Bitdefender Internet Security 10, 1Y, 1U NB11031001 Benutzerhandbuch

Produktcode
NB11031001
Seite von 4
BitDefender
BitDefender Internet Security v10
Product description
Antivirus
   The purpose of the antivirus module is to ensure detection and removal of all viruses in the wild. BitDefender Antivirus uses robust scan engines
certified by ICSA Labs, Virus Bulletin, Checkmark, CheckVir and TÜV.  
 
Proactive Detection 
 B-HAVE (Behavioral Heuristic Analyzer in Virtual Environments) emulates a virtual computer-inside-a-computer where pieces of software are run
in order to check for potential malware behavior. This BitDefender proprietary technology represents a new security layer that keeps the operating
system safe from unknown viruses by detecting malicious pieces of code for which signatures have not yet been released. 
 
 
Permanent Antivirus Protection
 The new and improved BitDefender scanning engines will scan and disinfect infected files on access, minimizing data loss. Infected documents can
now be recovered instead of being deleted. 
 
  
 NEW Rootkit Detection and Removal
A new BitDefender module looks for rootkits (malicious programs designed to control victim computers, while staying hidden) and removes them
on detection.
  
NEW Web Scanning 
 Web traffic is now filtered in real-time even before reaching your browser, providing a safe and enjoyable web experience. 
 
 
Peer-2-Peer and IM Applications Protection
 Filters against viruses that spread via instant messaging and file sharing software applications. 
 
 
Full E-mail Protection
 BitDefender runs on the POP3/SMTP protocol level, filtering incoming and outgoing e-mail messages, regardless of the e-mail client used
(OutlookTM, Outlook ExpressTM, The Bat!TM, Netscape®, etc.), without any additional configuration. 
 
 
Firewall
  The firewall module filters network traffic and controls the access permission of applications connecting to the Internet. In Stealth Mode, your
computer is “hidden” from malicious software and hackers. The firewall module is capable of automatically detecting and protecting
against port scans (streams of packets sent to a machine in order to find “access points”, often in preparation for an attack).  
 
Internet Traffic Control
 Defines exactly which incoming or outgoing connections to permit/deny. Defines rules regarding specific protocols, ports, applications and/or
remote addresses. 
 
 
IMPROVED Internet Application Control 
 BitDefender maintains a database of trusted applications, and informs users whether or not the applications demanding network access are
trustworthy, so they can make informed decisions. Alternatively, BitDefender can grant access automatically for trusted applications. 
 
 
Connection Control
 BitDefender lets you see in real-time which programs have opened which connections to the network. You can choose to allow or block them,
either permanently or temporarily, by a single mouse click. 
 
 
Stealth Mode