BitDefender Security for File Servers, change the license
key, create or sign in to your account or see how many days are left until the licensing
period expires.
Click My account if you only want to register or sign in to a BitDefender account.
Note
If BitDefender Security for File Servers is under the management of BitDefender
Management Server, the product and account registration are performed from the
management console of BitDefender Management Server.
Registration
If you do not have a BitDefender license, click the provided link to go to the BitDefender
online store and purchase a license key.
To register BitDefender Security for File Servers, select Register the product, type
the license key in the Enter key field and click the Register button.
If the trial period has not expired and you want to continue evaluating the product,
select Continue evaluating the product. You can see the current license key and
when it expires.
Click Next to continue.
Note
If the provided license key is not valid, you will be prompted to provide another license
key.
Account Registratiion
Note
If you want to create an account later, select the corresponding option.
Note
Use the provided e-mail address and password to log in to your account at
http://myaccount.bitdefender.com.
Note
If you provide an incorrect password, you will be prompted to re-type it when you click
Next. Click Ok to enter the password again or Cancel to exit the wizard.
If you have forgotten your password, click Forgot your password? and follow the
instructions.
Click Next to continue.
Finish
Note
To log in to your BitDefender account, click My account.
8. Monitoring
The Monitoring snap-in provides you with all the necessary means to monitor and
control the product activity.
If you click Monitoring in the tree menu, the dashboard is displayed. The dashboard
provides you with useful information on the status of BitDefender Security for File
Servers and helps you easily solve the issues that require your attention.
In the tree menu, grouped under the Monitoring snap-in, you can access the following
sections:
Monitoring 28
BitDefender Security for File Servers 3.5
8.1. Dashboard
Click Monitoring in the tree menu to see the dashboard.
Dashboard
The dashboard provides you with useful information on the status of BitDefender
Security for File Servers and helps you easily solve the issues that require your
attention. You should check the dashboard frequently in order to quickly identify and
solve the issues affecting the security of the file server.
Monitoring 29
BitDefender Security for File Servers 3.5
Link Description
Buy Opens a web page where you can buy the product from.
My Account Opens your BitDefender account web page.
Register Opens the registration wizard.
Support Opens the BitDefender support web page.
Help Opens the help file.
About Opens a window where you can see details about the product.
Server scan
Update status
License status
Note
The License Status button and the related issues are not available if BitDefender Security
for File Servers is managed by BitDefender Management Server.
To the left of the status buttons you can see the number of issues affecting the security
of the file server, if any.
The status buttons can be displayed in green, orange or red, depending on the existing
issues that affect the security of the file server:
Monitoring 30
BitDefender Security for File Servers 3.5
The Issue details section contains three tables, one for each status button. Each
table displays the monitored items and their current status. When there is an issue
concerning one of the monitored items, a red Fix link is displayed. To quickly solve
the existing issues, click the Fix links, one by one, or the Fix all issues button.
Important
For every monitored item, there is a check box selected by default in the Monitor
column. If you do not want a specific item to be monitored, just clear the corresponding
check box.
Server Scan
If the Server Scan button is orange or red, there are issues affecting the scanning
activity of BitDefender Security for File Servers.
Click the button to see the respective issues. A table named Server scan will be
displayed and you will be able to see the monitored items and their current status.
Real-time protection. The issues that can be reported are listed in the following
table:
Status Description
Scan files is off Critical issue. Real-time protection is disabled and the file
server is not protected against malware.
Click Fix to enable real-time protection.
Registration has Critical issue. The licensing period has expired.
expired Click Fix to open the registration wizard and register
BitDefender Security for File Servers with a new license
key.
Update Status
If the Update Status button is orange or red, there are update issues affecting
BitDefender Security for File Servers.
Click the button to see the respective issues. A table named Update Status will be
displayed and you will be able to see the monitored items and their current status.
Last signature update. The issues that can be reported are listed in the following
table:
Status Description
At least one update location Critical issue. Contacting one or both update
failed locations was not possible during the last update
process.
Monitoring 31
BitDefender Security for File Servers 3.5
Status Description
Click Fix to initiate a new update.
No update was performed Critical issue.
Click Fix to initiate a new update. The status
will change to Downloading.
Update failed because the Critical issue.
updates on your server are not You need to go to Update > Locations and
signed, and you chose not to select the Allow unsigned updates check box
allow unsigned updates for your server.
Last product update. The issues that can be reported are listed in the following
table:
Status Description
Product update Critical issue. Automatic product updates are disabled,
disabled making you server more vulnerable to security threats.
Click Fix to enable automatic product updates.
Product update Critical issue. A new product update has been downloaded
downloaded, please and it is not installed on your system.
install it Clicking Fix will install the update. If the update requires
stopping traffic or rebooting the server, you will have to
confirm your choice by clicking OK.
To be able to schedule the installation of available product
updates that require stopping traffic or rebooting the
server, click the Fix all issues button instead.
A new kit is available Critical issue. The new kit may come with new features
and it is not installed and functionalities.
on your system Click Fix to install the kit. You will have to confirm your
choice by clicking OK. Please note that installing the kit
might require a server restart.
Signature update older than one day. The issues that can be reported are listed
in the following table:
Status Description
Updates are old Critical issue. More than one day passed since the last update.
Click Fix to initiate a new update. The status will change to
Downloading.
Monitoring 32
BitDefender Security for File Servers 3.5
Automatic update. The issues that can be reported are listed in the following table:
Status Description
Automatic update is off and Critical issue. BitDefender Security for File Servers
no scheduled update task is is not automatically updated on a regular basis.
defined and on Click Fix to enable automatic update. If not already
configured, the update interval is set to one hour.
License Status
If the License Status button is orange or red, there are issues concerning the license
of your BitDefender Security for File Servers.
Note
The License Status button and the related issues are not available if BitDefender Security
for File Servers is managed by BitDefender Management Server. In this case, the
registration procedure is performed from the management console of BitDefender
Management Server.
Click the button to see the respective issues. A table named License Status will be
displayed and you will be able to see the monitored items and their current status.
Registration. The issues that can be reported are listed in the following table:
Status Description
You are using a trial version Requires attention. This status is displayed during
of the product and you the trial period.
should register it Click Fix to open the registration wizard and register
BitDefender Security for File Servers with a new
license key.
Your product registration Requires attention. This status is displayed during
will expire in x days. You the last 30 days of the licensing period.
should renew your Click Fix to open the registration wizard and register
registration BitDefender Security for File Servers with a new
license key.
Product registration expired. Critical issue. The licensing period has expired.
You should register it Click Fix to open the registration wizard and register
BitDefender Security for File Servers with a new
license key.
The serial number you Requires attention. You have entered an invalid
introduced is not valid license key.
Monitoring 33
BitDefender Security for File Servers 3.5
Status Description
Click Fix to open the registration wizard where you
can register BitDefender Security for File Servers
with a new license key.
My account. The issues that can be reported are listed in the following table:
Status Description
You do not have an Requires attention. You have not registered an
account. Please create an account yet.
account Click Fix to open the registration wizard and create
a new account or provide the details of an existing
one.
The password you Click Fix to open the registration wizard where you
introduced is incorrect. can create a new account or log in to an existing
Please try again one.
Server error! Please try Requires attention. A connection with the
again later BitDefender server could not be established.
Click Fix to open the registration wizard and try
again.
Account locked Click Fix to open the registration wizard where you
can create a new account or log in to an existing
one.
Registration will expire alert. The issues that can be reported are listed in the
following table:
Status Description
You have x days Requires attention. This status is displayed during the
remaining from your last 30 days of the licensing period.
license key Click Fix to open the registration wizard and register
BitDefender Security for File Servers with a new license
key.
Product is expired Critical issue. The licensing period has expired.
Click Fix to open the registration wizard and register
BitDefender Security for File Servers with a new license
key.
Monitoring 34
BitDefender Security for File Servers 3.5
Note
If you want to see detailed statistics, click Statistics in the tree menu.
8.2. Statistics
If you want to see detailed statistics regarding the real-time scanning activity of
BitDefender Security for File Servers, click Statistics in the tree menu.
Statistics
Monitoring 35
BitDefender Security for File Servers 3.5
BitDefender stores data about the objects scanned in real time in a database. Using
this database, BitDefender offers detailed statistics that allow you to assess:
Type Description
Summary Provides overall statistics on the real-time scanning activity of
BitDefender Security for File Servers:
The statistics are grouped into 4 time intervals: today, last week, last month and total.
Click a link to access the corresponding statistics.
Note
The statistics are refreshed every 60 seconds in order to provide you with real-time
information.
Note
Please note that reports and statistics are created using the same database. Clearing
statistics will also affect the accuracy of the reports.
Monitoring 36
BitDefender Security for File Servers 3.5
8.3. Reports
BitDefender allows creating reports regarding its scanning activity conducted over a
certain period of time. You may find reports very useful, as you can print them or send
them to other people interested in the status of the file server security.
Reports can be generated in HTML or comma-separated values (CSV) format. You
can create the following types of reports:
Note
Reports are created based on the information in the BitDefender database, which is by
default deleted every week. If the records were deleted sometime during the time period
covered by the report, then the report will provide inaccurate information.
To create, view and manage reports, click Reports in the tree menu (under
Monitoring).
Important
In the Reports section you can also find the on-demand scan reports.
Monitoring 37
BitDefender Security for File Servers 3.5
Reports
You can see all the existing reports listed in the table. For each report, the following
information is provided: the report name, the date when the report was generated, the
type of information it contains and the format.
New Report - launches a wizard that will help you create a new report.
Delete - deletes one or several selected reports. You will have to confirm your choice
by clicking Yes.
View Report - opens a selected report.
Note
To open a report you can also double-click it.
Purge Options - opens a new window where you can specify how long reports
should be kept. Enter the number of hours / days / weeks / months during which to
store reports and click OK to save changes.
Monitoring 38
BitDefender Security for File Servers 3.5
Note
Reports older than the specified period will be automatically deleted.
Welcome
Monitoring 39
BitDefender Security for File Servers 3.5
Click Next.
Monitoring 40
BitDefender Security for File Servers 3.5
Last day
Last week
Last month
Custom
Monitoring 41
BitDefender Security for File Servers 3.5
If you need information about the BitDefender activity related to a specific time interval,
select Custom and specify the start and end date. To specify the start and end date,
either click the numbers in the date field and enter new values or click the arrow to
choose a date from the calendar.
Note
The date format is month/day/year.
Only the records from the specified period will appear in the report.
Click Next.
View Summary
This window displays the selected report settings. You can make any changes by
returning to the previous steps (click Back).
Click Finish to generate the report. The report will appear in the Reports section.
Monitoring 42
BitDefender Security for File Servers 3.5
Note
Please note that Windows Server 2008 does not provide support for net send alerts.
The Alerts tab also displays the list of events that may occur during product operation.
You can completely disable notifications for each event or you can configure
BitDefender to send mail and net send alerts when the event occurs. For more
information, please refer to Configuring Event Notification (p. 49).
8.4.1. Alerts
Alerts are messages that include product-related information and which are meant to
inform their recipients about the product activity. BitDefender can be set to notify users
and administrators about occurring events through mail or net send alerts.
To configure the alert notification services and the events you want to be informed
about, click Alerts & Logs in the tree menu (under Monitoring) and then the Alerts
tab.
Monitoring 43
BitDefender Security for File Servers 3.5
Alerts
All of the events that may occur are listed in the table. There are 3 types of events:
Event Description
BitDefender Error Groups all the errors that may appear during product
operation, such as service start failure.
Update Error Refers to the occurrence of an error during the update
process.
Infected/suspect file Occurs when an infected or suspect file has been
detected detected.
BitDefender Warning Groups critical information regarding the activity of
BitDefender.
Monitoring 44
BitDefender Security for File Servers 3.5
Event Description
File not scanned Occurs when a file could not be scanned by
BitDefender.
BitDefender information Groups information regarding the activity of
BitDefender.
Key expired Indicates the expiration of the registration period.
Key will expire Indicates that there are 3 days left before the product
expires.
On-demand scanning Occurs whenever an on-demand scan is performed.
Update information Contains information about the update process.
Product update Occurs when a product update is available.
Mail Alerts
BitDefender can notify the network administrator by sending configurable mail alerts
in case an event for which they have been set takes place. Enabling this type of alert
will provide you with relevant and timely information about the status of your server
and may eliminate the need to access the BitDefender management console.
Note
This module integrates with an SMTP Server. It works with an ESMTP server as well,
but it does not use the ESMTP protocol because it is implemented on SMTP.
The Mail Alert tabs allows you to configure the mail alert notification service.
Monitoring 45
BitDefender Security for File Servers 3.5
Mail Alerts
Important
Provide a valid e-mail address for the SMTP server, otherwise the server may decline
to send an e-mail whose sender (e-mail address) is unknown to it.
3. If the SMTP server used to send messages requires authentication, select Use
SMTP Server Authentication and enter the user name and password in the
corresponding fields.
Note
NTLM authentication is not supported.
Monitoring 46
BitDefender Security for File Servers 3.5
To import e-mail addresses from a txt file, click Import, select the file and then
click Open. You can also copy the e-mail addresses from the text file and paste
them in the edit box.
5. Click Apply to save the changes and OK to close the window.
6. Configure the events for which mail alerts should be sent.
To export the list of e-mail addresses to a txt file, click Export and save the file to
the desired location.
Note
The recipients specified here will be alerted upon the occurrence of an event for which
this type of alert has been set. To specify different recipients for each event, go to the
Alerts section and configure the events. For more information, please refer to Configuring
Event Notification (p. 49).
If you want to disable this service, clear the check box corresponding to Enable Mail
Alerts and then click Apply to save the changes.
Note
This module integrates with the Net Send command of the Windows Operating System
on which the product is installed and it provides alerts regarding the product activity. In
order to receive such alerts, the Messenger and Alert services must be enabled by the
administrator on the server and on the client workstations. Windows Server 2008 does
not provide support for net send alerts.
Monitoring 47
BitDefender Security for File Servers 3.5
In order to use the net send notification service, follow these steps:
1. Select Enable Net Send Alerts to activate the net send notification service.
2. Specify the global recipients of the net send alerts.
In the edit box, type the computer names of the global recipients of mail alerts.
To import computer names from a txt file, click Import, select the file and then
click Open. You can also copy the computer names from the text file and paste
them in the edit box.
3. Click Apply to save the changes and OK to close the window.
4. Configure the events for which net send alerts should be sent, as described in the
Configuring Event Notification (p. 49) section.
Note
The recipients specified here will be alerted upon the occurrence of an event for which
this type of alert has been set. To specify different recipients for each event, go to the
Alerts section and configure the events. For more information, please refer to Configuring
Event Notification (p. 49).
To export the list to a txt file, click Export and save the file to the desired location.
If you want to disable this service, clear the check box corresponding to Enable Net
Send Alerts and then click Apply to save the changes.
Monitoring 48
BitDefender Security for File Servers 3.5
Important
In case of a virus outbreak it is not advisable to use this type of alert.
Note
If event notification is disabled, the event is not logged and no alert is sent when it takes
place.
When an event takes place, based on its importance, it can be logged and, possibly,
specified recipients may be notified through mail and net send alerts of its occurrence.
Choose one of the following options to set the importance level:
Low (File Log) - to keep a record of the event in the log file. No alert is sent when
the event takes place.
Medium (File Log and SMTP) - to log the event and send mail alerts when the
event takes place.
Monitoring 49
BitDefender Security for File Servers 3.5
High (File Log, SMTP and Net Send) - to log the event and send mail and net
send alerts when the event takes place.
Note
To make sure that logging and the mail and net send notification services are enabled,
go to the Logs and Alerts sections.
Click Apply to save the changes and OK if you want to close the window.
Mail alerts are sent to the e-mail addresses listed in the box.
Note
Beside these recipients, mail alerts are also sent to the global alert recipients. For more
information, please refer to Mail Alerts (p. 45).
If you want to export the list to a txt file, click Export and save the file to the desired
location.
Monitoring 50
BitDefender Security for File Servers 3.5
Important
You should NOT modify the strings that begin with the $ symbol as they provide valuable
information about the event.
Click Apply to save the changes and OK if you want to close the window.
Net send alerts are sent to the computers listed in the box.
If you want to export the list to a txt file, click Export and save the file to the desired
location.
Monitoring 51
BitDefender Security for File Servers 3.5
Note
Beside the recipients defined here, alerts are also sent to the global recipients defined
in the Alerts section (see Net Send Alerts (p. 47)).
Important
You should NOT modify the strings that begin with the $ symbol as they provide valuable
information about the event.
Monitoring 52
BitDefender Security for File Servers 3.5
8.4.2. Logs
BitDefender is by default configured to keep a log of its activity. The BitDefender log
provides you with a comprehensive list of the events that occured during product
operation.
Note
By default, the log file is saved in: ?:\Program
Files\BitDefender\BitDefender for Windows Servers
Services\BDLog.
To configure logging and to view the log files, click Alerts & Logs in the tree menu
(under Monitoring) and then the Logging tab.
Logs
Examining Logs
Click View last log to open the last log file.
If you have set a size limit for the log file, you can see any saved log file. Click View
saved logs, locate the log file you want to see and double-click it.
Monitoring 53
BitDefender Security for File Servers 3.5
Configuring Logging
To log the product activity to a file, select Enable file logging.
BitDefender creates the log file in ?:\Program Files\BitDefender\BitDefender
for Windows Servers Services\BDLog. By default, when the file reaches the
size limit of 1024 KB, a new log file is created.
Specify the size limit of the log files in the Maximum log file size field. If you do not
want to limit the size of the log file, enter 0 in the edit field.
You can specify a folder where files exceeding the specified size limit should be saved.
Either provide its path in the corresponding field or click Browse, locate the folder and
then click OK to set the new location.
To set the time period for which logs are to be stored, click Purge logs. Enter the
number of hours / days / weeks / months during which to store reports and click OK.
Click Apply to save the changes.
Monitoring 54
BitDefender Security for File Servers 3.5
8.5. Quarantine
BitDefender allows isolating infected or suspicious files in a secure area, named
quarantine. By isolating these files, the risk of getting infected disappears.
Important
The quarantine folder is common for both on-access and on-demand scanning.
To see the quarantined files and manage them, click Quarantine in the tree menu
(under Monitoring).
Quarantine
You can see the quarantined files listed in the table. For each quarantined file, the
following information is provided: the date and time when it was quarantined, the status
(infected / suspect), the virus name and the original location and file name.
Quarantined files are encrypted. If you want to open or execute a quarantined file,
select it and then click Save to disk to decrypt the file.
Monitoring 55
BitDefender Security for File Servers 3.5
Save to - decrypts selected quarantined files and saves them to the disk. In this
way you can open or execute these files.
Restore - decrypts selected quarantined files and restores them to their original
locations.
Rescan - rescans selected quarantined files.
Scanning older quarantined files with the latest malware signatures can lead to them
being repaired and restored to their original location.
Properties - opens a window where you can configure quarantine settings.
Quarantine Properties
Quarantine location
You can change the folder the quarantine is located in. Provide the new path in the
edit field or click Browse to set a new location. The default location of the quarantine
folder is: C:\Program Files\BitDefender\BitDefender for Windows
Servers Services\Quarantine.
Purge settings
By default, quarantined files older than 30 days are automatically deleted. To change
the time interval during which files are stored in the quarantine, type the number of
hours / days / weeks / months in the corresponding field.
Monitoring 56
BitDefender Security for File Servers 3.5
Rescan settings
BitDefender is configured to automatically rescan all quarantined files every 30
days. You can change the frequency to any number of hours / days / weeks / months,
rescan after each malware signature update, or disable this feature altogether.
Note
It is recommended to rescan quarantined items after each malware signature update.
Restore settings
By default, repaired items are automatically restored to their original location.
Restoration can sometimes fail (if, for example, the original location is no longer
available). For this reason, you can configure an alternative location by selecting
the corresponding check box and entering a new target.
To disable the restoration of repaired files, select Repair files and leave them in
quarantine.
Monitoring 57
BitDefender Security for File Servers 3.5
Scheduled Tasks
You can see all the existing scheduled tasks listed in the table. For each task, the
following information is provided: the task type and name, the last time when it was
performed, the next time it is scheduled to run and the status.
Note
The configuration wizard is different for each type of scheduled task.
Monitoring 58
BitDefender Security for File Servers 3.5
Welcome
Click Next.
Provide the task name and then select On-demand Scanning Task.
Monitoring 59
BitDefender Security for File Servers 3.5
Click Next.
Monitoring 60
BitDefender Security for File Servers 3.5
4. Specify the day or days of the week on which the task should be run.
Click Next.
Important
To configure the settings available for the selected scan mode, open the task
configuration window and go to:
Scan settings tab to configure the scan target and the scan settings, if you have
selected to perform a custom scan.
Actions tab to configure the actions to be taken on the detected files.
Notifications tab to configure the notification options.
Click Next.
Monitoring 61
BitDefender Security for File Servers 3.5
Set Actions
You can configure different actions for each type of detected file: infected, suspect or
rootkit. Select the actions to be taken on the detected files from the corresponding
menus.
Note
You can configure two actions for infected and suspect files. The second action is
enabled only in case the first action fails.
Actions for infected files. The following actions are available for infected files:
Action Description
Disinfect Remove the malware code from the infected files detected.
Disinfection may fail in some cases, such as when the file is inside
specific mail archives or it is used by a running process.
Move to Move infected files from their original location to the quarantine
Quarantine folder. Quarantined files cannot be executed or opened; therefore,
the risk of getting infected disappears.
Delete Immediately remove infected files from the disk, without any
warning.
Ignore Just log the infected files detected in the scan report. To view the
scan report, go to Reports in the tree menu after the scan is
completed.
Actions for suspect files. The following actions are available for suspect files:
Monitoring 62
BitDefender Security for File Servers 3.5
Action Description
Move to Move infected files from their original location to the quarantine
Quarantine folder. Quarantined files cannot be executed or opened;
therefore, the risk of getting infected disappears.
Delete Immediately remove suspect files from the disk, without any
warning.
Ignore Just log the suspect files detected in the scan report. To view
the scan report, go to Reports in the tree menu after the scan
is completed.
Actions for rootkits (hidden objects). The following actions are available for rootkits:
Action Description
Disinfect Remove the malware code from the infected files detected. Disinfection
may fail in some cases, such as when the file is inside specific mail archives
or it is used by a running process.
Ignore Just log the rootkits detected in the scan report. To view the scan report,
go to Reports in the tree menu after the scan is completed.
Click Next.
Select Log start/end of on-demand scanning to record the start and the end of the
scan in the BitDefender log. If you want BitDefender to also send mail or net send
alerts to designated people, go to Alerts & Logs, Alerts tab, and configure the
On-demand scanning event appropriately. For more information, please refer to
Configuring Event Notification (p. 49).
Monitoring 63
BitDefender Security for File Servers 3.5
Click Next.
View Summary
This window displays the task settings. You can make any changes by returning to
the previous steps (click Back).
Select Open the advanced properties of this task when I click "Finish" if you want
the Properties window of this task to be opened after you complete the wizard. In this
window you can modify the task and configure more advanced settings. For more
information, please refer to Configuring Properties (p. 64).
Click Finish to save the scheduled task.
Note
The task will appear in the Scheduled Tasks section.
Configuring Properties
In order to modify an existing scheduled task or to configure more advanced settings,
unavailable in the configuration wizard, just double-click the task or select it and click
Properties. The configuration window will appear.
Note
To open the configuration window, you can also select Open the advanced properties
of this task when I click "Finish" in the last step of the wizard.
Monitoring 64
BitDefender Security for File Servers 3.5
General
You can see general information about the task (the name, the status, the last time
when the task ran). If you want to change the task name, enter a new name in the
corresponding field.
To enable the task, select Enable Task. Otherwise, clear this check box.
Click Apply to save the changes. If you want to save the changes and close the
configuration window, click OK.
If you want to close the configuration window without making any changes, click
Cancel.
Modifying Schedule
Click the Schedule tab in the configuration window to modify the schedule.
Monitoring 65
BitDefender Security for File Servers 3.5
Schedule
Monitoring 66
BitDefender Security for File Servers 3.5
Select Delete if not scheduled to run again to delete the task after its last execution.
Click Apply to save the changes. If you want to save the changes and close the
configuration window, click OK.
If you want to close the configuration window without making any changes, click
Cancel.
Configuring Settings
Click the Scan settings tab in the configuration window to configure the scan target
and the scan settings.
Note
If you have scheduled a quick or deep system scan, you can only view the pre-defined
scan target and scan settings.
Monitoring 67
BitDefender Security for File Servers 3.5
Settings
spyware
adware
applications
dialers
rootkits
To this purpose, keep selected the check boxes corresponding to Scan for riskware
and to the specific malware threats you want to scan for.
Important
All malware detected is treated as infected.
If you want BitDefender to only use virus signatures for the signature-based scan,
clear the Scan for riskware check box.
Monitoring 68
BitDefender Security for File Servers 3.5
In the edit box, type the full path to the items to be scanned, separating each of
them by enter, comma or semicolon.
Click Browse and select the items to be scanned.
If you have a text file containing a list of locations (files and folders) to be scanned,
click Import and load the respective file. You can also copy the locations from the
text file and paste them in the edit box.
To save the list of files and folders to a text file, click Export.
Option Description
Scan all All files are scanned regardless of their type.
extensions
Scan only Only application files are scanned. This category is limited to files
application with the following extensions: 386; a6p; ac; accda; accdb;
files accdc; accde; accdp; accdr; accdt; accdu; acl;
acr; action; ade; adp; air; app; as; asd; asp;
awk; bas; bat; bin; cgi; chm; cla; class; cmd;
cnv; com; cpl; csc; csh; dat; dek; dld; dll; doc;
docm; docx; dot; dotm; dotx; drv; ds; ebm; esh;
exe; ezs; fky; frs; fxp; gadget; grv; hlp; hms;
hta; htm; html; iaf; icd; ini; inx; ipf; isu; jar;
js; jse; jsx; kix; laccdb; lnk; maf; mam; maq;
mar; mat; mcr; mda; mdb; mde; mdt; mdw; mem; mhtml;
mpp; mpt; mpx; ms; msg; msi; msp; mst; msu; oab;
obi; obs; ocx; oft; ole; one; onepkg; ost; ovl;
pa; paf; pex; pfd; php; pif; pip; pot; potm; potx;
ppa; ppam; pps; ppsm; ppsx; ppt; pptm; pptx; prc;
prf; prg; pst; pub; puz; pvd; pwc; py; pyc; pyo;
qpx; rbx; rgs; rox; rpj; rtf; scar; scr; script;
sct; shb; shs; sldm; sldx; smm; snp; spr; svd;
sys; thmx; tlb; tms; u3p; udf; url; vb; vbe; vbs;
vbscript; vxd; wbk; wcm; wdm; wiz; wll; wpk; ws;
wsf; xar; xl; xla; xlam; xlb; xlc; xll; xlm; xls;
Monitoring 69
BitDefender Security for File Servers 3.5
Option Description
xlsb; xlsm; xlsx; xlt; xltm; xltx; xlw; xml; xqt;
xsf; xsn; xtp
Viruses usually infect application files. Therefore, these file types
should always be scanned.
Scan custom Only the files with the specified extensions are scanned. You must
extensions type in the edit field the file extensions to be scanned by BitDefender,
separating them by semicolons (";").
Scan all except The files with the specified extensions are NOT scanned. You must
the following type in the edit field the file extensions NOT to be scanned by
extensions BitDefender, separating them by semicolons (";").
You should not exclude from scanning file types commonly known
to carry viruses, such as .exe, .doc, .ppt, .xls, .rtf, .pif,
.bat and others.
Monitoring 70
BitDefender Security for File Servers 3.5
Advanced Settings
Option Description
Scan boot sectors Scan the boot sectors of the available drives.
Scan memory Scan the systems memory.
Scan registry Scan Windows registry.
Scan cookies Scan cookie files.
Scan inside archives Scan archived files. You can specify a maximum archive
depth in order to scan files archived several times. If you want
to scan files no matter how many times they were archived,
set the maximum archive depth to 0.
Selecting this option slows down the system and may increase
scanning time.
Scan packed files Scan packed files.
Monitoring 71
BitDefender Security for File Servers 3.5
Click Browse and select the files and folders not to be scanned.
If you have a text file containing a list of locations (files and folders) not to be
scanned, click Import and load the respective file. You can also copy the locations
from the text file and paste them in the edit box.
To save the list of files and folders to a text file, click Export. In this way, you can
import this list on other file servers in order to configure the scanning exceptions.
Click Apply to save the changes. If you want to save the changes and close the
configuration window, click OK.
If you want to close the configuration window without making any changes, click
Cancel.
Configuring Actions
Click the Actions tab in the configuration window to configure the actions to be taken
on the detected files.
Actions
You can configure different actions for each type of detected file: infected, suspect or
rootkit. Select the actions to be taken on the detected files from the corresponding
menus.
Monitoring 72
BitDefender Security for File Servers 3.5
Note
You can configure two actions for infected and suspect files. The second action is
enabled only in case the first action fails.
Actions for infected files. The following actions are available for infected files:
Action Description
Disinfect Remove the malware code from the infected files detected.
Disinfection may fail in some cases, such as when the file is inside
specific mail archives or it is used by a running process.
Move to Move infected files from their original location to the quarantine
Quarantine folder. Quarantined files cannot be executed or opened; therefore,
the risk of getting infected disappears.
Delete Immediately remove infected files from the disk, without any
warning.
Ignore Just log the infected files detected in the scan report. To view the
scan report, go to Reports in the tree menu after the scan is
completed.
Actions for suspect files. The following actions are available for suspect files:
Action Description
Move to Move infected files from their original location to the quarantine
Quarantine folder. Quarantined files cannot be executed or opened;
therefore, the risk of getting infected disappears.
Delete Immediately remove suspect files from the disk, without any
warning.
Ignore Just log the suspect files detected in the scan report. To view
the scan report, go to Reports in the tree menu after the scan
is completed.
Actions for rootkits (hidden objects). The following actions are available for rootkits:
Action Description
Disinfect Remove the malware code from the infected files detected. Disinfection
may fail in some cases, such as when the file is inside specific mail archives
or it is used by a running process.
Ignore Just log the rootkits detected in the scan report. To view the scan report,
go to Reports in the tree menu after the scan is completed.
Click Apply to save the changes. If you want to save the changes and close the
configuration window, click OK.
Monitoring 73
BitDefender Security for File Servers 3.5
If you want to close the configuration window without making any changes, click
Cancel.
Configuring Notifications
Click the Notifications tab in the configuration window to configure the notification
options.
Notifications
Select Log start/end of on-demand scanning to record the start and the end of the
scan in the BitDefender log. If you want BitDefender to also send mail or net send
alerts to designated people, go to Alerts & Logs, Alerts tab, and configure the
On-demand scanning event appropriately. For more information, please refer to
Configuring Event Notification (p. 49).
A detailed scan report is created every time you perform an on-demand scan. The
report is generated in XML format and it can be viewed using a browser. To view the
scan report, go to Reports.
By default, the on-demand scan reports are saved in ?:\Program
Files\BitDefender\BitDefender Security for File Servers\Reports\.
To change this location, either type in the edit field the new location or click Browse
and select the folder in which reports are to be saved.
Monitoring 74
BitDefender Security for File Servers 3.5
Click Apply to save the changes. If you want to save the changes and close the
configuration window, click OK.
If you want to close the configuration window without making any changes, click
Cancel.
Note
The scheduled update tasks will not deactivate the automatic update.
Welcome
Click Next.
Monitoring 75
BitDefender Security for File Servers 3.5
Monitoring 76
BitDefender Security for File Servers 3.5
Click Next.
View Summary
This window displays the task settings. You can make any changes by returning to
the previous steps (click Back).
Select Open the advanced properties of this task when I click "Finish" if you want
the Properties window of this task to be opened after you complete the wizard. In this
window you can modify the task and configure more advanced settings. For more
information, please refer to Configuring Properties (p. 78).
Monitoring 77
BitDefender Security for File Servers 3.5
Note
The task will appear in the Scheduled Tasks section.
Configuring Properties
In order to modify an existing scheduled task or to configure more advanced settings,
unavailable in the configuration wizard, just double-click the task or select it and click
Properties. The configuration window will appear.
Note
To open the configuration window, you can also select Open the advanced properties
of this task when I click "Finish" in the last step of the wizard.
General
You can see general information about the task (the name, the status, the last time
when the task ran). If you want to change the task name, enter a new name in the
corresponding field.
To enable the task, select Enable Task. Otherwise, clear this check box.
Click Apply to save the changes. If you want to save the changes and close the
configuration window, click OK.
Monitoring 78
BitDefender Security for File Servers 3.5
If you want to close the configuration window without making any changes, click
Cancel.
Modifying Schedule
Click the Schedule tab in the configuration window to modify the schedule.
Schedule
Monitoring 79
BitDefender Security for File Servers 3.5
Week Days - to run the task repeatedly only in certain days of the week starting
with a specified date and time.
To configure the necessary settings, follow these steps:
1. Specify the start date in the Start Date field.
2. If you want to run the task repeatedly until a certain date, check End Date and
specify the end date in corresponding field.
3. Specify the start time in the Start Time field.
4. Specify the day or days of the week on which the task should be run.
Select Delete if not scheduled to run again to delete the task after its last execution.
Click Apply to save the changes. If you want to save the changes and close the
configuration window, click OK.
If you want to close the configuration window without making any changes, click
Cancel.
Welcome
Click Next.
Monitoring 80
BitDefender Security for File Servers 3.5
Provide the task name and then select Generate Report Task.
Click Next.
Monitoring 81
BitDefender Security for File Servers 3.5
Click Next.
Monitoring 82
BitDefender Security for File Servers 3.5
Click Next.
Monitoring 83
BitDefender Security for File Servers 3.5
Last day
Last week
Last month
Custom
If you need information about the BitDefender activity related to a specific time interval,
select Custom and specify the start and end date. To specify the start and end date,
either click the numbers in the date field and enter new values or click the arrow to
choose a date from the calendar.
Note
The date format is month/day/year.
Only the records from the specified period will appear in the report.
Click Next.
View Summary
This window displays the task settings. You can make any changes by returning to
the previous steps (click Back).
Select Open the advanced properties of this task when I click "Finish" if you want
the Properties window of this task to be opened after you complete the wizard. In this
window you can modify the task and configure more advanced settings. For more
information, please refer to Configuring Properties (p. 85).
Click Finish to save the scheduled task.
Note
The task will appear in the Scheduled Tasks section.
Monitoring 84
BitDefender Security for File Servers 3.5
Configuring Properties
In order to modify an existing scheduled task or to configure more advanced settings,
unavailable in the configuration wizard, just double-click the task or select it and click
Properties. The configuration window will appear.
Note
To open the configuration window, you can also select Open the advanced properties
of this task when I click "Finish" in the last step of the wizard.
General
You can see general information about the task (the name, the status, the last time
when the task ran). If you want to change the task name, enter a new name in the
corresponding field.
To enable the task, select Enable Task. Otherwise, clear this check box.
Click Apply to save the changes. If you want to save the changes and close the
configuration window, click OK.
If you want to close the configuration window without making any changes, click
Cancel.
Modifying Schedule
Click the Schedule tab in the configuration window to modify the schedule.
Monitoring 85
BitDefender Security for File Servers 3.5
Schedule
Monitoring 86
BitDefender Security for File Servers 3.5
Select Delete if not scheduled to run again to delete the task after its last execution.
Click Apply to save the changes. If you want to save the changes and close the
configuration window, click OK.
If you want to close the configuration window without making any changes, click
Cancel.
Configuring Settings
Click the Settings tab in the configuration window to modify the report settings.
Settings
Monitoring 87
BitDefender Security for File Servers 3.5
Click Apply to save the changes. If you want to save the changes and close the
configuration window, click OK.
If you want to close the configuration window without making any changes, click
Cancel.
Monitoring 88
BitDefender Security for File Servers 3.5
9. Server Scan
Server Scan allows configuring the way in which BitDefender scans the file server.
BitDefender Security for File Servers protects Windows-based file servers against
various kinds of malware, such as viruses, spyware, adware, rootkits and so on. The
product offers two layers of protection:
Real-time protection - prevents users from accessing or copying infected files and
thus causing the infection to spread throughout the network. BitDefender scans files
as they are accessed or copied on the disk, according to the current protection level
settings. The actions to be taken on the infected and suspect files detected also
depend on the current protection level.
By default, real-time protection is set to the Medium level, which provides reasonable
detection efficiency with low use of system resources. BitDefender is configured to
disinfect infected files (deny access if disinfection fails) and to deny access to suspect
files. To change the protection level or to fully customize real-time protection, go to
the Real-time tab.
Note
Real-time protection is also referred to as on-access scanning - files are scanned as
the users access them.
On-demand scanning - allows detecting and removing the malware that already
resides in the system. This is the classic scan initiated by the administrator - you
choose what drive, folder or file BitDefender should scan, and BitDefender scans
it - on-demand.
To configure and initiate on-demand scanning, go to the Scan Tasks tab. There
are several scan modes that you can run. Use the custom mode to fully configure
the scanning settings and the scan target.
You can also easily scan any file or folder using the Scan with BitDefender option
from the Windows context menu.
You can schedule on-demand scanning tasks to run at a specific time or on a regular
basis. To learn more, please refer to Scheduled Tasks (p. 57).
Depending on the configuration of the system BitDefender Security for File Servers
is installed on, specific files, folders and processes are automatically excluded from
scanning during installation. You can also specify other files, folders and processes
that you do not want to be scanned. For more information, please refer to Scanning
Exceptions (p. 117).
Server Scan 89
BitDefender Security for File Servers 3.5
Real-time Protection
Real-time protection is enabled by default. If you want to disable it, clear the Real-time
protection is enabled check box and click Apply.
Important
Keep real-time protection enabled in order to protect the file server and the workstations
that use its resources against viruses, spyware and other malware.
Server Scan 90
BitDefender Security for File Servers 3.5
taken on the infected and suspect files detected are configurable for each protection
level.
Move the slider to the protection level that best suits your security needs. You can
choose one of the four protection levels:
Only the accessed files that do not exceed 10 megabytes (MB) are
scanned. The boot sectors of the available drives are scanned as
well.
Accessed files are scanned only for viruses, Trojans and spyware.
BitDefender does not scan inside archives.
The default action taken on infected files is Disinfect. If disinfection
fails, access to such files is denied.
The default action taken on suspect files is Deny access.
Low Covers basic security needs. The resource consumption level is very
low.
Server Scan 91
BitDefender Security for File Servers 3.5
If you have set a new protection level, click Apply to save the changes.
1. Click Configure current protection level. The configuration window will appear.
2. Click the tabs and configure the respective settings, as needed.
3. Click OK to save the changes and close the window.
Tab Description
Scan settings This tab allows you to configure the scan settings of real-time
protection. You can set BitDefender to scan only files having specific
extensions or to skip from scanning specific file formats, archives or
files exceeding a configured size limit.
Actions This tab allows you to configure the actions to be taken on the infected
and suspect files detected by BitDefender.
Notifications This tab allows you to specify the on-access scanning events
BitDefender should notify you about.
Note
The scan settings can be configured only for the Custom protection level.
Server Scan 92
BitDefender Security for File Servers 3.5
The scan settings BitDefender offers may help you fully adapt real-time protection to
the specific security needs of your file server. You can configure real-time protection
as follows:
Fine-tuning the scan settings may greatly reduce scanning times and improve the
system's responsiveness.
Server Scan 93
BitDefender Security for File Servers 3.5
To save the list of files and folders to a text file, click Export.
Option Description
Scan all Accessed files are scanned regardless of their type.
extensions
Scan only Only application files are scanned. This category is limited to files
application with the following extensions: 386; a6p; ac; accda; accdb;
files accdc; accde; accdp; accdr; accdt; accdu; acl;
acr; action; ade; adp; air; app; as; asd; asp;
awk; bas; bat; bin; cgi; chm; cla; class; cmd;
cnv; com; cpl; csc; csh; dat; dek; dld; dll; doc;
docm; docx; dot; dotm; dotx; drv; ds; ebm; esh;
exe; ezs; fky; frs; fxp; gadget; grv; hlp; hms;
hta; htm; html; iaf; icd; ini; inx; ipf; isu; jar;
js; jse; jsx; kix; laccdb; lnk; maf; mam; maq;
mar; mat; mcr; mda; mdb; mde; mdt; mdw; mem; mhtml;
mpp; mpt; mpx; ms; msg; msi; msp; mst; msu; oab;
obi; obs; ocx; oft; ole; one; onepkg; ost; ovl;
pa; paf; pex; pfd; php; pif; pip; pot; potm; potx;
ppa; ppam; pps; ppsm; ppsx; ppt; pptm; pptx; prc;
prf; prg; pst; pub; puz; pvd; pwc; py; pyc; pyo;
qpx; rbx; rgs; rox; rpj; rtf; scar; scr; script;
sct; shb; shs; sldm; sldx; smm; snp; spr; svd;
sys; thmx; tlb; tms; u3p; udf; url; vb; vbe; vbs;
vbscript; vxd; wbk; wcm; wdm; wiz; wll; wpk; ws;
wsf; xar; xl; xla; xlam; xlb; xlc; xll; xlm; xls;
xlsb; xlsm; xlsx; xlt; xltm; xltx; xlw; xml; xqt;
xsf; xsn; xtp
Server Scan 94
BitDefender Security for File Servers 3.5
Option Description
Viruses usually infect application files. Therefore, these file types
should always be scanned on access.
Scan custom Only the files with the specified extensions are scanned. You must
extensions type in the edit field the file extensions to be scanned by BitDefender,
separating them by semicolons (";").
Scan all except The files with the specified extensions are NOT scanned. You must
the following type in the edit field the file extensions NOT to be scanned by
extensions BitDefender, separating them by semicolons (";").
You should not exclude from scanning file types commonly known
to carry viruses, such as .exe, .doc, .ppt, .xls, .rtf, .pif,
.bat and others.
Server Scan 95
BitDefender Security for File Servers 3.5
Advanced Settings
Option Description
Malware scanned Scan accessed files not only for viruses, but also for known
riskware threats. The riskware category contains spyware,
adware, dialers and other applications that may be used for
malicious purposes.
Detected files will be treated as infected. The software that
includes adware components might stop working if this option
is enabled.
Scan boot sectors Scan the boot sectors of the available drives.
Scan packed files Scan packed files.
Do not scan BitDefender will not scan the network shares on the file server,
network shares allowing for a faster network access.
You should not select this option if the network computers are
not protected by an antivirus solution.
Scan inside Scan archived files. You can specify a maximum archive depth
archives in order to scan files archived several times. If you want to
scan files no matter how many times they were archived, set
the maximum archive depth to 0.
Server Scan 96
BitDefender Security for File Servers 3.5
Option Description
Selecting this option slows down the system and may increase
access times.
To save the list of files and folders to a text file, click Export. In this way, you can
import this list on other file servers in order to configure the scanning exceptions.
You can also specify whether the global exceptions defined in the Exceptions section
should apply to real-time scanning.
Actions Tab
This tab allows you to configure the actions to be taken on the infected and suspect
files detected by BitDefender.
Server Scan 97
BitDefender Security for File Servers 3.5
Actions Tab
You can configure different actions for infected and suspect files. There is a list of
actions for each type of detected files (infected or suspect). When an infected or
suspect file is detected, the first action in the corresponding list is applied. If this action
fails, the next action in the list is applied and so on.
You can change the order in which actions are to be applied. Select an action and
click or to move it up or down in the list.
Actions for infected files. The following actions are available for infected files:
Action Description
Disinfect Remove the malware code from the requested infected files before
delivery. Disinfection may fail in some cases, such as when the
file is inside specific mail archives or it is used by a running
process.
Deny Deny users' access to the requested files if BitDefender detects
them to be infected.
Move to Move infected files from their original location to the quarantine
Quarantine folder. Quarantined files cannot be executed or opened; therefore,
the risk of getting infected disappears.
Server Scan 98
BitDefender Security for File Servers 3.5
Action Description
Delete Immediately remove infected files from the disk, without any
warning.
Actions for suspect files. The following actions are available for suspect files:
Action Description
Deny Deny users' access to the requested files if BitDefender detects
them to be suspect.
Move to Quarantine Move suspect files from their original location to the quarantine
folder. Quarantined files cannot be executed or opened;
therefore, the risk of getting infected disappears.
Delete Immediately remove suspect files from the disk, without any
warning.
If you want BitDefender to automatically send the suspect files to the BitDefender Lab
for further analysis, select the corresponding check box.
Notifications Tab
BitDefender can be configured to notify you about special events that occur during its
operation. This tab allows you to specify the on-access scanning events BitDefender
should notify you about.
Server Scan 99
BitDefender Security for File Servers 3.5
Notifications Tab
To configure BitDefender only to log the occurrence of an event, or also to alert you
or other person about it through mail or net send, go to Alerts & Logs, Alerts tab, and
configure the corresponding event. For more information, please refer to Configuring
Event Notification (p. 49).
Scanning Instances
Type a new value in the edit field and click OK to save the changes.
Important
Immediately after installing BitDefender Security for File Servers, please run an
On-Demand Scan to detect/clean any infections already on your computer.
To configure and initiate on-demand scanning, click Server Scan in the tree menu
and then the Scan Tasks tab.
Scan Tasks
Custom Scan Allows scanning specific locations on the file server using a custom
configuration of the scan settings. To configure these settings, click
Customize.
Avoid scanning the file server when the server workload is at high levels, especially
in the case of a thorough scanning. It is recommended to perform scans when the
server is idle or nearly idle. For example, you should perform (plan) deep system
scans in weekends or at night.
Before you start scanning, you should update BitDefender to enable it to detect the
latest malware discovered. To immediately update BitDefender, follow these steps:
1. In the tree menu, click Update.
2. Click the Update tab.
3. Click Update Now.
If you have created a scheduled scan task to run periodically, you should also create
a scheduled update task to run a few minutes before the scan task.
Important
If you have disabled Automatic update or the update frequency is low, updating
BitDefender before scanning is a MUST.
Perform a deep system scan once a week to make sure that no malware is lodged
in the system. To this purpose, you can conveniently schedule an on-demand
scanning task to run every week. To learn more, please refer to Scheduled Tasks
(p. 57).
1. Select a scan mode from the Scan tasks tab. Use the custom mode to fully configure
the scanning settings and the scan target.
2. If you have selected to perform a custom scan, specify the scan target and configure
the scanning settings. For more information, please refer to Configuring On-Demand
Scanning Settings (p. 109).
3. Click Start Scan and follow the steps of the BitDefender Scanner.
Manual Scanning
Manual scanning consists in directly selecting the object to be scanned using the
BitDefender On-Demand Scan option from the BitDefender program group in the Start
Menu. The scanning options are pre-configured for the best detection results.
Note
Manual scanning is very useful, as it can be performed when Windows works in Safe
Mode, too.
To select the object to be scanned by BitDefender, in the Windows Start menu, follow
the path Start Menu All Programs BitDefender Security for Windows Servers
BitDefender On-Demand Scan. The following window will appear:
Select the location you want to scan and click OK. The BitDefender Scanner will
appear and guide you through the scanning process.
BitDefender Scanner
The BitDefender Scanner appears whenever you initiate an on-demand scan. Follow
the three-step guided procedure to complete the scanning process.
Scanning
You can see the scan status and statistics (scanning speed, elapsed time, number of
scanned / infected / suspicious / hidden objects and other).
Note
The scanning process may take a while, depending on the complexity of the scan.
To temporarily stop the scanning process, just click Pause. You will have to click
Resume to resume scanning.
You can stop scanning anytime you want by clicking Stop&Yes. You will go directly
to the last step of the wizard.
Wait for BitDefender to finish scanning.
Actions
Note
You need to choose the action manually only when the BitDefender Scanner starts as
a result of a manual scan being initiated.
Action Description
Take No Action Ignore the detected files. They will only be logged in the scan report.
Disinfect Remove the malware code from infected files.
Delete Remove detected files from the disk.
Summary
You can see the results summary. To see the scan report, go to Reports.
Important
If required, please restart your system in order to complete the cleaning process.
If you do not want these objects to be detected again by BitDefender you must add
them as exceptions to the scanning process. To add scan exceptions, go to Server
Scan > Exceptions . For more information, please refer to Scanning Exceptions (p.
117).
Note
To schedule an on-demand scan and configure its settings, use the provided link to
access the Scheduled Tasks section.
To configure the settings of a scan mode or the context menu scan settings:
Tab Description
Scan settings This tab allows you to configure the scan settings and the scan target.
You can set BitDefender to scan only files having specific extensions
or to skip from scanning specific file formats, archives or files exceeding
a configured size limit.
Actions This tab allows you to configure the actions to be taken on the infected,
suspect and hidden files detected by BitDefender.
Notifications This tab allows you to configure the notification options for on-demand
scanning.
Note
The scan settings can be configured only for the custom scan mode and context menu
scanning.
spyware
adware
applications
dialers
rootkits
To this purpose, keep selected the check boxes corresponding to Scan for riskware
and to the specific malware threats you want to scan for.
Important
All malware detected is treated as infected.
If you want BitDefender to only use virus signatures for the signature-based scan,
clear the Scan for riskware check box.
To specify the items (drives, files, folders) to be scanned, do any of the following:
In the edit box, type the full path to the items to be scanned, separating each of
them by enter, comma or semicolon.
Click Browse and select the items to be scanned.
If you have a text file containing a list of locations (files and folders) to be scanned,
click Import and load the respective file. You can also copy the locations from the
text file and paste them in the edit box.
To save the list of files and folders to a text file, click Export.
Option Description
Scan all All files are scanned regardless of their type.
extensions
Scan only Only application files are scanned. This category is limited to files
application with the following extensions: 386; a6p; ac; accda; accdb;
files accdc; accde; accdp; accdr; accdt; accdu; acl;
acr; action; ade; adp; air; app; as; asd; asp;
Option Description
awk; bas; bat; bin; cgi; chm; cla; class; cmd;
cnv; com; cpl; csc; csh; dat; dek; dld; dll; doc;
docm; docx; dot; dotm; dotx; drv; ds; ebm; esh;
exe; ezs; fky; frs; fxp; gadget; grv; hlp; hms;
hta; htm; html; iaf; icd; ini; inx; ipf; isu; jar;
js; jse; jsx; kix; laccdb; lnk; maf; mam; maq;
mar; mat; mcr; mda; mdb; mde; mdt; mdw; mem; mhtml;
mpp; mpt; mpx; ms; msg; msi; msp; mst; msu; oab;
obi; obs; ocx; oft; ole; one; onepkg; ost; ovl;
pa; paf; pex; pfd; php; pif; pip; pot; potm; potx;
ppa; ppam; pps; ppsm; ppsx; ppt; pptm; pptx; prc;
prf; prg; pst; pub; puz; pvd; pwc; py; pyc; pyo;
qpx; rbx; rgs; rox; rpj; rtf; scar; scr; script;
sct; shb; shs; sldm; sldx; smm; snp; spr; svd;
sys; thmx; tlb; tms; u3p; udf; url; vb; vbe; vbs;
vbscript; vxd; wbk; wcm; wdm; wiz; wll; wpk; ws;
wsf; xar; xl; xla; xlam; xlb; xlc; xll; xlm; xls;
xlsb; xlsm; xlsx; xlt; xltm; xltx; xlw; xml; xqt;
xsf; xsn; xtp
Viruses usually infect application files. Therefore, these file types
should always be scanned.
Scan custom Only the files with the specified extensions are scanned. You must
extensions type in the edit field the file extensions to be scanned by BitDefender,
separating them by semicolons (";").
Scan all except The files with the specified extensions are NOT scanned. You must
the following type in the edit field the file extensions NOT to be scanned by
extensions BitDefender, separating them by semicolons (";").
You should not exclude from scanning file types commonly known
to carry viruses, such as .exe, .doc, .ppt, .xls, .rtf, .pif,
.bat and others.
Advanced Settings
Option Description
Scan boot sectors Scan the boot sectors of the available drives.
Scan memory Scan the systems memory.
Scan registry Scan Windows registry.
Scan cookies Scan cookie files.
Scan inside archives Scan archived files. You can specify a maximum archive
depth in order to scan files archived several times. If you want
to scan files no matter how many times they were archived,
set the maximum archive depth to 0.
Selecting this option slows down the system and may increase
scanning time.
Scan packed files Scan packed files.
To save the list of files and folders to a text file, click Export. In this way, you can
import this list on other file servers in order to configure the scanning exceptions.
By default, the global exceptions defined in the Exceptions section apply to on-demand
scaning. You can select not to apply the exceptions for the current scan mode.
Actions Tab
This tab allows you to configure the actions to be taken on the infected, suspect and
hidden files detected by BitDefender.
Actions Tab
You can configure different actions for each type of detected file: infected, suspect or
rootkit. Select the actions to be taken on the detected files from the corresponding
menus.
Note
You can configure two actions for infected and suspect files. The second action is
enabled only in case the first action fails.
Actions for infected files. The following actions are available for infected files:
Action Description
Disinfect Remove the malware code from the infected files detected.
Disinfection may fail in some cases, such as when the file is inside
specific mail archives or it is used by a running process.
Move to Move infected files from their original location to the quarantine
Quarantine folder. Quarantined files cannot be executed or opened; therefore,
the risk of getting infected disappears.
Delete Immediately remove infected files from the disk, without any
warning.
Ignore Just log the infected files detected in the scan report. To view the
scan report, go to Reports in the tree menu after the scan is
completed.
Actions for suspect files. The following actions are available for suspect files:
Action Description
Move to Move infected files from their original location to the quarantine
Quarantine folder. Quarantined files cannot be executed or opened;
therefore, the risk of getting infected disappears.
Delete Immediately remove suspect files from the disk, without any
warning.
Ignore Just log the suspect files detected in the scan report. To view
the scan report, go to Reports in the tree menu after the scan
is completed.
If you want BitDefender to automatically send the suspect files to the BitDefender Lab
for further analysis, select the corresponding check box.
Actions for rootkits (hidden objects). The following actions are available for rootkits:
Action Description
Disinfect Remove the malware code from the infected files detected. Disinfection
may fail in some cases, such as when the file is inside specific mail archives
or it is used by a running process.
Ignore Just log the rootkits detected in the scan report. To view the scan report,
go to Reports in the tree menu after the scan is completed.
Notifications Tab
BitDefender can be configured to notify you about special events that occur during its
operation. This tab allows you to configure the notification options for on-demand
scanning.
Notifications Tab
Select Log start/end of on-demand scanning to record the start and the end of the
scan in the BitDefender log. If you want BitDefender to also send mail or net send
alerts to designated people, go to Alerts & Logs, Alerts tab, and configure the
On-demand scanning event appropriately. For more information, please refer to
Configuring Event Notification (p. 49).
A detailed scan report is created every time you perform an on-demand scan. The
report is generated in XML format and it can be viewed using a browser. To view the
scan report, go to Reports.
By default, the on-demand scan reports are saved in ?:\Program
Files\BitDefender\BitDefender Security for File Servers\Reports\.
To change this location, either type in the edit field the new location or click Browse
and select the folder in which reports are to be saved.
Similarly, BitDefender Security for File Servers does not scan specific locations and
processes related to BitDefender Security for Windows Servers products and
BitDefender Management Server in order to avoid interfering with their operation and
to improve their performance.
The exclusion process occurs during installation. You can see the locations and the
processes excluded from scanning under the Global Exceptions tab and the Process
Exclusions tab, respectively. Later on, if you add or remove Microsoft server products
or BitDefender security solutions, you can go to these tabs and update exclusions
automatically.
You can manually exclude from scanning other files, folders and processes. For
example, you can exclude a backup process in order to avoid interference and to
speed it up. You can also remove current exclusions at your choice.
Besides the automatic exclusions, you may need to manually exclude specific items.
For more information, please refer to Items to Be Excluded Manually (p. 120).
Scan Exceptions
The files and folders excluded from both real-time and on-demand scanning are listed
in the box.
To exclude files and folders from scanning, do any of the following:
In the edit box, type the full path to the files and folders not to be scanned, separating
each of them by enter, comma or semicolon.
Click Browse and select the files and folders not to be scanned.
If you have a text file containing a list of locations (files and folders) not to be
scanned, click Import list and load the respective file. You can also copy the
locations from the text file and paste them in the edit box.
To save the list of files and folders to a text file, click Export list. In this way, you can
import this list on other file servers in order to configure the scanning exceptions.
You can click Update Exclusions to automatically check for and exclude files and
folders that Microsoft or BitDefender recommend not to be scanned. You should update
exclusions if you have removed them accidentally and if you install a new Microsoft
server product or BitDefender security solution.
Click Apply to save the changes.
Scan Exceptions
The first time you access this section, you can see the processes automatically
excluded from real-time scanning as recommended by Microsoft or BitDefender. You
can add new applications to the list or remove current applications.
To exclude a specific process from real-time scanning, follow these steps:
Add Application
To modify an exclusion from the list, double-click it or select it and click Modify. If you
no longer want to exclude an application from real-time scanning, select it and click
Delete.
You can click Update Exclusions to automatically check for and exclude applications
that Microsoft or BitDefender recommend not to be scanned in real time. You should
update exclusions if you have removed them accidentally and if you install a new
Microsoft server product or BitDefender security solution.
1. If a mail server different than Exchange Server is running on the machine , the
following locations must be excluded:
the folder where the mail server is installed.
the folder where the mailboxes and mail queues are stored.
2. If Exchange Server 2003 is running on the machine:
a. If you use Microsoft BackOffice POP3 Connector to pull emails from an external
POP3 account, exclude the incoming folder. The default location is:
%ProgramFiles%\Microsoft Windows Small Business
Server\Networking\POP3\Incoming Mail\
b. Exclude the Internet Information Services (IIS) 6.0 compression folder that is
used with Outlook Web Access 2003. The default location is the following folder:
%SystemRoot%\IIS Temporary Compressed Files\
Note
For an updated list of exclusions recommended by Microsoft, please refer to this article.
X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*
Copy this line and save the file with any name and .COM extension, for example
EICAR.COM. BitDefender must treat this file as an infected one.
There is no reason to worry, because this file is not a real virus. All that EICAR.COM
does when executed is display the text EICAR-STANDARD-ANTIVIRUS-TEST-FILE
and exit.
Note
The reason we do not include the file in the package is that we want to avoid generating
any false alarms for those who use BitDefender or any other virus scanner. You can
keep the EICAR.COM in a safe place and periodically test the server protection.
You can visit the EICAR website at http://eicar.com, read the documentation and
download the file from one of the locations on the following web page:
http://eicar.com/anti_virus_test_file.htm.
10. Update
New viruses and spyware are found and identified every day. This is why it is very
important to keep BitDefender up to date with the latest signatures.
The automatic update feature allows updating BitDefender automatically, on a regular
basis, without the administrator's intervention. By default, BitDefender automatically
checks for updates every hour. If new malware signatures or scanning engine updates
are detected, BitDefender will automatically download and install them. To change
the update frequency, go to the Settings tab.
The automatic update can also be done anytime you want by clicking Update now
from the Update section or by creating a scheduled update task.
Note
In order not to interfere with the server's operation, product updates are not automatically
installed. Go to the Update section periodically to see if there are any product updates
available and to install them.
Antivirus updates - the files containing virus and spyware signatures, as well as
the scanning engine, are updated to ensure permanent protection against the new
threats that appear.
Product updates - when a new product version is released, new features and scan
techniques are introduced to the effect of improving the product's performance.
Update 122
BitDefender Security for File Servers 3.5
10.1. Update
To find out information on the update status and if product updates are available, click
Update in the tree menu and then the Update tab.
Update
If you want to update BitDefender immediately, just click Update Now. The Update
module will check for updates at the specified update locations. If new malware
signatures or scanning engine updates are detected, BitDefender will automatically
download and install them.
Update 123
BitDefender Security for File Servers 3.5
product updates - these are cumulative .exe files that include all the files that
have been changed since the first release of a specific version.
version updates - these are installation packages (kits) with a new released version
of the product.
Whenever product updates are available or a newer version is released, you will see
information about the updates in this section.
By default, product updates and version updates are not automatically installed because
they may require a system reboot or stopping server traffic. It is recommended to
install the latest updates as soon as possible. To find out how to enable and configure
automatic product updates, please refer to Configuring Product Updates (p. 126).
Update 124
BitDefender Security for File Servers 3.5
Update Settings
Using the automatic update. The automatic update feature allows updating
BitDefender automatically, on a regular basis, without the administrator's intervention.
By default, BitDefender checks for updates at the specified update locations, every
hour. If new malware signatures or scanning engine updates are detected,
BitDefender will automatically download and install them.
Important
Keep automatic update enabled in order to be protected against the latest threats.
To change the frequency BitDefender checks for updates, follow these steps:
1. Type the number of hours between two consecutive checks for updates in the
Automatic update interval field.
Update 125
BitDefender Security for File Servers 3.5
Note
Scheduled update tasks will not de-activate automatic update so that the update
locations will be checked for new updates on a regular basis.
product updates that do not require stopping server traffic or to reboot the server
product updates that require stopping server traffic, but do not require to reboot the
server
product updates that require to reboot the server
To configure automatic downloads and installation for each type of product update,
select one of the following options:
Update 126
BitDefender Security for File Servers 3.5
Note
Your server will be more vulnerable unless you install updates regularly.
Update 127
BitDefender Security for File Servers 3.5
Update Locations
BitDefender can update from the local network, over the Internet, directly or through
a proxy server.
For more reliable and faster updates, you can configure two update locations: a First
update location and a Second update location. Both require the configuration of
the following options:
Update location - type the address of the update server. By default, the primary
update location is: upgrade.bitdefender.com.
If multiple BitDefender products are installed in your network, you can setup a local
server as the first update location for all the products and make
upgrade.bitdefender.com the second location, to be used in case the first
becomes unavailable. In this way you can reduce Internet traffic during updates.
Note
The local update location can be setup using BitDefender Update Server (included
in BitDefender Management Server), or published using a web server such as Apache
or IIS.
Update 128
BitDefender Security for File Servers 3.5
Allow unsigned updates - select this option to allow updates from a local server
to be installed.
Use proxy - select this option if the company uses a proxy server. The following
settings must be specified:
Server IP - type the IP of the proxy server.
Port - type the port BitDefender uses to connect to the proxy server.
User name - type a user name recognized by the proxy.
Password - type the valid password of the previously specified user.
Update Notifications
Update 129
BitDefender Security for File Servers 3.5
To configure BitDefender only to log the occurrence of an event, or also to alert you
about it through mail or netsend, go to Alerts & Logs, Alerts tab, and configure the
corresponding event. For more information, please refer to Configuring Event
Notification (p. 49).
Click Apply to save the changes.
Update Rollback
If a rollback is available, the current product version and the version you can roll back
to will be displayed. Click Roll Back and confirm your choice by clicking Yes in the
confirmation window to perform the rollback action.
Update 130
BitDefender Security for File Servers 3.5
After a rollback is performed, the version currently in use and the previous version will
be displayed. You can use the provided link to update back to the newer version.
Update 131
BitDefender Security for File Servers 3.5
11. General
The General snap-in allows configuring BitDefender to send the BitDefender Lab
reports regarding the viruses found on the server and the incidents that occurred
during product operation.
This is where you can also set general settings for the BitDefender tray icon.
Report Virus
General 132
BitDefender Security for File Servers 3.5
Real-time Virus Reporting is disabled by default. To activate it, follow these steps:
Report Incidents
By default, the reports created automatically during product crashes are not sent to
the BitDefender Lab. To configure BitDefender to send incident reports to the
BitDefender Lab, follow these steps:
General 133
BitDefender Security for File Servers 3.5
Tray Icon
You can enable or disable the tray icon for local users or users connected using
Remote Desktop by selecting or clearing the corresponding check boxes.
Click Apply to save the changes.
Note
The changes will take effect the next time a user logs in.
General 134
BitDefender Security for File Servers 3.5
135
BitDefender Security for File Servers 3.5
1. Open the BitDefender Configuration Repair Tool using this path: Start Menu All
Programs BitDefender Security for Windows Servers BitDefender
Configuration Repair Tool.
2. Click Restore to begin restoring the backup copy of the configuration file.
3. Wait until the BitDefender Configuration Repair Tool completes the restoration
process.
Repairing Configuration
The window displays the status of the restoration process. First, the BitDefender
Configuration Repair Tool stops the services belonging to the BitDefender Security
for Windows Servers products installed on the system (services belonging to
Microsoft applications may also be stopped; for example, Microsoft Exchange
Transport, if BitDefender Security for Exchange is installed). Then, the BitDefender
Configuration Repair Tool replaces the corrupt configuration file with the backup
file (an older working copy of the configuration file). Finally, the BitDefender
Configuration Repair Tool restarts the processes previously stopped.
4. The BitDefender Configuration Repair Tool informs you when the backup copy of
the configuration file has been successfully restored.
Finish
13. Support
BitDefender strives to provide its customers with an unparalleled level of fast and
accurate support. If you experience any issue with or if you have any question about
your BitDefender product, go to our online Support Center. It provides several resources
that you can use to quickly find a solution or an answer. Or, if you prefer, you can
contact the BitDefender Customer Care team. Our support representatives will answer
your questions in a timely manner and they will provide you with the assistance you
need.
Note
You can find out information about the support services we provide and our support
policy at the Support Center.
You can also use your favorite search engine to find out more information about
computer security, the BitDefender products and the company.
Support 138
BitDefender Security for File Servers 3.5
The BitDefender Knowledge Base for business products is available any time at
http://www.bitdefender.com/businesshelp.
1. Go to http://www.bitdefender.com/businesshelp.
2. Search the Knowledge Base for articles that may provide a solution to your problem.
3. Read the relevant articles or documents and try the proposed solutions.
4. If you have not found a solution, click Contact Us in the the left-side menu.
Support 139
BitDefender Security for File Servers 3.5
5. Use the contact form to open an e-mail support ticket or access other available
contact options.
For detailed contact information, please refer to Contact Information (p. 143).
1. Open the BitDefender Support Tool by following the path: Start Menu All
Programs BitDefender Security for Windows Servers BitDefender Support
Tool.
Support 140
BitDefender Security for File Servers 3.5
Submission Details
Support 141
BitDefender Security for File Servers 3.5
Finish
A zip archive has been created on your desktop. Click Finish to close the window.
You can send the zip archive together with your request for support in order to
reduce the time needed to resolve the query.
Support 142
BitDefender Security for File Servers 3.5
1. Go to http://www.bitdefender.com/site/Partnership/list.
2. The contact information of the BitDefender local distributors should be displayed
automatically. If this does not happen, select the country you reside in to view the
information.
3. If you do not find a BitDefender distributor in your country, feel free to contact us
by e-mail at sales@bitdefender.com. Please write your e-mail in English in order
for us to be able to assist you promptly.
PO Box 667588
Pompano Beach, Fl 33066
United States
Phone (sales&technical support): 1-954-776-6262
Sales: sales@bitdefender.com
Web: http://www.bitdefender.com
Support Center: http://www.bitdefender.com/businesshelp
14.3.3. Spain
BitDefender Espaa, S.L.U.
Avda. Diagonal, 357, 1 1
08037 Barcelona
Espaa
Fax: (+34) 93 217 91 28
Phone (office&sales): (+34) 93 218 96 15
Phone (technical support): (+34) 93 502 69 10
Sales: comercial@bitdefender.es
Website: http://www.bitdefender.es
Support Center: http://www.bitdefender.es/businesshelp
14.3.4. Germany
BitDefender GmbH
Airport Office Center
Robert-Bosch-Strae 2
59439 Holzwickede
Deutschland
Phone (office&sales): +49 (0)2301 91 84 222
Phone (technical support): +49 (0)2301 91 84 444
Sales: vertrieb@bitdefender.de
Website: http://www.bitdefender.de
Support Center: http://www.bitdefender.de/businesshelp
14.3.5. Romania
BITDEFENDER SRL
West Gate Park, Building H2, 24 Preciziei Street
Bucharest, Sector 6
Fax: +40 21 2641799
Phone (sales&technical support): +40 21 2063470
Sales: sales@bitdefender.ro
Website: http://www.bitdefender.ro
Support Center: http://www.bitdefender.ro/businesshelp
Glossary
ActiveX
ActiveX is a model for writing programs so that other programs and the operating
system can call them. ActiveX technology is used with Microsoft Internet Explorer
to make interactive Web pages that look and behave like computer programs,
rather than static pages. With ActiveX, users can ask or answer questions, use
push buttons, and interact in other ways with the Web page. ActiveX controls are
often written using Visual Basic.
Active X is notable for a complete lack of security controls; computer security
experts discourage its use over the Internet.
Adware
Adware is often combined with a host application that is provided at no charge
as long as the user agrees to accept the adware. Because adware applications
are usually installed after the user has agreed to a licensing agreement that states
the purpose of the application, no offense is committed.
However, pop-up advertisements can become an annoyance, and in some cases
degrade system performance. Also, the information that some of these applications
collect may cause privacy concerns for users who were not fully aware of the
terms in the license agreement.
Archive
A disk, tape, or directory that contains files that have been backed up.
A file that contains one or more files in a compressed format.
Backdoor
A hole in the security of a system deliberately left in place by designers or
maintainers. The motivation for such holes is not always sinister; some operating
systems, for example, come out of the box with privileged accounts intended for
use by field service technicians or the vendor's maintenance programmers.
Boot sector
A sector at the beginning of each disk that identifies the disk's architecture (sector
size, cluster size, and so on). For startup disks, the boot sector also contains a
program that loads the operating system.
Boot virus
A virus that infects the boot sector of a fixed or floppy disk. An attempt to boot
from a diskette infected with a boot sector virus will cause the virus to become
active in memory. Every time you boot your system from that point on, you will
have the virus active in memory.
Glossary 146
BitDefender Security for File Servers 3.5
Browser
Short for Web browser, a software application used to locate and display Web
pages. The two most popular browsers are Netscape Navigator and Microsoft
Internet Explorer. Both of these are graphical browsers, which means that they
can display graphics as well as text. In addition, most modern browsers can
present multimedia information, including sound and video, though they require
plug-ins for some formats.
Command line
In a command line interface, the user types commands in the space provided
directly on the screen using command language.
Cookie
Within the Internet industry, cookies are described as small files containing
information about individual computers that can be analyzed and used by
advertisers to track your online interests and tastes. In this realm, cookie
technology is still being developed and the intention is to target ads directly to
what you've said your interests are. It's a double-edge sword for many people
because on one hand, it's efficient and pertinent as you only see ads about what
you're interested in. On the other hand, it involves actually "tracking" and
"following" where you go and what you click. Understandably so, there is a debate
over privacy and many people feel offended by the notion that they are viewed
as a "SKU number" (you know, the bar code on the back of packages that gets
scanned at the grocery check-out line). While this viewpoint may be extreme, in
some cases it is accurate.
Disk drive
It's a machine that reads data from and writes data onto a disk.
A hard disk drive reads and writes hard disks.
A floppy drive accesses floppy disks.
Disk drives can be either internal (housed within a computer) or external (housed
in a separate box that connects to the computer).
Download
To copy data (usually an entire file) from a main source to a peripheral device.
The term is often used to describe the process of copying a file from an online
service to one's own computer. Downloading can also refer to copying a file from
a network file server to a computer on the network.
E-mail
Electronic mail. A service that sends messages on computers via local or global
networks.
Glossary 147
BitDefender Security for File Servers 3.5
Events
An action or occurrence detected by a program. Events can be user actions, such
as clicking a mouse button or pressing a key, or system occurrences, such as
running out of memory.
False positive
Occurs when a scanner identifies a file as infected when in fact it is not.
Filename extension
The portion of a filename, following the final point, which indicates the kind of
data stored in the file.
Many operating systems use filename extensions, e.g. Unix, VMS, and MS-DOS.
They are usually from one to three letters (some sad old OSes support no more
than three). Examples include "c" for C source code, "ps" for PostScript, "txt" for
arbitrary text.
Heuristic
A rule-based method of identifying new viruses. This method of scanning does
not rely on specific virus signatures. The advantage of the heuristic scan is that
it is not fooled by a new variant of an existing virus. However, it might occasionally
report suspicious code in normal programs, generating the so-called "false
positive".
IP
Internet Protocol - A routable protocol in the TCP/IP protocol suite that is
responsible for IP addressing, routing, and the fragmentation and reassembly of
IP packets.
Java applet
A Java program which is designed to run only on a web page. To use an applet
on a web page, you would specify the name of the applet and the size (length
and width, in pixels) that the applet can utilize. When the web page is accessed,
the browser downloads the applet from a server and runs it on the user's machine
(the client). Applets differ from applications in that they are governed by a strict
security protocol.
For example, even though applets run on the client, they cannot read or write
data onto the client's machine. Additionally, applets are further restricted so that
they can only read and write data from the same domain that they are served
from.
Macro virus
A type of computer virus that is encoded as a macro embedded in a document.
Many applications, such as Microsoft Word and Excel, support powerful macro
languages.
These applications allow you to embed a macro in a document, and have the
macro execute each time the document is opened.
Glossary 148
BitDefender Security for File Servers 3.5
Mail client
An e-mail client is an application that enables you to send and receive e-mail.
Memory
Internal storage areas in the computer. The term memory identifies data storage
that comes in the form of chips, and the word storage is used for memory that
exists on tapes or disks. Every computer comes with a certain amount of physical
memory, usually referred to as main memory or RAM.
Non-heuristic
This method of scanning relies on specific virus signatures. The advantage of the
non-heuristic scan is that it is not fooled by what might seem to be a virus, and
does not generate false alarms.
Packed programs
A file in a compression format. Many operating systems and applications contain
commands that enable you to pack a file so that it takes up less memory. For
example, suppose you have a text file containing ten consecutive space
characters. Normally, this would require ten bytes of storage.
However, a program that packs files would replace the space characters by a
special space-series character followed by the number of spaces being replaced.
In this case, the ten spaces would require only two bytes. This is just one packing
technique - there are many more.
Path
The exact directions to a file on a computer. These directions are usually described
by means of the hierarchical filing system from the top down.
The route between any two points, such as the communications channel between
two computers.
Phishing
The act of sending an e-mail to a user falsely claiming to be an established
legitimate enterprise in an attempt to scam the user into surrendering private
information that will be used for identity theft. The e-mail directs the user to visit
a Web site where they are asked to update personal information, such as
passwords and credit card, social security, and bank account numbers, that the
legitimate organization already has. The Web site, however, is bogus and set up
only to steal the users information.
Polymorphic virus
A virus that changes its form with each file it infects. Since they have no consistent
binary pattern, such viruses are hard to identify.
Port
An interface on a computer to which you can connect a device. Personal
computers have various types of ports. Internally, there are several ports for
connecting disk drives, display screens, and keyboards. Externally, personal
Glossary 149
BitDefender Security for File Servers 3.5
computers have ports for connecting modems, printers, mice, and other peripheral
devices.
In TCP/IP and UDP networks, an endpoint to a logical connection. The port number
identifies what type of port it is. For example, port 80 is used for HTTP traffic.
Report file
A file that lists actions that have occurred. BitDefender maintains a report file
listing the path scanned, the folders, the number of archives and files scanned,
how many infected and suspicious files were found.
Rootkit
A rootkit is a set of software tools which offer administrator-level access to a
system. The term was first used for the UNIX operating systems and it referred
to recompiled tools which provided intruders administrative rights, allowing them
to conceal their presence so as not to be seen by the system administrators.
The main role of rootkits is to hide processes, files, logins and logs. They may
also intercept data from terminals, network connections or peripherals, if they
incorporate the appropriate software.
Rootkits are not malicious in nature. For example, systems and even some
applications hide critical files using rootkits. However, they are mostly used to
hide malware or to conceal the presence of an intruder into the system. When
combined with malware, rootkits pose a great threat to the integrity and the security
of a system. They can monitor traffic, create backdoors into the system, alter files
and logs and avoid detection.
Script
Another term for macro or batch file, a script is a list of commands that can be
executed without user interaction.
Spam
Electronic junk mail or junk newsgroup postings. Generally known as any
unsolicited e-mail.
Spyware
Any software that covertly gathers user information through the user's Internet
connection without his or her knowledge, usually for advertising purposes. Spyware
applications are typically bundled as a hidden component of freeware or shareware
programs that can be downloaded from the Internet; however, it should be noted
that the majority of shareware and freeware applications do not come with
spyware. Once installed, the spyware monitors user activity on the Internet and
transmits that information in the background to someone else. Spyware can also
gather information about e-mail addresses and even passwords and credit card
numbers.
Spyware's similarity to a Trojan horse is the fact that users unwittingly install the
product when they install something else. A common way to become a victim of
Glossary 150
BitDefender Security for File Servers 3.5
Startup items
Any files placed in this folder will open when the computer starts. For example,
a startup screen, a sound file to be played when the computer first starts, a
reminder calendar, or application programs can be startup items. Normally, an
alias of a file is placed in this folder rather than the file itself.
System tray
Introduced with Windows 95, the system tray is located in the Windows taskbar
(usually at the bottom next to the clock) and contains miniature icons for easy
access to system functions such as fax, printer, modem, volume, and more.
Double click or right click an icon to view and access the details and controls.
TCP/IP
Transmission Control Protocol/Internet Protocol - A set of networking protocols
widely used on the Internet that provides communications across interconnected
networks of computers with diverse hardware architectures and various operating
systems. TCP/IP includes standards for how computers communicate and
conventions for connecting networks and routing traffic.
Trojan
A destructive program that masquerades as a benign application. Unlike viruses,
Trojan horses do not replicate themselves but they can be just as destructive.
One of the most insidious types of Trojan horse is a program that claims to rid
your computer of viruses but instead introduces viruses onto your computer.
The term comes from a story in Homer's Iliad, in which the Greeks give a giant
wooden horse to their foes, the Trojans, ostensibly as a peace offering. But after
the Trojans drag the horse inside their city walls, Greek soldiers sneak out of the
horse's hollow belly and open the city gates, allowing their compatriots to pour in
and capture Troy.
Update
A new version of a software or hardware product designed to replace an older
version of the same product. In addition, the installation routines for updates often
check to make sure that an older version is already installed on your computer;
if not, you cannot install the update.
BitDefender has it's own update module that allows you to manually check for
updates, or let it automatically update the product.
Glossary 151
BitDefender Security for File Servers 3.5
Virus
A program or piece of code that is loaded onto your computer without your
knowledge and runs against your will. Most viruses can also replicate themselves.
All computer viruses are manmade. A simple virus that can copy itself over and
over again is relatively easy to produce. Even such a simple virus is dangerous
because it will quickly use all available memory and bring the system to a halt.
An even more dangerous type of virus is one capable of transmitting itself across
networks and bypassing security systems.
Virus definition
The binary pattern of a virus, used by the antivirus program to detect and eliminate
the virus.
Worm
A program that propagates itself over a network, reproducing itself as it goes. It
cannot attach itself to other programs.
Glossary 152