SHAREPOINT Administrator's guide
SHAREPOINT
Administrator's guide
BitDefender Security for SharePointAdministrator's guide
Published 2010.04.26
Copyright© 2010 BitDefender
Legal NoticeAll rights reserved. No part of this book may be reproduced or transmitted in any form or by any means, electronic ormechanical, including photocopying, recording, or by any information storage and retrieval system, without writtenpermission from an authorized representative of BitDefender. The inclusion of brief quotations in reviews may bepossible only with the mention of the quoted source. The content can not be modified in any way.
Warning and Disclaimer. This product and its documentation are protected by copyright. The information in thisdocument is provided on an “as is” basis, without warranty. Although every precaution has been taken in the preparationof this document, the authors will not have any liability to any person or entity with respect to any loss or damagecaused or alleged to be caused directly or indirectly by the information contained in this work.
This book contains links to third-party Websites that are not under the control of BitDefender, therefore BitDefenderis not responsible for the content of any linked site. If you access a third-party website listed in this document, youwill do so at your own risk. BitDefender provides these links only as a convenience, and the inclusion of the link doesnot imply that BitDefender endorses or accepts any responsibility for the content of the third-party site.
Trademarks. Trademark names may appear in this book. All registered and unregistered trademarks in this documentare the sole property of their respective owners, and are respectfully acknowledged.
BitDefender Security for SharePoint
She came to me one morning, one lonely Sunday morningHer long hair flowing in the mid-winter windI know not how she found me, for in darkness I was walkingAnd destruction lay around me, from a fight I could not win
BitDefender Security for SharePoint
Table of ContentsLicense and Warranty ..................................................... viiPreface ..................................................................... xii
1. Conventions Used in This Book . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xii1.1. Typographical Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xii1.2. Admonitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiii
2. The Book Structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiii3. Request for Comments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiv
Description ....................................................... 11. Features and Benefits ................................................ 2
Installation ........................................................ 42. System Requirements ................................................ 53. Installing BitDefender Security for SharePoint .................... 6
3.1. Fresh Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63.2. Modifying Existing Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
4. Repairing or Removing BitDefender .............................. 104.1. Modify BitDefender . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104.2. Repair BitDefender . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114.3. Remove BitDefender . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Configuration and Management ............................ 125. Getting Started ...................................................... 136. Dashboard ........................................................... 15
6.1. Status Area . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 156.1.1. Server Scan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 166.1.2. Update Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 176.1.3. License Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
6.2. Product Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
7. Monitoring ............................................................ 217.1. Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
7.1.1. Clearing Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 237.2. Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
7.2.1. Managing Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 257.2.2. Creating Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 257.2.3. Clearing Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
iv
BitDefender Security for SharePoint
7.3. Alerts & Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 307.3.1. Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 307.3.2. Alerts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 327.3.3. Alert Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
7.4. Quarantine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 397.4.1. Managing Quarantine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 397.4.2. Clearing Quarantine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
7.5. Scheduled Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 427.5.1. Managing Scheduled Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 427.5.2. On-demand Scanning Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 437.5.3. Update Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 497.5.4. Report Generation Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
8. Server Scan .......................................................... 618.1. On-access Scanning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
8.1.1. Configuring Microsoft SharePoint Antivirus Settings . . . . . . . . . . . . . . . . . . . . 638.1.2. Scanning Profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
8.2. On-demand Scanning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 718.2.1. Scanning Files and Folders . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 728.2.2. Scanning Profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
8.3. Testing Antivirus Protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
9. Update ................................................................ 819.1. Update . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
9.1.1. Update Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 829.1.2. Product Update . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
9.2. Update Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 849.2.1. Configuring Update Schedule . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 849.2.2. Configuring Product Updates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
9.3. Update Locations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 879.4. Update Notifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 889.5. Update Rollback . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
10. General .............................................................. 9110.1. Report Virus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9110.2. Report Incidents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9210.3. Exporting/Importing Product Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
10.3.1. Exporting Product Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9310.3.2. Importing Product Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
11. License .............................................................. 9411.1. Purchase the full version of the product . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9411.2. Register the product . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9411.3. Register a BitDefender Account . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
12. Help .................................................................. 98
v
BitDefender Security for SharePoint
Troubleshooting and Getting Help ......................... 9913. BitDefender Configuration Repair Tool ........................ 10014. BitDefender Support Tool ....................................... 10315. Support ............................................................ 105
15.1. Asking for Help . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10515.2. BitDefender Knowledge Base . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10515.3. Contact Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106
15.3.1. Web Addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10615.3.2. BitDefender Offices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106
Glossary .................................................................. 109
vi
BitDefender Security for SharePoint
License and WarrantyIF YOU DO NOT AGREE TO THESE TERMS AND CONDITIONS DO NOT INSTALLTHE SOFTWARE. BY SELECTING "I ACCEPT", "OK", "CONTINUE", "YES" OR BYINSTALLING OR USING THE SOFTWARE IN ANY WAY, YOU ARE INDICATINGYOUR COMPLETE UNDERSTANDING AND ACCEPTANCE OF THE TERMS OFTHIS AGREEMENT.
These Terms cover BitDefender Corporate Solutions and Services for Companieslicensed to you, including related documentation and any update and upgrade of theapplications delivered to you under the purchased license or any related serviceagreement as defined in the documentation and any copy of these items.
This License Agreement is a legal agreement between you (either an individual or alegal person) and BitDefender for use of BitDefender’s software product identifiedabove, which includes computer software and services, and may include associatedmedia, printedmaterials, and "online" or electronic documentation (hereafter designatedas "BitDefender"), all of which are protected by international copyright laws andinternational treaties. By installing, copying or using BitDefender, you agree to bebound by the terms of this agreement. If you do not agree to the terms of thisagreement, do not install or use BitDefender.
BitDefender License. BitDefender is protected by copyright laws and internationalcopyright treaties, as well as other intellectual property laws and treaties. BitDefenderis licensed, not sold.
GRANT OF LICENSE. BitDefender hereby grants you and only you the followingnon-exclusive, limited, non-transferable and royalty-bearing license to use BitDefender.
APPLICATION SOFTWARE. You may install and use BitDefender, on as manycomputers as necessary with the limitation imposed by the total number of licensedusers. You may make one additional copy for back-up purpose.
SERVER USER LICENSE. This license applies to BitDefender software that providesnetwork services and can be installed on computers that provide network services.You may install this software on as many computers as necessary within the limitationimposed by the total number of users to which these computers provide networkservices. This limitation refers to the total number of users that has to be less than orequal to the number of users of the license.
DESKTOP USER LICENSE. This license applies to BitDefender software that can beinstalled on a single computer or on a single operating system (any physical or virtualmachine running an operating system) and which does not provide network services
License and Warranty vii
BitDefender Security for SharePoint
(excepting the case when the desktop computer provides network services by runningBitDefender Management Server). Each user may install this software on a singlecomputer or on a single operating system and may make one additional copy forbackup on a different device. The number of users allowed is the number of the usersof the license.
SUITE LICENSE. This license applies to BitDefender Suites or software bundles.Such Suites or bundles are comprised of:
● server components that can be installed on as many computers or network serversas necessary while retaining the limitation imposed on the total number of clientmachines established by the license bought
● client components, that can be installed on a single desktop computer or on a singleoperating system (any physical or virtual machine running an operating system)which does not provide network services (excepting the case when the desktopcomputer provides network services by running BitDefender Management Server);the number of client machines allowed is less than or equal to the number of clientmachines for which the Suite License is granted. This limitation refers to the totalnumber of computers or operating systems licensed (any physical or virtual machinerunning an operating system).
TERMOF LICENSE. The license granted hereunder shall commence on the purchasingdate of BitDefender and shall expire at the end of the period for which the license ispurchased.
EXPIRATION. The product will cease to perform its functions immediately uponexpiration of the license.
UPGRADES. If BitDefender is labeled as an upgrade, you must be properly licensedto use a product identified by BitDefender as being eligible for the upgrade in orderto use BitDefender. A BitDefender labeled as an upgrade replaces and/or supplementsthe product that formed the basis for your eligibility for the upgrade. You may use theresulting upgraded product only in accordance with the terms of this LicenseAgreement. If BitDefender is an upgrade of a component of a package of softwareprograms that you licensed as a single product, BitDefender may be used andtransferred only as part of that single product package and may not be separated foruse by more than the total number of licensed users. The terms and conditions of thislicense replace and supersede any previous agreements that may have existedbetween you and BitDefender regarding the original product or the resulting upgradedproduct.
License and Warranty viii
BitDefender Security for SharePoint
COPYRIGHT. All rights, titles and interest in and to BitDefender and all copyright rightsin and to BitDefender (including but not limited to any images, photographs, logos,animations, video, audio, music, text, and "applets" incorporated into BitDefender),the accompanying printed materials, and any copies of BitDefender are owned byBitDefender. BitDefender is protected by copyright laws and international treatyprovisions. Therefore, you must treat BitDefender like any other copyrighted material.You may not copy the printed materials accompanying BitDefender. You must produceand include all copyright notices in their original form for all copies created irrespectiveof the media or form in which BitDefender exists. You may not sub-license, rent, sell,lease or share the BitDefender license. You may not reverse engineer, recompile,disassemble, create derivative works, modify, translate, or make any attempt to discoverthe source code for BitDefender.
LIMITED WARRANTY. BitDefender warrants that the media on which BitDefender isdistributed is free from defects for a period of thirty days from the date of delivery ofBitDefender to you. Your sole remedy for a breach of this warranty will be thatBitDefender , at its option, may replace the defective media upon receipt of thedamaged media, or refund the money you paid for BitDefender. BitDefender does notwarrant that BitDefender will be uninterrupted or error free or that the errors will becorrected. BitDefender does not warrant that BitDefender will meet your requirements.
EXCEPT AS EXPRESSLY SET FORTH IN THIS AGREEMENT, BITDEFENDERDISCLAIMS ALL OTHERWARRANTIES, EXPRESS OR IMPLIED, WITH RESPECTTOTHEPRODUCTS, ENHANCEMENTS,MAINTENANCEORSUPPORTRELATEDTHERETO, OR ANY OTHER MATERIALS (TANGIBLE OR INTANGIBLE) ORSERVICESSUPPLIEDBYHIM. BITDEFENDERHEREBYEXPRESSLYDISCLAIMSANY IMPLIED WARRANTIES AND CONDITIONS, INCLUDING, WITHOUTLIMITATION, THE IMPLIEDWARRANTIES OF MERCHANTABILITY, FITNESS FORA PARTICULAR PURPOSE, TITLE, NON INTERFERENCE, ACCURACY OF DATA,ACCURACY OF INFORMATIONAL CONTENT, SYSTEM INTEGRATION, AND NONINFRINGEMENT OF THIRD PARTY RIGHTS BY FILTERING, DISABLING, ORREMOVINGSUCHTHIRDPARTY’S SOFTWARE, SPYWARE, ADWARE, COOKIES,EMAILS, DOCUMENTS, ADVERTISEMENTS OR THE LIKE, WHETHER ARISINGBYSTATUTE, LAW,COURSEOFDEALING,CUSTOMANDPRACTICE,ORTRADEUSAGE.
DISCLAIMEROFDAMAGES. Anyone using, testing, or evaluating BitDefender bearsall risk to the quality and performance of BitDefender. In no event shall BitDefenderbe liable for any damages of any kind, including, without limitation, direct or indirectdamages arising out of the use, performance, or delivery of BitDefender, even ifBitDefender has been advised of the existence or possibility of such damages. SOMESTATES DO NOT ALLOW THE LIMITATION OR EXCLUSION OF LIABILITY FOR
License and Warranty ix
BitDefender Security for SharePoint
INCIDENTAL OR CONSEQUENTIAL DAMAGES, SO THE ABOVE LIMITATION OREXCLUSION MAY NOT APPLY TO YOU. IN NO CASE SHALL BITDEFENDER'SLIABILITY EXCEED THE PURCHASE PRICE PAID BY YOU FOR BITDEFENDER.The disclaimers and limitations set forth above will apply regardless of whether youaccept to use, evaluate, or test BitDefender.
IMPORTANT NOTICE TO USERS. THIS SOFTWARE IS NOT FAULT-TOLERANTAND IS NOT DESIGNED OR INTENDED FOR USE IN ANY HAZARDOUSENVIRONMENT REQUIRING FAIL-SAFE PERFORMANCE OR OPERATION. THISSOFTWARE IS NOT FOR USE IN THE OPERATION OF AIRCRAFT NAVIGATION,NUCLEAR FACILITIES, OR COMMUNICATION SYSTEMS, WEAPONS SYSTEMS,DIRECT OR INDIRECT LIFE-SUPPORT SYSTEMS, AIR TRAFFIC CONTROL, ORANY APPLICATION OR INSTALLATION WHERE FAILURE COULD RESULT INDEATH, SEVERE PHYSICAL INJURY OR PROPERTY DAMAGE.
GENERAL. This Agreement will be governed by the laws of Romania and byinternational copyright regulations and treaties. The exclusive jurisdiction and venueto adjudicate any dispute arising out of these License Terms shall be of the courts ofRomania.
Prices, costs and fees for use of BitDefender are subject to change without prior noticeto you.
In the event of invalidity of any provision of this Agreement, the invalidity shall notaffect the validity of the remaining portions of this Agreement.
BitDefender and BitDefender logos are trademarks of BitDefender. All other trademarksused in the product or in associated materials are the property of their respectiveowners.
The license will terminate immediately without notice if you are in breach of any of itsterms and conditions. You shall not be entitled to a refund from BitDefender or anyresellers of BitDefender as a result of termination. The terms and conditions concerningconfidentiality and restrictions on use shall remain in force even after any termination.
BitDefender may revise these Terms at any time and the revised terms shallautomatically apply to the corresponding versions of the Software distributed with therevised terms. If any part of these Terms is found void and unenforceable, it will notaffect the validity of rest of the Terms, which shall remain valid and enforceable.
In case of controversy or inconsistency between translations of these Terms to otherlanguages, the English version issued by BitDefender shall prevail.
License and Warranty x
BitDefender Security for SharePoint
Contact BitDefender, at 24 Preciziei Street, West Gate Park, Building H2, ground floor,Sector 6, Bucharest, Romania, or at Tel No: 40-21-206.34.70 or Fax: 40-21-264.17.99,e-mail address: [email protected].
License and Warranty xi
BitDefender Security for SharePoint
PrefaceThis guide is intended to all companies which have chosen BitDefender Security forSharePoint as a security solution for their SharePoint servers. The informationpresented in this book is suitable not only for computer literates, it is accessible toeveryone who is able to work under Windows.
This book will describe for you BitDefender Security for SharePoint, the Companyand the team who built it, will guide you through the installation process, will teachyou how to configure it. You will find out how to use BitDefender Security forSharePoint, how to update, test and customize it. You will learn how to get best fromBitDefender.
We wish you a pleasant and useful lecture.
1. Conventions Used in This Book1.1. Typographical Conventions
Several text styles are used in the book for an improved readability. Their aspect andmeaning are presented in the table below.
DescriptionAppearanceSyntax samples are printed with monospacedcharacters.
sample syntax
The URL links is pointing to some externallocation, on http or ftp servers.
http://www.bitdefender.com
E-mail messages are inserted in the text forcontact information.
This is an internal link, towards some locationinside the document.
“Preface” (p. xii)
File and directories are printed usingmonospaced font.
filename
All the product options are printed using strongcharacters.
option
Preface xii
BitDefender Security for SharePoint
DescriptionAppearanceThe code listing is printed with monospacedcharacters.
sample code listing
1.2. AdmonitionsThe admonitions are in-text notes, graphically marked, bringing to your attentionadditional information related to the current paragraph.
NoteThe note is just a short observation. Although you can omit it, the notes can providevaluable information, such as specific feature or a link to some related topic.
ImportantThis requires your attention and is not recommended to skip over it. Usually, it providesnon-critical but significant information.
WarningThis is critical information you should treat with increased caution. Nothing bad willhappen if you follow the indications. You should read and understand it, because itdescribes something extremely risky.
2. The Book StructureThe book consists of 4 parts, containing the major topics: Description, Installation,Configuration and Management, Troubleshooting and Getting Help. Moreover, aglossary is provided to clarify some technical terms.
Description. BitDefender Security for SharePoint and its features are presented toyou.
Installation. Step by step instructions for installing BitDefender on a workstation.This is a comprehensive tutorial on installing BitDefender Security for SharePoint.Starting with the prerequisites for a successfully installation, you are guided throughthe whole installation process. Finally, the removing procedure is described in caseyou need to uninstall BitDefender.
Configuration andManagement. Description of basic administration andmaintenanceof BitDefender. The chapters explain in detail all options of BitDefender Security forSharePoint, how to register and configure the product, how to scan the SharePointserver and how to perform the updates.
Preface xiii
BitDefender Security for SharePoint
Troubleshooting and Getting Help. Where to look and where to ask for help ifsomething unexpected appears.
Glossary. The Glossary tries to explain some technical and uncommon terms youwill find in the pages of this document.
3. Request for CommentsWe invite you to help us improve the book. We have tested and verified all of theinformation to the best of our ability. Please write to tell us about any flaws you findin this book or how you think it could be improved, to help us provide you with the bestdocumentation possible.
Let us know by sending an e-mail to [email protected].
ImportantPlease write all of your documentation-related e-mails in English so that we can processthem efficiently.
Preface xiv
BitDefender Security for SharePoint
Description
1
BitDefender Security for SharePoint
1. Features and BenefitsBitDefender Security for SharePoint performs on-access, real–time scanning ofuploaded and downloaded files in the document libraries and lists, with excellentcleanup rates, and an option to quarantine infected documents.
Whenever a file is uploaded or downloaded, it is immediately scanned. If theBitDefender Antivirus Scanner finds an infection, the file will be treated according tothe profile selected by the administrator. Additionally, BitDefender can be set to notifyadministrators about occurring events through mail or net send alerts.
On-Demand scanning features allow for scheduled system scans to be performedoutside of peak work hours without impacting the overall performance or availabilityof the system.
The advanced reporting and logging tools and integration with BitDefenderManagementServer further enhance the value of BitDefender Security for SharePoint, as a securitysolution for your collaboration needs.
Key Features● Deep integration with the SharePoint server to optimize and accelerate the scanningprocess
● Proactive heuristic protection against zero-day threats● Custom antivirus scanning profiles allow improved flexibility● Certified antivirus engines● Centralized management support through integration with BitDefender ManagementServer
BitDefender TechnologiesB-HAVE. BitDefender Security for SharePoint includes B-HAVE, a patent pendingtechnology which analyzes the behavior of potentially malicious codes, inside a virtualcomputer, eliminating false positives and significantly increasing detection rates fornew and unknown malware.
Certified Antivirus Engines. BitDefender's award winning scan engines featuringthe B-HAVE technology have been recognized by ICSA Labs, Virus Bulletin andCheckmark to provide the most proactive antivirus protection available.
Features and Benefits 2
BitDefender Security for SharePoint
Services● Advanced Update System
For permanent file protection, the solution receives the latest updates and patchesbased on three configurable technologies: on-demand, scheduled and automatic.
● Upgrades
Registered users benefit from free upgrades to any new version of the productduring the license period. Special price offers are also available to returningcustomers.
● Free 24/7 Professional Technical Support
Certified representatives provide BitDefender business customers with freepermanent support online, by telephone or e-mail. This is supplemented by an onlinedatabase with answers to Frequently Asked Questions and fixes for common issues.
Features and Benefits 3
BitDefender Security for SharePoint
Installation
4
BitDefender Security for SharePoint
2. System RequirementsBefore installing the product, make sure that the systemmeets the following minimumsystem requirements:
● Operating System:Microsoft Windows Server 2003 with SP1 (SP2 is recommended)
Microsoft Windows Server 2008 / Microsoft Windows Server 2008 R2
● Microsoft Office SharePoint Server 2007 or
● Microsoft Windows SharePoint Services 3.0
● Microsoft Internet Explorer version 6.0 or higher (level 1) or Mozilla Firefox version3.0 or higher (level 2)
● Minimum 1 GB of free space on the hard drive
System Requirements 5
BitDefender Security for SharePoint
3. Installing BitDefender Security for SharePointThe installation package contains other BitDefender Security for Windows Serversproducts besides BitDefender Security for SharePoint. You should install all theproducts you want to use at the same time. If you install only BitDefender Security forSharePoint, you will then need to modify the existing installation whenever otherBitDefender products are installed at a later time. As a result of this action, some filesmay need to be replaced, which may temporarily interfere with the operation of theexisting installed products.
Depending on whether or not you already have BitDefender products installed on thecomputer, there are two ways to install BitDefender Security for SharePoint:
● Fresh installation - no other product from the installation package is installed onthe computer.
● Modifying an existing installation - at least one other product from the installationpackage is already installed on the computer.
3.1. Fresh InstallationTo begin a fresh installation, locate the setup file and double-click it. A wizard willappear and you must follow its steps to complete installation.
Installing BitDefender Security for SharePoint 6
BitDefender Security for SharePoint
Installation Steps
Follow these steps to install BitDefender Security for SharePoint:
1. Click Next to continue or click Cancel if you want to quit installation.
2. Please read the License Agreement, select I accept the terms in the LicenseAgreement and click Next.
NoteIf you do not agree to these terms click Cancel. The installation process will beabandoned and you will exit setup.
3. You can see the list of all BitDefender products designed forWindows-based serversavailable in the installation package.
Installing BitDefender Security for SharePoint 7
BitDefender Security for SharePoint
Select BitDefender Security for SharePoint, click the corresponding arrow and thenclickWill be installed on local hard drive on the shortcut menu.
The default installation folder is displayed on the lower part of the window. To selecta different installation folder, click Browse, locate the folder and then click OK toset the location.
NoteYou can also install other BitDefender products for Windows-based servers. Selectthem as shown before. The items marked with a red cross will not be installed.
Click Next.4. Based on the system configuration and on the number of BitDefender products you
have chosen to install, BitDefender computes an optimal number of scanninginstances. Though not recommended, you may change this value for systems withpowerful multicore CPUs to speed up scanning.
Click Next.5. BitDefender Security for SharePoint contains an incident management module that
allows creating incident reports during product crashes. By agreeing to send theincident reports to the BitDefender Lab, you agree to help us find quick fixes forour bugs. You could make a major contribution to the development of a stableproduct that satisfies your needs. The reports will only be used for debuggingpurposes. They will never be used as commercial data or disclosed to third parties.
To send incident reports to the BitDefender Lab, select I agree to submit incidentreports to the BitDefender Lab and specify your e-mail address.
Click Next.6. If you do not want to view the readme file at the end of the installation, clear the
View Readme file check box.
BitDefender will need to start or reset the Internet Information Service during theinstallation process. You have to aknowledge this by selecting the check boxcorresponding to the information before the process can continue. Click Install inorder to begin the installation of the product.
7. Click Finish. You may be asked to restart the system so that the setup wizard cancomplete the installation process. We recommend doing so as soon as possible.
Installing BitDefender Security for SharePoint 8
BitDefender Security for SharePoint
3.2. Modifying Existing InstallationIn order to install BitDefender Security for SharePoint when one or more BitDefenderSecurity for Windows Servers products are already installed on the computer, youneed to follow these steps:
1. Follow the next path from the Windows Start Menu: Start → Programs →BitDefender Security for Windows Servers→ Modify, Repair or Uninstall.
NoteAlternatively, you can double click the BitDefender Security for Windows Serverssetup file.
A welcome window will appear, click Next to begin.
2. Select Modify.3. You have now reached Step 3 of the “Fresh Installation” (p. 6) wizard. Follow
steps 3 through 7 to complete the installation.
Installing BitDefender Security for SharePoint 9
BitDefender Security for SharePoint
4. Repairing or Removing BitDefenderIf you want to repair or remove BitDefender Security for SharePoint, follow the pathfrom the Windows start menu: Start → Programs → BitDefender Security forWindows Servers→ Modify, Repair or Uninstall.You will be requested to confirm your choice by clicking Next. A new window willappear where you can select:
● Modify - to add new BitDefender products for Windows-based servers or to removecurrently installed products.
● Repair - to re-install BitDefender Security for SharePoint.
● Remove - to remove all installed components.
Modify, Repair or Remove BitDefender
4.1. Modify BitDefenderThe BitDefender Security for SharePoint installation package is part of a bigger packagethat contains all available BitDefender Security for Windows Servers products.
If you chooseModify, a new window will appear from which you can select individualBitDefender products for installation or removal.
You should install all the products you want to use at the same time. To install aproduct, click the corresponding arrow and then select Will be installed on local
Repairing or Removing BitDefender 10
BitDefender Security for SharePoint
hard drive on the shortcut menu. To remove a product, click the corresponding arrowand then select Entire feature will be unavailable on the shortcut menu.
4.2. Repair BitDefenderIf BitDefender Security for SharePoint starts to perform unexpectedly, you can repairit in order to restore its functionality. The repair process consists in completelyre-installing the product.
If you choose Repair, a new window will appear. Click Repair to start the process.
ImportantDuring the repair process all BitDefender products installed on the computer willtemporarily cease to function.
4.3. Remove BitDefenderIf you want to uninstall all BitDefender products, choose Remove.
NoteWe recommend that you choose Remove for a clean re-installation.
If you choose to remove BitDefender, a new window will appear. Click Remove tostart unsinstalling BitDefender from your computer.
ImportantThis will remove all BitDefender Security for Windows Servers products from yourcomputer. If you have additional BitDefender products installed and only wish to removeBitDefender Security for SharePoint, please use the Modify option.
After the removal process is over, we recommend that you delete the BitDefenderfolder from Program Files.
An error occurred while removing BitDefenderIf an error has occurred while removing BitDefender, the removal process will beaborted and a new window will appear. Click Run UninstallTool to make sure thatBitDefender has been completely removed. The uninstall tool will remove all the filesand registry keys that were not removed during the automatic removal process.
Repairing or Removing BitDefender 11
BitDefender Security for SharePoint
Configuration and Management
12
BitDefender Security for SharePoint
5. Getting StartedBitDefender Security for SharePoint seamlessly integrates with Microsoft OfficeSharePoint Server 2007 . The management console provides access to all featuresand settings of BitDefender Security for SharePoint.
To open the management console, follow these steps:
1. Access the Microsoft Office SharePoint Server 2007 Central Administration page
2. On the top navigation bar, click Operations3. On the Operations page, in the BitDefender section, click BitDefender Security
for SharePoint.
NoteAlternatively, you can follow this path from theWindows start menu: Start→ Programs→ BitDefender Security for Windows Servers → BitDefender Security forSharePoint.
On the upper part of the page you can see the BitDefender menu:
● Home - displays the dashboard.
The dashboard provides you with useful information on the status of BitDefenderSecurity for SharePoint and helps you easily solve the issues that require yourattention.
● Monitoring - offers links to the following sections:Statistics - offers statistical information on the product activity.Reports - allows creating customized reports on the product activity.Alerts & Logs - allows configuring the logging options and sending alerts aboutthe events that occur during product operation, such as an update error or aninfected file detected.Quarantine - shows the quarantined files. These files were found to be infectedor suspect and were moved to the quarantine folder, according to the specifiedaction.Scheduled Tasks - allows creating scheduled tasks through an intuitive wizard.You can schedule updates, on-demand scanning processes and reports to begenerated.
● Server Scan - allows configuring BitDefender to scan the server.
● Update - allows updating BitDefender and configuring update settings.
Getting Started 13
BitDefender Security for SharePoint
● General - allows configuring BitDefender to send the BitDefender Lab reportsregarding the viruses found on the server and the incidents that occurred duringproduct operation, as well as exporting and importing product settings.
● License - allows registering BitDefender, creating a BitDefender account andaccessing a web page from where BitDefender can be purchased.
● Help - allows getting help and support and viewing version information.
Getting Started 14
BitDefender Security for SharePoint
6. DashboardTo see the dashboard, click Home in the BitDefender menu.
Dashboard
The dashboard provides you with useful information on the status of BitDefenderSecurity for SharePoint and helps you easily solve the issues that require your attention.You should check the dashboard frequently in order to quickly identify and solve theissues affecting the security of the server.
6.1. Status AreaThe Status area contains information about existing issues and helps you fix them.
Three status icons, monitoring three categories of issues, immediately inform youabout the existence of specific issues:
● Server Scan● Update Status● License Status
Dashboard 15
BitDefender Security for SharePoint
NoteThe License Status icon and the related issues are not available if BitDefender Securityfor SharePoint is managed by BitDefender Management Server.
To the left of the status icons you can see the number of issues affecting the securityof the server, if any.
The status icons can be green, orange or red, depending on the existing issues thataffect the security of the server:
● Green indicates that no issue requires your attention.● Orange indicates the existence of issues that pose medium security risks. Theseissues do not require your immediate attention, but you should check them as soonas possible.
● Red indicates the existence of critical security issues, which require your immediateattention.
Details about these issues, are displayed in the Issue Details section.
The Issue Details section contains three tables, one for each category. Each tabledisplays the monitored items and their current status. When there is an issueconcerning one of the monitored items, a red FIX link is displayed. To quickly solvethe existing issues, click the FIX links, one by one, or the Fix all issues button.
ImportantFor every monitored item, there is a check box selected by default in the Monitorcolumn. If you do not want a specific item to be monitored, just clear the correspondingcheck box.
6.1.1. Server ScanIf the Server Scan icon is orange or red, there are issues affecting the scanning activityof BitDefender Security for SharePoint.
Check the Server scan table to see the current status of Real-time protection.The issues that can be reported are listed in the following table:
DescriptionStatusReal-time protection is disabled and the server is notprotected against malware.
Scan files is off
Click Fix to enable real-time protection.
Dashboard 16
BitDefender Security for SharePoint
DescriptionStatusReal-time protection is enabled, but scanning files onupload and/or download has been disabled from theMicrosoft SharePoint antivirus settings page.
Scan files on upload /download is off
Click Fix to enable scaning files on upload anddownload.This feature has been disabled from the MicrosoftSharePoint antivirus settings page. Click Fix to enableit.
Attempt to clean infecteddocuments is off
The licensing period has expired. Click Fix to open theregistration page where you can register BitDefenderSecurity for SharePoint with a new license key.
Registration has expired
6.1.2. Update StatusIf the Update Status icon is orange or red, there are update issues affecting BitDefenderSecurity for SharePoint.
Check the Update Status table to see the monitored items and their current status.
● Last signature update status. The issues that can be reported are listed in thefollowing table:
DescriptionStatusContacting one or both update locations was notpossible during the last signature and/or productupdate process.
At least one updatelocation failed (AV UpdateLocation / Product UpdateLocation) Click Fix to initiate a new update.
Click Fix to initiate a new update. The status willchange to Updating (%percent).
No update was performed
You need to go to Update > Locations and select theAllow unsigned updates check box for your server.
Update failed because theupdates on your serverare not signed, and youchose not to allowunsigned updates
Dashboard 17
BitDefender Security for SharePoint
● Last product update. The issues that can be reported are listed in the followingtable:
DescriptionStatusAutomatic product updates are disabled, making youserver more vulnerable to security threats. Click Fixto enable automatic product updates.
Automatic productupdates are disabled
The new kit may come with new features andfunctionalities.
A new kit is available andit is not installed on yoursystem Click Fix to download and install the kit. You will have
to confirm your choice by clicking OK. Installing thekit might require a server reboot.A product update has been downloaded but is not yetinstalled.
Product updatedownloaded, please installit Click Fix to install the update.
● Signature updates older than one day status. The issues that can be reportedare listed in the following table:
DescriptionStatusMore than one day passed since the last update.Updates are oldClick Fix to initiate a new update. The status willchange to Updating (%percent).
● Automatic update status. The issues that can be reported are listed in the followingtable:
DescriptionStatusBitDefender Security for SharePoint is notautomatically updated on a regular basis.
Automatic update is offand no scheduled updatetask is defined and on Click Fix to enable automatic update. If not already
configured, the update interval is set to one hour.
Dashboard 18
BitDefender Security for SharePoint
6.1.3. License StatusIf the License Status icon is orange or red, there are issues concerning the license ofyour BitDefender Security for SharePoint.
NoteThe License Status button and the related issues are not available if BitDefender Securityfor SharePoint is managed by BitDefender Management Server. In this case, theregistration procedure is performed from the management console of BitDefenderManagement Server.
Check the License Status table to see the monitored items and their current status.
● Registration status. The issues that can be reported are listed in the followingtable:
DescriptionStatusThis status is displayed during the trial period. ClickFix to open the registration page where you can
You are using a trialversion of the product andyou should register it register BitDefender Security for SharePoint with a
new license key.You have entered an invalid license key. Click Fix toopen the registration page where you can register
The serial number youintroduced is not valid
BitDefender Security for SharePoint with a new licensekey.This status is displayed during the last 30 days of thelicensing period. Click Fix to open the registration
Your product registrationwill expire in x days. You
page where you can register BitDefender Security forSharePoint with a new license key.
should renew yourregistration
The licensing period has expired. Click Fix to openthe registration page where you can register
Product registrationexpired
BitDefender Security for SharePoint with a new licensekey.
● My account status. The issues that can be reported are listed in the followingtable:
Dashboard 19
BitDefender Security for SharePoint
DescriptionStatusYou have not registered an account yet. Click Fix toopen the My Account page where you can create anew account or log in to an existing one.
You do not have anaccount. Please create anaccount
Click Fix to open the My Account page where youcan create a new account or log in to an existing one.
The password youintroduced is incorrect.Please try again
Click Fix to open the My Account page where youcan create a new account or log in to an existing one.
Account locked
A connection with the BitDefender server could notbe established. Click Fix to open theMy Account pageand try again later.
Server error! Please tryagain later
● Registration will expire alert. The status of this item can change as shown in thefollowing table:
DescriptionStatusThis status is displayed during the last 30 days of thelicensing period. Click Fix to open the registration
You have x daysremaining from yourlicense key wizard and register BitDefender Security for
SharePoint with a new license key.The licensing period has expired.Product is expiredClick Fix to open the registration wizard and registerBitDefender Security for SharePoint with a new licensekey.
6.2. Product StatusThe information regarding the product status is displayed in theProduct status section.You can see the name of the server BitDefender Security for SharePoint is installedon, as well as the product version and the number of available malware signatures.
Dashboard 20
BitDefender Security for SharePoint
7. MonitoringTheMonitoring menu provides you with all the necessary means to monitor and controlthe product activity. The following sections are grouped under Monitoring:
● Statistics - offers statistical information on the product activity.
● Reports - allows creating customized reports on the product activity.
● Alerts & Logs - allows configuring the logging options and sending alerts about theevents that occur during product operation, such as an update error or an infectedfile detected.
● Quarantine - shows the quarantined files. These files were found to be infected orsuspect and were moved to the quarantine folder, according to the specified action.
● Scheduled Tasks - allows creating scheduled tasks through an intuitive wizard. Youcan schedule updates, on-demand scanning processes and reports to be generated.
In this chapter, you can find a detailed description of each section.
Monitoring 21
BitDefender Security for SharePoint
7.1. StatisticsIf you want to see detailed statistics regarding the real-time scanning activity ofBitDefender Security for SharePoint, go to Statistics under Monitoring in theBitDefender menu.
Statistics
BitDefender stores data about the objects scanned in real time in a database. Usingthis database, BitDefender offers detailed statistics that allow you to assess:
● the security status of the SharePoint server.
● the existing threats and their damage potential.
The following types of statistics are available:
DescriptionTypeProvides overall statistics on the real-time scanning activity ofBitDefender Security for SharePoint:
Summary
● number of scanned items.
Monitoring 22
BitDefender Security for SharePoint
DescriptionType● number of items found infected / suspicious / clean.● number of items that could not be scanned.● number of viruses detected.● number of riskware detected, as a total and by riskware type.● number of solved issues, as a total and by action type.
A pie chart displays the percentage of infected, suspicious, notscannable and clean files representing the total number ofscanned files.Shows the top 10 malware detected. These statistics areavailable on the lower part of the page.
Top Malware
The statistics are grouped into 4 time intervals: today, last week, last month and total.Click a link to access the corresponding statistics.
NoteThe statistics are refreshed every 60 seconds in order to provide you with real-timeinformation.
7.1.1. Clearing StatisticsBy default, BitDefender automatically clears statistical information older than oneweek. To change the time period for which statistics are to be stored, go to the PurgeOptions tab on the Statistics page.
Type in the edit box how many days / weeks / months statistical information shouldbe stored and click Apply to save the changes.
To clear statistics manually, select Delete all statistics now and click Apply.
NoteReports and statistics are created using the same database. Clearing statistics will alsoaffect the accuracy of the reports.
7.2. ReportsBitDefender allows creating reports regarding its scanning activity conducted over acertain period of time. You may find reports very useful, as you can print them or sendthem to other people interested in the security status of the server.
Monitoring 23
BitDefender Security for SharePoint
Reports can be generated in HTML, text or comma-separated values (CSV) format.You can create the following types of reports:
DescriptionReport TypeProvides complete information on the threats detected duringa specific time period.
Antivirus Total
Provides a table containing the threats detected during a specifictime period, ordered by number of files infected.
Top Viruses
The reports are saved in ?:\Program Files\BitDefender\BitDefenderSecurity for SharePoint\Reports\.
NoteReports are created based on the information in the BitDefender database, which is bydefault deleted every week. If the records were deleted sometime during the time periodcovered by the report, then the report will provide inaccurate information.
To create, view and manage reports, go to Reports under Monitoring.
ImportantIn the Reports section you can also find the on-demand scan reports.
Monitoring 24
BitDefender Security for SharePoint
Reports
All existing reports are listed in the table. For each report, the following information isprovided: the report name, the date when the report was generated, the type ofinformation it contains and the format.
7.2.1. Managing ReportsTo manage the reports, use the provided buttons:
● New Report - launches a wizard that will help you create a new report.
● Delete - deletes one or several selected reports.
● View Report - opens a selected report.
7.2.2. Creating ReportsTo create reports on the product activity, click New Report and follow the wizard thatwill appear.
Monitoring 25
BitDefender Security for SharePoint
Step 1/5 - Welcome to the Report Wizard.
Welcome
Click Next to continue.
Step 2/5 - Select Report Type
Select Report Type
Select one of the report types available.
DescriptionReport TypeProvides complete information on the threats detected duringa specific time period.
Antivirus Total
Monitoring 26
BitDefender Security for SharePoint
DescriptionReport TypeProvides a table containing the threats detected during a specifictime period, ordered by number of files infected.
Top Viruses
Click Next.
Step 3/5 - Select Report Format
Select Report Format
Select the format of the report file (HTML, text or CSV). Depending on your selection,the report will be created as an HTML, text or comma-separated values (CSV) file.
Click Next.
Monitoring 27
BitDefender Security for SharePoint
Step 4/5 - Select Time Interval
Select Time Interval
Select the time interval covered in the report:
● Last day● Last week● Last month● Custom
If you need information about the BitDefender activity related to a specific time interval,select Custom and specify the start and end date. To specify the start and stop dates,either type new values in the date fields or click the calendar icon and select datesfrom the calendar.
NoteThe date format is month/day/year.
Only the records from the specified period will appear in the report.
Click Next.
Monitoring 28
BitDefender Security for SharePoint
Step 5/5 - View Summary
View Summary
This window displays the selected report settings. You can make any changes byreturning to the previous steps. To do this, either click Back to go to the previous stepor select any step from the left-hand side of the window.
Click Finish to generate the report. The report will appear in the Reports section.
7.2.3. Clearing ReportsTo change the time period for which reports are to be stored, go to the Purge Optionstab on the Reports page. Enter the number of hours / days / weeks / months duringwhich to store reports and click Apply to save the changes.
To clear reports manually, select Delete all reports now and click Apply.
NoteReports older than the specified period will be automatically deleted.
Monitoring 29
BitDefender Security for SharePoint
7.3. Alerts & LogsThe Alerts & Logs page is where you can configure the BitDefender notificationsystem.
BitDefender is by default configured to keep a log of its activity. The BitDefender logprovides you with a comprehensive list of the events that occured during productoperation. To configure logging or view the log files, go to the Logs tab.
Moreover, you can configure BitDefender to immediately alert designated people aboutthe occurrence of certain events during product operation. Alerts can be sent throughmail or using the net send command. You can completely disable notifications foreach event or you can configure BitDefender to send mail and net send alerts whenthe event occurs. To configure alerts for each event, go to the Alerts tab.
NoteWindows Server 2008 does not provide support for net send alerts.
To configure the settings of the mail and net send alert notification services, go to theSettings tab
7.3.1. LogsBitDefender is by default configured to keep a log of its activity. The BitDefender logprovides you with a comprehensive list of the events that occured during productoperation.
NoteBy de fau l t , t he l og f i l e i s saved in : ?:\ProgramFiles\BitDefender\BitDefender for Windows ServersServices\BDLog.
To configure logging and view the log files, go to Alerts & Logs under Monitoring inthe BitDefender menu.
Monitoring 30
BitDefender Security for SharePoint
Logs
Examining LogsClick View last log to open the last log file.
Configuring LoggingTo log the product activity to a file, select Enable file logging.BitDefender creates the log file in?:\Program Files\BitDefender\BitDefenderfor Windows Servers Services\BDLog. By default, when the file reaches thesize limit of 1024 KB, a new log file is created.
Specify the size limit of the log files in the Maximum log size field. If you do not wantto limit the size of the log file, enter 0 in the edit field.
You can specify a different folder where files should be saved by providing its path inthe corresponding field.
Click Save to apply the changes.
Monitoring 31
BitDefender Security for SharePoint
7.3.2. AlertsYou can completely disable notifications for each event or you can configureBitDefender to send mail and net send alerts when the event occurs.
To specify the notification methods for each event, go to Alerts & Logs underMonitoring in the BitDefender menu and then the Alerts tab.
Alerts
All of the events that may occur are listed in the table. There are 3 types of events:
● Information - such events provide information about the product activity.
● Warning - such events provide critical information about aspects of the productactivity which require your attention.
● Error - such events provide information about errors that appear during productoperation.
Here is the list of the events that may appear:
Monitoring 32
BitDefender Security for SharePoint
DescriptionEventGroups all the errors that may appear duringproduct operation, such as service start failure.
BitDefender Error
Refers to the occurrence of an error during theupdate process.
Update Error
Occurs when an infected file or a file suspectedof being infected has been detected.
Infected/suspect file detected
Groups critical information regarding the activityof BitDefender.
BitDefender Warning
Occurs when a file could not be scanned byBitDefender.
File not scanned
Occurs when a product update is available.Product updateGroups information regarding the activity ofBitDefender.
BitDefender information
Indicates the expiration of the registration period.Key expiredIndicates that there are 3 days left before theproduct expires.
Key will expire
Occurs whenever an on-demand scan isperformed.
On-demand scanning
Contains information about the update process.Update informationOccurs whenever a report is generated.Report generated
Configuring EventsYou can configure the notification methods separately for each event in the list. Tocustomize the notifications for a specific event, select it and edit the available optionsfrom the Events settings section on the right-hand side of the page.
Enable/disable notificationsTo enable/disable notifications for one or several selected events, select/clear thecorresponding check box.
NoteIf event notification is disabled, the event is not logged and no alert is sent when it takesplace.
Monitoring 33
BitDefender Security for SharePoint
Select Event ImportanceSet the importance of the event from the Notification Settings section:
● Low - a record of the event is kept in the log file. No alert is sent when the eventtakes place.
● Medium - log the event and send mail alerts when the event takes place.
● High - log the event and send both mail and net send alerts when the event takesplace.
Configure Mail AlertsIf the importance of the event is medium or high, mail alerts will be sent. You can editthe alert text and specify the alert recipients.
Click Save to apply the changes.
● Each event comes with a default alert text which is displayed in the SMTP alertText box. To change this text, edit the contents of the text box.
ImportantYou should NOT modify the strings that begin with the $ symbol as they providevaluable information about the event.
● Alerts are sent by default to the addresses defined in the Settings tab. Provideadditional e-mail addresses in the SMTP recipients box to add recipients to thelist. Addresses must be separated by comma (",") or semicolon (";").
To import e-mail addresses from a txt file, click Import..., select the file and thenclickOpen. If you want to export the list to a txt file, click Export..., select a locationand click Save.
Configure Net Send AlertsIf the importance of the event is high, net send alerts will be sent. You can edit thealert text and specify the alert recipients.
● Each event comes with a default alert text which is displayed in the NetSend alertText box. To change this text, edit the contents of the text box.
ImportantYou should NOT modify the strings that begin with the $ symbol as they providevaluable information about the event.
Monitoring 34
BitDefender Security for SharePoint
● Alerts are sent by default to the computer names defined in the Settings tab. Provideadditional computer names in the NetSend recipients box to add recipients to thelist. Computer names must be separated by comma (",") or semicolon (";").
To import computer names from a txt file, click Import..., select the file and thenclickOpen. If you want to export the list to a txt file, click Export..., select a locationand click Save.
Click Save to apply the changes.
Monitoring 35
BitDefender Security for SharePoint
7.3.3. Alert SettingsAlerts are messages that include product-related information and which are meant toinform their recipients about the product activity. BitDefender can be set to notify usersand administrators about occurring events through mail or net send alerts.
To configure the alert notification services, go to Alerts & Logs under Monitoring inthe BitDefender menu and then the Settings tab.
Alert Settings
Mail AlertsBitDefender can notify the network administrator by sending configurable mail alertsin case an event for which they have been set takes place. Enabling this alert willprovide you with relevant and timely information about the status of your server, andmay eliminate the need to access the BitDefender management console.
NoteThis module integrates with an SMTP Server. It works with an ESMTP server as well,but it does not use the ESMTP protocol because it is implemented on SMTP.
In order to use the mail notification service, follow these steps:
Monitoring 36
BitDefender Security for SharePoint
1. Select Enable Mail Notification to activate the mail notification service
2. Configure the SMTP settings:
● SMTP Server - enter the IP address of the SMTP server that your network usesto send messages.
● From - enter the e-mail address that will appear in the sender field.
ImportantProvide a valid e-mail address for the SMTP server, otherwise the server maydecline to send an e-mail whose sender (e-mail address) is unknown to it.
3. If the SMTP server used to send messages requires authentication, select UseSMTP Server Authentication and enter the user name and password in thecorresponding fields.
NoteNTLM authentication is not supported.
4. Indicate the recipients of the mail alerts by entering their e-mail addresses in theGlobal SMTP Recievers text box. To remove e-mail addresses from the list, deletethem from the text box.
To import e-mail addresses from a txt file, click Import..., select the file and thenclick Open.If you want to export the list to a txt file, click Export... and save the file to thedesired location.
NoteThe recipients specified here will be alerted upon the occurrence of an event forwhich this type of alert has been set. To specify different recipients for each event,go to the Alerts tab and configure the events. For more information, please refer to“Configuring Events” (p. 33).
5. Click Save to apply the changes.
To disable this service, clear the Enable Mail Notification check box and click Save.
Monitoring 37
BitDefender Security for SharePoint
Net Send AlertsBitDefender can notify the network administrator by sending configurable alerts throughthe net send command upon the occurrence of an event for which they have beenset.
NoteThis module integrates with the Net Send command of the Windows Operating Systemon which the product is installed and it provides alerts regarding the product activity. Inorder to receive such alerts, the Messenger and Alert services must be enabled by theadministrator on the server and on the client workstations.
In order to use the net send notification service, follow these steps:
1. Select Enable Net Send to activate the net send notification service.
2. Indicate the recipients of the net send alerts by entering their computer names inthe Global NetSend Recievers text box. To remove recipients from the list, deletetheir computer names from the text box.
To import computer names from a txt file, click Import..., select the file and thenclick Open.If you want to export the list to a txt file, click Export... and save the file to thedesired location.
NoteThe recipients specified here will be alerted upon the occurrence of an event forwhich this type of alert has been set. To specify different recipients for each event,go to the Alerts tab and configure the events. For more information, please refer to“Configuring Events” (p. 33).
3. Click Save to apply the changes.
To disable this service, clear the Enable Net Send check box and click Save.
ImportantIn case of a virus outbreak it is not advisable to use this type of alert.
Monitoring 38
BitDefender Security for SharePoint
7.4. QuarantineBitDefender allows isolating infected or suspicious files in a secure area, namedquarantine. By isolating these files, the risk of getting infected disappears.
ImportantThe quarantine folder is common for both on-access and on-demand scanning.
To see the quarantined files and manage them, go to Quarantine under Monitoringin the BitDefender menu.
Quarantine
You can see the quarantined files listed in the table. For each quarantined file, thefollowing information is provided: the file name, the original location, the virus nameand the date when it was quarantined.
7.4.1. Managing QuarantineTo manage the quarantined files, use the provided buttons:
● Select all - select all quarantined items
Monitoring 39
BitDefender Security for SharePoint
● Delete - delete the selected quarantined files
● Restore - decrypt selected quarantined files and save them to a location selectedfrom the drop-down list:
disk location - select this option to restore the selected files on a location on thehard drive
web application location - select this option to restore the selected files to aweb application location
initial location - select this option to restore the selected files to their originallocation
Click to browse for a location.
This way you can open or execute quarantined files.
7.4.2. Clearing QuarantineBy default, quarantined files older than one week are automatically deleted. To changethe time period for which files are stored in the quarantine, go to the Purge Optionstab on the Quarantine page.
Purge Options
Monitoring 40
BitDefender Security for SharePoint
Type the number of days / weeks / months in the corresponding field.
To clear the quarantine manually, select Delete all items in quarantine now.Click Apply to save the changes
Monitoring 41
BitDefender Security for SharePoint
7.5. Scheduled TasksScheduled tasks provide great flexibility and help perform administrative security taskswithout increasing the workload and affecting the performance of the SharePointserver. You can set BitDefender to perform specific tasks one-time only or on a regularbasis according to a convenient schedule. You can schedule the following tasks:
● on-demand scanning processes.● update processes.● report generation tasks.
To create or configure scheduled tasks, go to Scheduled Tasks under Monitoringin the BitDefender menu.
Scheduled Tasks
You can see all the existing scheduled tasks listed in the table. For each task, thefollowing information is provided: the task type and name, the last time when it wasperformed, the next time it is scheduled to run and the status.
7.5.1. Managing Scheduled TasksTo manage the scheduled tasks, use these buttons:
Monitoring 42
BitDefender Security for SharePoint
● Run now - runs a selected scheduled task.● Enable/Disable - enables/disables one or several selected scheduled tasks.● New Task - launches a wizard that will help you create a new scheduled task.
NoteThe configuration wizard is different for each type of scheduled task.
● View Task - opens the configuration wizard for a selected scheduled task, allowingyou to modify it and to configure more advanced settings.
● Stop Task - stops the task that is currently running.● Delete - deletes one or several selected scheduled tasks. You will have to confirmyour choice by clicking Yes.
7.5.2. On-demand Scanning TasksScheduling Tasks
To create a new scheduled task, click New task. The configuration wizard will appearand it will guide you through the process of creating a scheduled task.
Follow these steps to schedule an on-demand scanning task:
Step 1/5 - Welcome to the Scheduled Tasks Wizard
Welcome
Click Next.
Monitoring 43
BitDefender Security for SharePoint
Step 2/5 - Select Task Type
Select Task Type
Provide the task name and then select On-demand Scanning Task.Click Next.
Step 3/5 - Configure Schedule
Configure the Task Schedule
Specify the task schedule.
You must choose one of the following options from the menu:
Monitoring 44
BitDefender Security for SharePoint
● Once - to run the task one time only, at a given moment.
Specify the start date and time in the Start Date / Start Time fields.
● Periodically - to run the task periodically, at certain time intervals (minutes, hours,days, weeks, months, years), starting with a specified date and time.
To configure the necessary settings, follow these steps:
1. Specify the start date in the Start Date field.
2. If you want to run the task repeatedly until a certain date, check End Date andspecify the end date in the corresponding field.
3. Specify the start time in the Start Time field.
4. Specify the task frequency by specifying the number of minutes / hours / days /weeks / months / years between two successive occurrences of such task, in thecorresponding field.
● Week Days - to run the task repeatedly only in certain days of the week startingwith a specified date and time.
To configure the necessary settings, follow these steps:
1. Specify the start date in the Start Date field.
2. If you want to run the task repeatedly until a certain date, check End Date andspecify the end date in corresponding field.
3. Specify the start time in the Start Time field.
4. Specify the day or days of the week on which the task should be run.
Click Next.
Monitoring 45
BitDefender Security for SharePoint
Step 4/5 - Select Scan Profile
Select Scan Profile
You can use one of the following scan profiles:
DescriptionScan ProfileThe SharePoint server is scanned for all types of malware.Packed files and archives are included in the scan. The
High
maximum archive depth scanned is 16. Please note thatonly files under 100 megabytes (MB) in size are scanned.Allows performing a quick scan of the server. Files arescanned for spyware and adware and the maximum archive
Low
depth scanned is 8. Only files under 50 megabytes (MB) insize are scanned.
Click Next.
Monitoring 46
BitDefender Security for SharePoint
Step 5/5 - View Summary
View Summary
This window displays the task settings. You can make any changes by returning tothe previous steps. To do this, either click Back to go to the previous step or selectany step from the left-hand side of the window.
Click Finish to save the scheduled task.
NoteThe task will appear on the Scheduled Tasks page.
Configuring PropertiesIn order to modify an existing scheduled task, select it and click View Task.The configuration wizard will appear. Select any step from the left-hand side of thewindow or click Next to follow the wizard step by step.
1. Welcome - the welcome screen.
2. Select Task Type - edit the name of the task.
3. Schedule Settings - modify the task schedule.
Specify the task schedule.
You must choose one of the following options from the menu:
● Once - to run the task one time only, at a given moment.
Monitoring 47
BitDefender Security for SharePoint
Specify the start date and time in the Start Date / Start Time fields.
● Periodically - to run the task periodically, at certain time intervals (minutes,hours, days, weeks, months, years), starting with a specified date and time.
To configure the necessary settings, follow these steps:
a. Specify the start date in the Start Date field.
b. If you want to run the task repeatedly until a certain date, check End Date andspecify the end date in the corresponding field.
c. Specify the start time in the Start Time field.
d. Specify the task frequency by specifying the number of minutes / hours / days/ weeks / months / years between two successive occurrences of such task,in the corresponding field.
● Week Days - to run the task repeatedly only in certain days of the week startingwith a specified date and time.
To configure the necessary settings, follow these steps:
a. Specify the start date in the Start Date field.
b. If you want to run the task repeatedly until a certain date, check End Date andspecify the end date in corresponding field.
c. Specify the start time in the Start Time field.
d. Specify the day or days of the week on which the task should be run.
4. Select Scanning Options - select one of the following scanning profiles:
DescriptionScan ProfileThe SharePoint server is scanned for all types ofmalware. Packed files and archives are included in the
High
scan. Themaximum archive depth scanned is 16. Pleasenote that only files under 100 megabytes (MB) in sizeare scanned.Allows performing a quick scan of the server. Files arescanned for spyware and adware and the maximum
Low
archive depth scanned is 8. Only files under 50megabytes (MB) in size are scanned.
Monitoring 48
BitDefender Security for SharePoint
5. Summary - displays the task settings. When you are done configuring the taskproperties, go to Summary and click Finish to save the settings. If you want toclose the configuration window without making any changes, click Cancel.
7.5.3. Update TasksScheduling Tasks
To create a new scheduled task, click New task. The configuration wizard will appearand it will guide you through the process of creating a scheduled task.
NoteThe scheduled update tasks will not deactivate the automatic update.
Follow these steps to schedule an update task:
Step 1/4 - Welcome to the Scheduled Tasks Wizard
Welcome
Click Next.
Monitoring 49
BitDefender Security for SharePoint
Step 2/4 - Select Task Type
Select Task Type
Provide the task name and then select Update Task.Click Next.
Step 3/4 - Configure Schedule
Configure the Task Schedule
Specify the task schedule.
You must choose one of the following options from the menu:
Monitoring 50
BitDefender Security for SharePoint
● Once - to run the task one time only, at a given moment.
Specify the start date and time in the Start Date / Start Time fields.
● Periodically - to run the task periodically, at certain time intervals (minutes, hours,days, weeks, months, years), starting with a specified date and time.
To configure the necessary settings, follow these steps:
1. Specify the start date in the Start Date field.
2. If you want to run the task repeatedly until a certain date, check End Date andspecify the end date in the corresponding field.
3. Specify the start time in the Start Time field.
4. Specify the task frequency by specifying the number of minutes / hours / days /weeks / months / years between two successive occurrences of such task, in thecorresponding field.
● Week Days - to run the task repeatedly only in certain days of the week startingwith a specified date and time.
To configure the necessary settings, follow these steps:
1. Specify the start date in the Start Date field.
2. If you want to run the task repeatedly until a certain date, check End Date andspecify the end date in corresponding field.
3. Specify the start time in the Start Time field.
4. Specify the day or days of the week on which the task should be run.
Click Next.
Monitoring 51
BitDefender Security for SharePoint
Step 4/4 - View Summary
View Summary
This window displays the task settings. You can make any changes by returning tothe previous steps. To do this, either click Back to go to the previous step or selectany step from the left-hand side of the window.
Click Finish to save the scheduled task.
NoteThe task will appear in the Scheduled Tasks section.
Configuring PropertiesIn order to modify an existing scheduled task, select it and click View Task.The configuration wizard will appear. Select any step from the left-hand side of thewindow or click Next to follow the wizard step by step.
1. Welcome - the welcome screen.
2. Select Task Type - edit the name of the task.
3. Schedule Settings - modify the task schedule.
Specify the task schedule.
You must choose one of the following options from the menu:
● Once - to run the task one time only, at a given moment.
Monitoring 52
BitDefender Security for SharePoint
Specify the start date and time in the Start Date / Start Time fields.
● Periodically - to run the task periodically, at certain time intervals (minutes,hours, days, weeks, months, years), starting with a specified date and time.
To configure the necessary settings, follow these steps:
a. Specify the start date in the Start Date field.
b. If you want to run the task repeatedly until a certain date, check End Date andspecify the end date in the corresponding field.
c. Specify the start time in the Start Time field.
d. Specify the task frequency by specifying the number of minutes / hours / days/ weeks / months / years between two successive occurrences of such task,in the corresponding field.
● Week Days - to run the task repeatedly only in certain days of the week startingwith a specified date and time.
To configure the necessary settings, follow these steps:
a. Specify the start date in the Start Date field.
b. If you want to run the task repeatedly until a certain date, check End Date andspecify the end date in corresponding field.
c. Specify the start time in the Start Time field.
d. Specify the day or days of the week on which the task should be run.
4. Summary - displays the task settings. When you are done configuring the taskproperties, go to Summary and click Finish to save the settings. If you want toclose the configuration window without making any changes, click Cancel.
7.5.4. Report Generation TasksScheduling Tasks
To create a new scheduled task, click New task. The configuration wizard will appearand it will guide you through the process of creating a scheduled task.
Follow these steps to schedule a report generation task:
Monitoring 53
BitDefender Security for SharePoint
Step 1/7 - Welcome to the Scheduled Tasks Wizard
Welcome
Click Next.
Step 2/7 - Select Task Type
Select Task Type
Provide the task name and then select Generate Report Task.Click Next.
Monitoring 54
BitDefender Security for SharePoint
Step 3/7 - Configure Schedule
Configure the Task Schedule
Specify the task schedule.
You must choose one of the following options from the menu:
● Once - to run the task one time only, at a given moment.
Specify the start date and time in the Start Date / Start Time fields.
● Periodically - to run the task periodically, at certain time intervals (minutes, hours,days, weeks, months, years), starting with a specified date and time.
To configure the necessary settings, follow these steps:
1. Specify the start date in the Start Date field.
2. If you want to run the task repeatedly until a certain date, check End Date andspecify the end date in the corresponding field.
3. Specify the start time in the Start Time field.
4. Specify the task frequency by specifying the number of minutes / hours / days /weeks / months / years between two successive occurrences of such task, in thecorresponding field.
● Week Days - to run the task repeatedly only in certain days of the week startingwith a specified date and time.
To configure the necessary settings, follow these steps:
1. Specify the start date in the Start Date field.
Monitoring 55
BitDefender Security for SharePoint
2. If you want to run the task repeatedly until a certain date, check End Date andspecify the end date in corresponding field.
3. Specify the start time in the Start Time field.
4. Specify the day or days of the week on which the task should be run.
Click Next.
Step 4/7 - Select Report Type
Select Report Type
Select one of the report types available.
DescriptionReport TypeProvides complete information on the threats detected duringa specific time period.
Antivirus Total
Provides a table containing the threats detected during a specifictime period, ordered by number of files infected.
Top Viruses
Click Next.
Monitoring 56
BitDefender Security for SharePoint
Step 5/7 - Select Report Format
Select Report Format
Select the format of the report file (HTML, text or CSV). Depending on your selection,the report will be created as an HTML, text or comma-separated values (CSV) file.
Click Next.
Step 6/7 - Select Time Interval
Select Time Interval
Select the time interval covered in the report:
Monitoring 57
BitDefender Security for SharePoint
● Last day● Last week● Last month● Custom
If you need information about the BitDefender activity related to a specific time interval,select Custom and specify the start and end date. To specify the start and stop dates,either type new values in the date fields or click the calendar icon and select datesfrom the calendar.
NoteThe date format is month/day/year.
Only the records from the specified period will appear in the report.
Click Next.
Step 7/7 - View Summary
View Summary
This window displays the task settings. You can make any changes by returning tothe previous steps. To do this, either click Back to go to the previous step or selectany step from the left-hand side of the window.
Click Finish to save the scheduled task.
Monitoring 58
BitDefender Security for SharePoint
NoteThe task will appear in the Scheduled Tasks section.
Configuring PropertiesIn order to modify an existing scheduled task, select it and click View Task.The configuration wizard will appear. Select any step from the left-hand side of thewindow or click Next to follow the wizard step by step.
1. Welcome - the welcome screen.
2. Select Task Type - edit the name of the task.
3. Schedule Settings - modify the task schedule.
Specify the task schedule.
You must choose one of the following options from the menu:
● Once - to run the task one time only, at a given moment.
Specify the start date and time in the Start Date / Start Time fields.
● Periodically - to run the task periodically, at certain time intervals (minutes,hours, days, weeks, months, years), starting with a specified date and time.
To configure the necessary settings, follow these steps:
a. Specify the start date in the Start Date field.
b. If you want to run the task repeatedly until a certain date, check End Date andspecify the end date in the corresponding field.
c. Specify the start time in the Start Time field.
d. Specify the task frequency by specifying the number of minutes / hours / days/ weeks / months / years between two successive occurrences of such task,in the corresponding field.
● Week Days - to run the task repeatedly only in certain days of the week startingwith a specified date and time.
To configure the necessary settings, follow these steps:
a. Specify the start date in the Start Date field.
b. If you want to run the task repeatedly until a certain date, check End Date andspecify the end date in corresponding field.
c. Specify the start time in the Start Time field.
Monitoring 59
BitDefender Security for SharePoint
d. Specify the day or days of the week on which the task should be run.
4. Select Report Type - select one of the following report types:
DescriptionReport TypeProvides complete information on the threats detected duringa specific time period.
Antivirus Total
Provides a table containing the threats detected during aspecific time period, ordered by number of files infected.
Top Viruses
5. Select Report Format - select the format of the report files: HTML, text or CSV6. Select Report Time Interval - select the time interval covered by the report:
● Last day● Last week● Last month● CustomIf you need information about the BitDefender activity related to a specific timeinterval, select Custom and specify the start and end date. To specify the start andstop dates, either type new values in the date fields or click the calendar iconand select dates from the calendar.
NoteThe date format is month/day/year.
Only the records from the specified period will appear in the report.
7. Summary - displays the task settings. When you are done configuring the taskproperties, go to Summary and click Finish to save the settings. If you want toclose the configuration window without making any changes, click Cancel.
Monitoring 60
BitDefender Security for SharePoint
8. Server ScanServer Scan allows configuring the way in which BitDefender scans the server.
BitDefender Security for SharePoint offers protection against various kinds of malware,such as viruses, spyware, adware, rootkits and so on. The product offers two layersof protection:
● On-access scanning - prevents users from downloading or uploading infected filesand thus causing the infection to spread. BitDefender scans files as they aredownloaded and uploaded according to the current protection level settings. Theactions to be taken on the infected and suspect files detected also depend on thecurrent protection level.
By default, on-access protection is set to the Medium level, which providesreasonable detection efficiency with low use of system resources. BitDefender isconfigured to disinfect infected files, deny access if disinfection fails and to denyaccess to suspect files. To customize on-access scanning, go toOn-access Scannerunder Server scan in the BitDefender menu.
NoteOn-access scanning is also referred to as real-time protection - files are scanned asthe users access them.
● On-demand scanning - allows detecting and removing the malware that alreadyresides on the server. This is the classic scan initiated by the administrator - youchoose what libraries, folders or files BitDefender should scan, and BitDefenderscans them.
To configure and initiate on-demand scanning, go to On-demand Scanner underServer scan in the BitDefender menu. There are several scan modes that you canrun. Use the custom mode to fully configure the scanning settings and the scantarget.
You can schedule on-demand scanning tasks to run at a specific time or on a regularbasis. To learn more, please refer to “Scheduled Tasks” (p. 42).
Server Scan 61
BitDefender Security for SharePoint
8.1. On-access ScanningThe on-access scanner keeps the server safe from new viruses, spyware and riskware.It also prevents users from downloading or uploading infected files and thus causingthe infection to spread throughout the network.
BitDefender scans files as they are uploaded or downloaded according to the currentscanning profile. The actions to be taken on the infected and suspect files detectedalso depend on the current protection level.
To configure the on-access scanner, go to On-access Scanner under Server scanin the BitDefender menu.
On-access Scanner
On-access scanning is enabled by default. If you want to disable it, clear the EnableBitDefender Security for SharePoint on-access scanner check box and click Save.
ImportantKeep on-access scanning enabled in order to protect the SharePoint server and theworkstations that use its resources against viruses, spyware and other malware.
Server Scan 62
BitDefender Security for SharePoint
8.1.1. Configuring Microsoft SharePoint Antivirus SettingsMicrosoft Office SharePoint Server 2007 allows you to configure general settings forvirus scanning from its Antivirus page.
You can access this page by clicking Configure Microsoft SharePoint AntivirusSettings on the BitDefender On-access scanner page.
The following settings can be configured:
● Antivirus Settings - select the options you want to enable:
Scan documents on upload
Scan documents on download
Allow users to download infected documents
Attempt to clean infected documents
● Antivirus Time Out - specify how long the virus scanner should run before timingout.
● Antivirus Threads - specify the number of execution threads on the server that thevirus scanner may use.
Click OK to save the selected settings.
NoteFor more information about configuring the Microsoft Office SharePoint Server 2007antivirus settings, please refer to the product documentation.
8.1.2. Scanning ProfilesTo open this section, go toOn-access Scanner under Server scan in the BitDefendermenu and select the On-access settings tab.
Server Scan 63
BitDefender Security for SharePoint
Scanning Profiles
This is where you can configure the real-time antivirus scanning profiles.
Managing ProfilesAll existing profiles appear in the Current scanning profile drop-down list. Select aprofile from the list and you can view its detailed settings in the Profile Settingssection.
The actions to be taken on the infected and suspect files detected are configurablefor each default scanning profile. For more information about default profiles, pleaserefer to “Configuring Default Scanning Profiles” (p. 65).If you want to configure the scan settings as well, you have to create custom profiles.For more information on how to create custom profiles, please refer to “CreatingCustom Scanning Profiles” (p. 67).To manage the scanning profiles, use the available buttons:
● Set the active scanning profile by selecting it from the drop-down list and clickingSave changes.
● Set the default scanning profile by selecting it from the drop-down list and clickingSet as default.
Server Scan 64
BitDefender Security for SharePoint
● Delete a profile by selecting it from the drop-down list and clicking Delete.
NoteDefault profiles can not be deleted.
● Create a new scanning profile by entering a name in the Create a new profile fieldand clicking Create.
Configuring Default Scanning ProfilesScanning profiles allow you to easily configure on-access scanning. You can use oneof the default scanning profiles or create custom profiles.
The default scanning profiles are described in the following table:
DescriptionScanningProfileOffers high security. The resource consumption level is moderate.High
● All downloaded and uploaded files, regardless of their extensionand size, are scanned.
● Files are scanned for all kinds of malware (viruses, Trojans,spyware, adware, riskware, dialers and so on).
● BitDefender scans inside archives.● The default action taken on infected files is Disinfect. Ifdisinfection fails, the files will be moved to quarantine.
● The default action taken on suspect files is Deny.
Offers standard security. The resource consumption level is low.Medium
● Only the files that do not exceed 10 megabytes (MB) arescanned.
● Files are scanned only for viruses, adware and spyware.● BitDefender does not scan inside archives.● The default action taken on infected files is Disinfect. Ifdisinfection fails, the files will be moved to quarantine.
● The default action taken on suspect files is Deny.
Covers basic security needs. The resource consumption level isvery low.
Low
Server Scan 65
BitDefender Security for SharePoint
DescriptionScanningProfile● Only the accessed application files that do not exceed 5megabytes (MB) are scanned.
● Files are scanned only for viruses, adware and spyware.● BitDefender does not scan inside archives.● The default action taken on infected files is Disinfect. Ifdisinfection fails, downloading or uploading such files is denied.
● The default action taken on suspect files is Deny.
Each default scanning profile allows configuring the actions to be taken on infectedand suspect files. When an infected or suspect file is detected, the first action in thecorresponding list is applied. If this action fails, the next action in the list is applied andso on.
You can change the order in which actions are to be applied. Select an action andclick or to move it up or down in the list.
Actions for infected files. The following actions are available for infected files:
DescriptionActionRemove the malware code from the infected files.Disinfection may fail in some cases, such as when theinfected file is inside specific mail archives.
Disinfect
Deny uploading or downloading of infected files by the users.DenyMove infected files from their original location to thequarantine folder. Quarantined files cannot be executed oropened; therefore, the risk of getting infected disappears.
Move to Quarantine
Immediately remove infected files from the server, withoutany warning.
Delete
Simply ignore the infected files.Ignore
WarningDo not set Ignore as the first action in the list. Doing thiswill allow users to download and upload ALL infected files.
Actions for suspect files. The following actions are available for suspect files:
Server Scan 66
BitDefender Security for SharePoint
DescriptionActionDeny uploading or downloading of infected files by the users.DenyMove suspect files from their original location to thequarantine folder. Quarantined files cannot be executed oropened; therefore, the risk of getting infected disappears.
Move to Quarantine
Immediately remove suspect files from the server, withoutany warning.
Delete
Simply ignore the infected files.IgnoreYou should not set this action the first in the list unless youexplicitly want ALL suspect files to be allowed to beuploaded and downloaded. This poses a high security risk,since some of these files are very likely to carry some formof malware.
Click Save Changes to apply the changes.
Creating Custom Scanning ProfilesIf you find that the default scanning profiles do not suit your needs, you can createyour own custom profiles. To create a custom profile, follow these steps:
1. Select a scanning profile from the list. The settings of the selected profile will bethe default settings of the new profile.
2. Enter the name of the profile in the Create a new profile field.3. Click Create.
The newly created profile will appear in the Current scanning profile drop-down list.To learn how to configure custom profiles, please refer to “Configuring CustomScanning Profiles” (p. 67).
Configuring Custom Scanning ProfilesTo configure the settings for a custom scanning profile, first you need to select it fromthe list. The following options can be configured from the Profile Settings section:
DescriptionSettingsConfigure the actions to be taken on the infected and suspectfiles detected by BitDefender.
Actions
Server Scan 67
BitDefender Security for SharePoint
DescriptionSettingsSelect the types of malware you want BitDefender tol scan for.Malware scannedConfigure BitDefender to scan packed files, archives or filesexceeding a configured size limit.
Advanced scansettings
Configure BitDefender to scan only files having specificextensions.
Filters
Configure ActionsYou can configure different actions for infected and suspect files. There is a list ofactions for each type of detected files (infected or suspect). When an infected orsuspect file is detected, the first action in the corresponding list is applied. If this actionfails, the next action in the list is applied and so on.
You can change the order in which actions are to be applied. Select an action andclick or to move it up or down in the list.
Actions for infected files. The following actions are available for infected files:
DescriptionActionRemove the malware code from the infected files.Disinfection may fail in some cases, such as when theinfected file is inside specific mail archives.
Disinfect
Deny uploading or downloading of infected files by the users.DenyMove infected files from their original location to thequarantine folder. Quarantined files cannot be executed oropened; therefore, the risk of getting infected disappears.
Move to Quarantine
Immediately remove infected files from the server, withoutany warning.
Delete
Simply ignore the infected files.Ignore
WarningDo not set Ignore as the first action in the list. Doing thiswill allow users to download and upload ALL infected files.
Actions for suspect files. The following actions are available for suspect files:
Server Scan 68
BitDefender Security for SharePoint
DescriptionActionDeny uploading or downloading of infected files by the users.DenyMove suspect files from their original location to thequarantine folder. Quarantined files cannot be executed oropened; therefore, the risk of getting infected disappears.
Move to Quarantine
Immediately remove suspect files from the server, withoutany warning.
Delete
Simply ignore the infected files.IgnoreYou should not set this action the first in the list unless youexplicitly want ALL suspect files to be allowed to beuploaded and downloaded. This poses a high security risk,since some of these files are very likely to carry some formof malware.
Configure Malware ScannedBitDefender can scan files not only for viruses, but also for riskware threats. To enableBitDefender to scan for riskware, in the Malware scanned section, first select theScan for riskware check box and then select which types of riskware BitDefenderwill scan for:
● Applications● Adware● Dialers● Spyware
Configure Advanced Scan SettingsThe following advanced settings can be configured from theAdvanced scan settingssection:
● Scan packed files - select this option to scan inside packed files.
● Scan inside archives - select this option to scan inside archives. Provide themaximum archive depth to scan in the Max archive depth field.
● Max file size to scan (KB) - select this option to set a maximum size for the filesBitDefender will scan. Enter the size in the corresponding field.
Server Scan 69
BitDefender Security for SharePoint
Configure FiltersSome file types are more likely to carry viruses than others. For example, the risk ofgetting infected when executing an .exe file is much higher than when opening a.txt or a .gif file.
To specify the file types to be scanned, select one of the following options from theFilters section:
DescriptionOptionAccessed files are scanned regardless of their type.Scan all extensionsOnly application files are scanned. This category islimited to files with the following extensions: .exe; .com;
Scan only application files
.dll; .ocx; .scr; .bin; .dat; .386; .vxd; .sys;
.wdm; .cla; .class; .ovl; .ole; .hlp; .doc; .dot;
.xls; .ppt; .wbk; .wiz; .pot; .ppa; .xla; .xlt;
.vbs; .vbe; .mdb; .rtf; .htm; .hta; .html; .xml;
.xtp; .php; .asp; .js; .shs; .chm; .lnk; .pif;
.prc; .url; .smm; .pdf; .msi; .ini; .csc; .cmd;
.bas; .bat; .drv; .cpl.
Viruses usually infect application files. Therefore, thesefile types should always be scanned on access.Only the files with the specified extensions are scanned.You must type in the edit field the file extensions to be
Scan custom extensions
scanned by BitDefender, separating them by semicolons(";").The files with the specified extensions are NOT scanned.You must type in the edit field the file extensions NOT
Scan all except thefollowing extensions
to be scanned by BitDefender, separating them bysemicolons (";").
You should not exclude from scanning file typescommonly known to carry viruses, such as .exe, .doc,.ppt, .xls, .rtf, .pif, .bat and others.
After completing the configuration for the custom profile, click Save changes to applythe settings.
Server Scan 70
BitDefender Security for SharePoint
8.2. On-demand ScanningOn-demand scanning provides an additional protection layer for the SharePoint server.You should periodically scan the server to make sure it is free from malware threats(viruses, spyware or rootkits). It is recommended to perform a comprehensive systemscan every week.
ImportantImmediately after installing BitDefender Security for SharePoint, please run anOn-Demand Scan to detect/clean any infections that might already be on the server.
To configure and initiate on-demand scanning, go to On-demand Scanner underServer scan in the BitDefender menu.
On-demand Scanner
On-demand scanning is based on scanning profiles. A scanning profile specifies:
● the locations (libraries, folders, files) to be scanned.
● the scan settings.
● the items excluded from scanning.
● the actions to be taken on the infected or suspect files detected.
Server Scan 71
BitDefender Security for SharePoint
For more information, please refer to “Scanning Profiles” (p. 73).
8.2.1. Scanning Files and FoldersHere are some tips regarding on-demand scanning:
● Avoid scanning the server when the server workload is at high levels, especially inthe case of a thorough scanning. It is recommended to perform scans when theserver is idle or nearly idle. For example, you should perform thorough system scansin weekends or at night.
● Before you start scanning, you should update BitDefender to enable it to detect thelatest malware discovered. To immediately update BitDefender, follow these steps:
1. In the BitDefender menu, click Update.2. On the Update tab, click Update Now.If you have created a scheduled scan task to run periodically, you should also createa scheduled update task to run a few minutes before the scan task.
ImportantIf you have disabled Automatic update or the update frequency is low, updatingBitDefender before scanning is a MUST.
● Perform a high scan once a week to make sure that no malware is lodged in thesystem. To this purpose, you can conveniently schedule an on-demand scanningtask to run every week. To learn more, please refer to “Scheduled Tasks” (p. 42).
To scan files and folders for malware threats, follow these steps:
1. Go to the On-demand scan tab.
2. Select a scanning profile.
3. Click Scan to start scanning.
During the scan, information regarding its progress is displayed:
● Scan status displays the activity of the scanner
● Current file scanned displays the name and path of the file that is being scannedat one time. A progress bar shows how the scan of each file progresses.
You can stop the scan at any time by clicking Cancel Scan.
Server Scan 72
BitDefender Security for SharePoint
A detailed scan report is created every time you perform an on-demand scan. ClickOn-demand scanning results to go to Reports where you can view the scan reports.
8.2.2. Scanning ProfilesTo open this section, go toOn-demand Scanner underServer scan in the BitDefendermenu and select the On-demand Settings tab.
On-demand Scanning Profiles
This is where you can configure the on-demand antivirus scanning profiles.
Managing ProfilesAll existing profiles appear in the Current scanning profile drop-down list. Select aprofile from the list and you can view its detailed settings in the Profile Settingssection.
The actions to be taken on the infected and suspect files detected are configurablefor each default scanning profile. For more information about default profiles, pleaserefer to “Configuring Default Scanning Profiles” (p. 74).
Server Scan 73
BitDefender Security for SharePoint
If you want to configure the scan settings as well, you have to create custom profiles.For more information on how to create custom profiles, please refer to “CreatingCustom Scanning Profiles” (p. 76).To manage the scanning profiles, use the available buttons:
● Set the active scanning profile by selecting it from the drop-down list and clickingSave changes.
● Delete a scanning profile by selecting it from the drop-down list and clicking Delete.
NoteDefault scanning profiles can not be deleted.
● Create a new scanning profile by entering a name in the Create a new profile fieldand clicking Create.
● View the scan location of a default profile or select the scan location of a customprofile by clicking Choose scan location.
Configuring Default Scanning ProfilesScanning profiles allow you to easily configure on-demand scanning. You can useone of the default scanning profiles or create custom profiles.
The default scanning profiles are described in the following table:
DescriptionScaning ProfileAllows performing a comprehensive scan of CentralAdministration and all the sites. The pre-defined scansettings offer the highest detection efficiency.
High
By default, BitDefender is configured to take the followingactions:
● Disinfect infected files. If disinfection fails, the files willbe moved to quarantine.
● Move suspect files to quarantine.
Allows a quick scan of all sites using a pre-definedconfiguration of the scan settings. Only files that do notexceed 5 megabytes (MB) are scanned.
Low
Server Scan 74
BitDefender Security for SharePoint
DescriptionScaning ProfileBy default, BitDefender is configured to take the followingactions:
● Disinfect infected files. If disinfection fails, the files willbe moved to quarantine.
● Move suspect files to quarantine.
Each default scanning profile allows configuring the actions to be taken on infectedand suspect files. When an infected or suspect file is detected, the first action in thecorresponding list is applied. If this action fails, the next action in the list is applied andso on.
You can change the order in which actions are to be applied. Select an action andclick or to move it up or down in the list.
Actions for infected files. The following actions are available for infected files:
DescriptionActionRemove the malware code from the infected files.Disinfection may fail in some cases, such as when theinfected file is inside specific mail archives.
Disinfect
Move infected files from their original location to thequarantine folder. Quarantined files cannot be executed oropened; therefore, the risk of getting infected disappears.
Move to Quarantine
Immediately remove infected files from the server, withoutany warning.
Delete
Simply ignore the infected files.Ignore
WarningDo not set Ignore as the first action in the list. Doing thiswill allow users to download and upload ALL infected files.
Actions for suspect files. The following actions are available for suspect files:
Server Scan 75
BitDefender Security for SharePoint
DescriptionActionMove suspect files from their original location to thequarantine folder. Quarantined files cannot be executed oropened; therefore, the risk of getting infected disappears.
Move to Quarantine
Immediately remove suspect files from the server, withoutany warning.
Delete
Simply ignore the infected files.IgnoreYou should not set this action the first in the list unless youexplicitly want ALL suspect files to be allowed to beuploaded and downloaded. This poses a high security risk,since some of these files are very likely to carry some formof malware.
Click Save Changes to apply the changes.
Creating Custom Scanning ProfilesIf you find that the default scanning profiles do not suit your needs, you can createyour own custom profiles. To create a custom profile, enter its name in the Create anew profile field and clickCreate. The newly created profile will appear in theCurrentscanning profile drop-down list. To learn how to configure custom profiles, pleaserefer to “Configuring Custom Scanning Profiles” (p. 76).
Configuring Custom Scanning ProfilesTo configure the settings for a custom scanning profile, first you need to select it fromthe list. The following options can be configured from the Profile Settings section:
DescriptionSettingsConfigure the actions to be taken on the infected and suspectfiles detected by BitDefender.
Actions
Select the types of malware you want BitDefender tol scan for.Malware scannedConfigure BitDefender to scan packed files, archives or filesexceeding a configured size limit.
Advanced scansettings
Configure BitDefender to scan only files having specificextensions.
Filters
Server Scan 76
BitDefender Security for SharePoint
Configure ActionsYou can configure different actions for infected and suspect files. There is a list ofactions for each type of detected files (infected or suspect). When an infected orsuspect file is detected, the first action in the corresponding list is applied. If this actionfails, the next action in the list is applied and so on.
You can change the order in which actions are to be applied. Select an action andclick or to move it up or down in the list.
Actions for infected files. The following actions are available for infected files:
DescriptionActionRemove the malware code from the infected files.Disinfection may fail in some cases, such as when theinfected file is inside specific mail archives.
Disinfect
Move infected files from their original location to thequarantine folder. Quarantined files cannot be executed oropened; therefore, the risk of getting infected disappears.
Move to Quarantine
Immediately remove infected files from the server, withoutany warning.
Delete
Simply ignore the infected files.Ignore
WarningDo not set Ignore as the first action in the list. Doing thiswill allow users to download and upload ALL infected files.
Actions for suspect files. The following actions are available for suspect files:
DescriptionActionMove suspect files from their original location to thequarantine folder. Quarantined files cannot be executed oropened; therefore, the risk of getting infected disappears.
Move to Quarantine
Immediately remove suspect files from the server, withoutany warning.
Delete
Simply ignore the infected files.Ignore
Server Scan 77
BitDefender Security for SharePoint
DescriptionActionYou should not set this action the first in the list unless youexplicitly want ALL suspect files to be allowed to beuploaded and downloaded. This poses a high security risk,since some of these files are very likely to carry some formof malware.
Configure Malware ScannedTo enable BitDefender to scan not only for viruses, but also for riskware, in theMalwarescanned section, select the Scan for riskware check box. Select the types of riskwareBitDefender will scan for by selecting the corresponding check boxes:
DescriptionOptionScans for legitimate applications that can be used as aspying tool, to hide malicious applications or for othermalicious intent
Applications
Scans for adware threatsAdwareScans for applications dialing premium rate phonenumbers
Dialers
Scans for known spyware threatsSpyware
Configure Advanced Scan SettingsThe following advanced settings can be configured from theAdvanced scan settingssection:
● Scan packed files - select this option to scan inside packed files.
● Scan inside archives - select this option to scan inside archives. Provide themaximum archive depth to scan in the Max archive depth field.
● Max file size to scan (KB) - select this option to set a maximum size for the filesBitDefender will scan. Enter the size in the corresponding field.
Configure FiltersSome file types are more likely to carry viruses than others. For example, the risk ofgetting infected when executing an .exe file is much higher than when opening a.txt or a .gif file.
Server Scan 78
BitDefender Security for SharePoint
To specify the file types to be scanned, select one of the following options from theFilters section:
DescriptionOptionFiles are scanned regardless of their type.Scan all extensionsOnly application files are scanned. This category islimited to files with the following extensions: .exe; .com;
Scan only application files
.dll; .ocx; .scr; .bin; .dat; .386; .vxd; .sys;
.wdm; .cla; .class; .ovl; .ole; .hlp; .doc; .dot;
.xls; .ppt; .wbk; .wiz; .pot; .ppa; .xla; .xlt;
.vbs; .vbe; .mdb; .rtf; .htm; .hta; .html; .xml;
.xtp; .php; .asp; .js; .shs; .chm; .lnk; .pif;
.prc; .url; .smm; .pdf; .msi; .ini; .csc; .cmd;
.bas; .bat; .drv; .cpl.
Viruses usually infect application files. Therefore, thesefile types should always be scanned.Only the files with the specified extensions are scanned.You must type in the edit field the file extensions to be
Scan custom extensions
scanned by BitDefender, separating them by semicolons(";").The files with the specified extensions are NOT scanned.You must type in the edit field the file extensions NOT
Scan all except thefollowing extensions
to be scanned by BitDefender, separating them bysemicolons (";").
You should not exclude from scanning file typescommonly known to carry viruses, such as .exe, .doc,.ppt, .xls, .rtf, .pif, .bat and others.
After completing the configuration for the custom profile, click Save changes to applythe settings.
8.3. Testing Antivirus ProtectionYou can verify that the BitDefender Antivirus component works properly with the helpof a special test file, known as the EICAR Standard Anti-virus Test file. EICAR standsfor the European Institute of Computer Anti-virus Research. This is a dummy file,detected by antivirus products.
Server Scan 79
BitDefender Security for SharePoint
The file can be created using any text editor, provided the file is saved in standardMS-DOS ASCII format and is 68 bytes long. It might also be 70 bytes if the editor putsa CR/LF at the end.
The file must contain the following single line:
X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*
Save the file under any name with a COM extension (for example EICAR.COM) andupload it to a library. BitDefender must treat this file as an infected document.
You can visit the EICAR website at http://eicar.com, read the documentation anddownload the file from one of the locations on the following web page:http://eicar.com/anti_virus_test_file.htm.
Server Scan 80
BitDefender Security for SharePoint
9. UpdateNew viruses and spyware are found and identified every day. This is why it is veryimportant to keep BitDefender up to date with the latest signatures.
The automatic update feature allows updating BitDefender automatically, on a regularbasis, without the administrator's intervention. By default, BitDefender automaticallychecks for updates every hour. If newmalware signatures or scanning engine updatesare detected, BitDefender will automatically download and install them.
The update can also be done anytime you want by clicking Update now from theUpdate section or by creating a scheduled update task.
Updates can be classified in the following ways:
● Antivirus updates - the files containing virus and spyware signatures, as well asthe scanning engine, are updated to ensure permanent protection against the newthreats that appear.
● Product updates - when a new product version is released, new features and scantechniques are introduced to the effect of improving the product's performance.
Update 81
BitDefender Security for SharePoint
9.1. UpdateTo find out information on the update status and if updates are available, click Updatein the BitDefender menu.
Update
9.1.1. Update InformationIn the Update Information section, you can see the update status and when the lastupdate check and update were performed.
If you want to update BitDefender immediately, just click Update Now. The Updatemodule will check the specified update locations for updates. If newmalware signaturesor scanning engine updates are detected, BitDefender will automatically downloadand install them.
9.1.2. Product UpdateThe product updates are different from the signature updates. Their function is todeliver bug fixes and new features to the product.
There are two types of updates for the product:
Update 82
BitDefender Security for SharePoint
● product updates (patches) - these are files that bring improvements to the currentproduct; they are usually smaller size updates that do not require a new version ofthe product to be delivered.
● version updates - these are installation packages of a new released version of theproduct.
NoteIn order not to interfere with the server's operation, by default product updates are notautomatically installed. Go to the Update section periodically to see if there are anyproduct updates available and to install them. For more information on how to enableand configure automatic product updates, please refer to “Configuring Product Updates”(p. 85).
When a new patch is available, it is downloaded on the local computer and informationabout it is displayed. You can then choose if you want to install it immediately orschedule it for a later date.
When a newer version of BitDefender Security for SharePoint is available, you willsee information about that version. Also, you will be provided with a link to the webpage where you can download the installation package from. Click the respective linkand download and install the new version.
Update 83
BitDefender Security for SharePoint
9.2. Update SettingsTo configure the update frequency and the product update settings, click Update inthe BitDefender menu and then the Settings tab.
Update Settings
9.2.1. Configuring Update ScheduleThere are two ways to update BitDefender Security for SharePoint on a regular basis:
● Using the automatic update. The automatic update feature allows updatingBitDefender automatically, on a regular basis, without the administrator's intervention.By default, BitDefender checks for updates at the specified update locations, everyhour. If new malware signatures or scanning engine updates are detected,BitDefender will automatically download and install them.
ImportantKeep automatic update enabled in order to be protected against the latest threats.
To change the frequency at which BitDefender checks for updates, select the numberof hours between two consecutive checks for updates from the Automatic update
Update 84
BitDefender Security for SharePoint
interval drop-down list. To disable the automatic update, clear the check boxcorresponding to Automatic update interval.Click Apply to save the changes.
● Using a scheduled update task. Scheduled update tasks allow automaticallyupdating the BitDefender malware signatures and scanning engines according toa convenient schedule. For more information, please refer to “Update Tasks” (p.49).
NoteScheduled update tasks will not de-activate automatic update so that the updatelocations will be checked for new updates on a regular basis.
9.2.2. Configuring Product UpdatesInstalling product updates regularly is essential to the security of your server. Dependingon the level of interference with the server, there are three types of product updates:
● product updates that do not require stopping server traffic or to reboot the server● product updates that require stopping server traffic, but do not require to reboot theserver
● product updates that require to reboot the server
To configure automatic downloads and installation for each type of product update,select one of the following options:
● Download updates and install automaticallySelect this option and BitDefender will automatically download and install productupdates. This is the recommended choice for product updates that do not requirestopping server traffic or a server reboot.
● Download updates automatically and install... at...Select this option if you want BitDefender to install available updates at certaintimes. Select from the corresponding drop-down lists the date (day and time) whenyou want this to happen.
This way you can configure BitDefender to perform product updates at times whenit is least likely for interferences to occur with server activity (during night time, forexample).
● Download updates and let me decide when to install them
Update 85
BitDefender Security for SharePoint
Select this option if you want BitDefender to automatically download product updates,but let you decide when to install them. This is the recommended choice for productupdates that require stopping server traffic or a server reboot.
To disable automatic product updates, select the No automatic product updatescheck box.
NoteYour server will be more vulnerable unless you install updates regularly.
Click Apply to save the changes.
Update 86
BitDefender Security for SharePoint
9.3. Update LocationsTo set the update locations, click Update in the BitDefender menu and then theLocations tab.
Update Locations
BitDefender can update from the local network, over the Internet, directly or througha proxy server.
For more reliable and faster updates, you can configure two update locations: a Firstupdate location and a Second update location. Both require the configuration ofthe following options:
● Update location - type the address of the update server. By default, the primaryupdate location is: upgrade.bitdefender.com.
NoteIf you are connected to a local network that has BitDefender virus signatures placedlocally, you can change the location of the updates here.
● Allow unsigned updates - select this option to allow updates from a local serverto be installed.
Update 87
BitDefender Security for SharePoint
● Use proxy - select this option if the company uses a proxy server. The followingsettings must be specified:
IP/Name - type the IP of the proxy server.
Port - type the port BitDefender uses to connect to the proxy server.
User - type a user name recognized by the proxy.
Password - type the valid password of the previously specified user.
Click Apply to save the changes.
9.4. Update NotificationsBitDefender can be configured to notify you about special events that occur during itsoperation. To specify which update events should BitDefender notify you about, clickUpdate in the BitDefender menu and then the Notifications tab.
Update Notifications
Select the update events you want to be informed about:
● Update performed - when an update was performed.
● No update available - when no update is available.
Update 88
BitDefender Security for SharePoint
● Update failed - when an error occurred during an update and the update failed.
● Product update available - when a product update is available.
To configure BitDefender only to log the occurrence of an event, or also to alert youabout it through mail or netsend, go to Monitoring>Alerts & Logs, Alerts tab andconfigure the corresponding event. For more information, please refer to “ConfiguringEvents” (p. 33).Click Apply to save the changes.
9.5. Update RollbackIf you have performed a product update since first installing BitDefender, you canalways revert to the previous product version using the Rollback feature. This featureis very useful in case the product starts behaving unexpectedly. To see if there is anyrollback available, click Update in the BitDefender menu and then the Rollback tab.
Update Rollback
If a rollback is available, the current product version and the version you can roll backto will be displayed. Click Roll Back and confirm your choice by clicking Yes in theconfirmation window to perform the rollback action.
Update 89
BitDefender Security for SharePoint
After a rollback is performed, the version currently in use and the previous version willbe displayed. You can use the provided link to update back to the newer version.
Update 90
BitDefender Security for SharePoint
10. GeneralThis is where you can configure BitDefender to send the BitDefender Lab reportsregarding the viruses found on the server and the incidents that occurred during productoperation, and where you can import/export product settings.
10.1. Report VirusReal-time Virus Reporting (RTVR) allows sending reports about the viruses found onyour server to the BitDefender Lab in order to help us identify new viruses and findquick remedies for them. Your contribution could be essential for developing new toolsto protect you and other users against virus threats.
The reports will not contain any personally identifiable data, such as your name, IPaddress or others. The information supplied will contain only the name of the country,the virus name, the number of infected files and the total number of scanned files.The reports themselves are used only for statistic purposes and will never be usedas commercial data or disclosed to third parties.
To configure Real-time Virus Reporting, go to Report Virus under General in theBitDefender menu.
Report Virus
General 91
BitDefender Security for SharePoint
Real-time Virus Reporting is disabled by default. To activate it, follow these steps:
1. Select Enable real-time virus reports.2. Click Apply to save the changes.
10.2. Report IncidentsBitDefender Security for SharePoint contains an incident management module thatallows creating incident reports during product crashes. By agreeing to send theincident reports to the BitDefender Lab, you agree to help us find quick fixes for ourbugs. You could make a major contribution to the development of a stable productthat satisfies your needs. The reports will only be used for debugging purposes. Theywill never be used as commercial data or disclosed to third parties.
To configure the incident management module, go toReport Incidents underGeneralin the BitDefender menu.
Report Incidents
By default, the reports created automatically during product crashes are not sent tothe BitDefender Lab. To configure BitDefender to send incident reports to theBitDefender Lab, follow these steps:
1. Select I agree to submit incident reports to the BitDefender Lab.
General 92
BitDefender Security for SharePoint
2. Specify your e-mail address.
3. Click Apply to save the changes.
10.3. Exporting/Importing Product SettingsYou can export and import the product settings. This helps you easily configure otherBitDefender Security for SharePoint products and restore configured settings in caseyou repair or reinstall the product.
10.3.1. Exporting Product SettingsTo export product settings, go to Export Settings under General in the BitDefendermenu.
All you need to do is click Export and select the folder where you want the productsettings file to be saved.
10.3.2. Importing Product SettingsTo import product settings, go to Import Settings under General in the BitDefendermenu.
To import previously saved product settings, follow these steps:
1. Click Import. A new window will appear.
2. Locate and select the settings file.
3. Click Open to import the settings.
NoteBitDefender does not protect the SharePoint server while importing product settings.Therefore, it is recommended that you remove the server from the network beforeinitiating this process.
4. Wait until the Import Tool completes the importing process.
5. The Import Tool informs you when the settings have been successfully imported.
Click Exit to close the window.
General 93
BitDefender Security for SharePoint
11. LicenseBitDefender Security for SharePoint comes with a 30-day trial period. If you decidethat BitDefender Security for SharePoint is the best choice for your organization,proceed to purchase and register its full version. You should also create a BitDefenderaccount in order to benefit from free BitDefender technical support and other freeservices.
NoteIf BitDefender Security for SharePoint is under the management of BitDefenderManagement Server, the product and account registration are performed from themanagement console of BitDefender Management Server.
11.1. Purchase the full version of the productGo to Buy under License in the BitDefender menu if you want to purchase the fullversion of BitDefender Security for SharePoint. This will open a web page from whereyou can buy the product.
11.2. Register the productTo register BitDefender Security for SharePoint, go to Register Now under Licensein the BitDefender menu.
License 94
BitDefender Security for SharePoint
Registration
You can see the status of your registration on the upper part of the page.
If you do not have a BitDefender license, click the provided link to go to the BitDefenderonline store and purchase a license key.
To register the product, enter a valid serial number in the License key field and clickRegister Now.
NoteIf the provided license key is not valid, you will be prompted to provide another licensekey.
11.3. Register a BitDefender AccountTo create or log in to a BitDefender account, go to My Account under License in theBitDefender menu.
License 95
BitDefender Security for SharePoint
Account Registratiion
You can see the current account status on the upper part of the page. Proceedaccording to your current situation.
I do not have a BitDefender accountTo create a BitDefender account, all you have to do is enter the required information:
NoteThe data you provide here will remain confidential.
● Account (e-mail) - type in your e-mail address.
● Password - type in a password for your BitDefender account. The password mustbe at least four characters long.
● Retype password - type in again the previously specified password.
● First name - type in your first name.
● Last name - type in your last name.
Click Create to finish.
License 96
BitDefender Security for SharePoint
NoteUse the provided e-mail address and password to log in to your account athttp://myaccount.bitdefender.com.
To successfully create an account you must first activate your e-mail address. Checkyour e-mail address and follow the instructions in the e-mail sent to you by theBitDefender registration service.
I already have a BitDefender accountIf you already have an active account, provide the e-mail address and the passwordof your account in the corresponding fields and click Login.
NoteIf you provide an incorrect password, you will be prompted to re-type it when you clickLogin.
If you have forgotten your password, click Forgot password? and follow theinstructions to create a new password.
License 97
BitDefender Security for SharePoint
12. HelpThis is where you can access the product documentation, the BitDefender KnowledgeBase and see version information.
If you need information on how to use the product, clickBD Security Help underHelpin the BitDefender menu. This will open the BitDefender Security for SharePoint helpfile.
If you have problems with the product and need help troubleshooting, click SupportunderHelp in the BitDefender menu. You will be directed to the BitDefender KnowledgeBase, where you can find documents addressing the most common issues and fromwhere you can contact BitDefender Customer Care. For more information about gettinghelp, please refer to “Troubleshooting and Getting Help” (p. 99).To get version information, click About BD Security under Help in the BitDefendermenu. Here you can see the version numbers of the BitDefender modules.
Help 98
BitDefender Security for SharePoint
Troubleshooting and Getting Help
99
BitDefender Security for SharePoint
13. BitDefender Configuration Repair ToolIf you have problems with BitDefender Security for SharePoint, you can use theBitDefender Configuration Repair Tool to restore the last known good configuration.The BitDefender Configuration Repair Tool backs the configuration file up every hourso that you can restore it if needed. This tool can be successfully used to fix a corruptconfiguration file issue, which may occur in extreme situations such as a forced systemshutdown caused by a blackout.
To restore the last known good version of the configuration file, follow these steps:
1. Open the BitDefender Configuration Repair Tool using this path from the Windowsstart menu: Start → Programs → BitDefender Security for Windows Servers→ BitDefender Configuration Repair Tool.
BitDefender Configuration Repair Tool
2. Click Restore to begin restoring the backup copy of the configuration file.
3. Wait until the BitDefender Configuration Repair Tool completes the restorationprocess.
BitDefender Configuration Repair Tool 100
BitDefender Security for SharePoint
Repairing Configuration
The window displays the status of the restoration process. First, the BitDefenderConfiguration Repair Tool stops the services belonging to the BitDefender Securityfor Windows Servers products installed on the system (services belonging toMicrosoft applications may also be stopped; for example, Microsoft ExchangeTransport, if BitDefender Security for Exchange is installed). Then, the BitDefenderConfiguration Repair Tool replaces the corrupt configuration file with the backupfile (an older working copy of the configuration file). Finally, the BitDefenderConfiguration Repair Tool restarts the processes previously stopped.
4. The BitDefender Configuration Repair Tool informs you when the backup copy ofthe configuration file has been successfully restored.
BitDefender Configuration Repair Tool 101
BitDefender Security for SharePoint
Finish
Click Exit to close the window.
BitDefender Configuration Repair Tool 102
BitDefender Security for SharePoint
14. BitDefender Support ToolThe BitDefender Support Tool creates a zip archive of files required by our supporttechnicians to troubleshoot BitDefender Security for SharePoint.
Send the zip archive together with your request for support in order to reduce the timeneeded to resolve the query.
To use the Support Tool, follow these steps:
1. Open the BitDefender Support Tool using this path from the Windows start menu:Start → All Programs → BitDefender Security for Windows Servers →BitDefender Support Tool.
BitDefender Support Tool
2. Click Next.3. Wait until the Support Tool finishes gathering information.
BitDefender Support Tool 103
BitDefender Security for SharePoint
Gathering Information
The Support Tool gathers product information, information related to otherapplications installed on the machine and the software and hardware configuration.
4. The Support Tool informs you when the process has completed.
Finish
The name of the zip archive that has been created on your desktop is displayed inthis window. Click Finish to close the window.
BitDefender Support Tool 104
BitDefender Security for SharePoint
15. SupportWith BitDefender, dedication to saving customers’ time and money by providing themost advanced products at the fairest prices has always been a top priority. Moreover,we believe that a successful business is based on good communication andcommitment to excellence in customer support.
You are welcome to ask for support at any time. Our customer care representativeswill provide you with all the assistance you need.
15.1. Asking for HelpYou can ask for help via the BitDefender Web Self-Service or via the telephone. TheBitDefender Web Self-Service assists you with solutions to BitDefender-related issuesand provides means to contact BitDefender Customer Care. The BitDefender WebSelf-Service addresses and the technical support phone numbers are provided insection “Contact Information” (p. 106).To ask for help via the BitDefender Web Self-Service, follow these steps:
1. Go to http://kb.bitdefender.com and access the Business section. This is whereyou can find the BitDefender Knowledge Base for the BitDefender business products.The BitDefender Knowledge Base hosts numerous articles that contain solutionsto BitDefender-related issues.
2. Select your product from the list.
3. Search the BitDefender Knowledge Base for articles that may provide a solution toyour problem.
4. Please read the article most relevant to your problem and try the proposed solution.
5. If this solution does not solve your problem, use the link in the article to contactBitDefender Customer Care. It is recommended that you first login to yourBitDefender account and then contact the BitDefender support representatives bye-mail, chat or phone.
15.2. BitDefender Knowledge BaseThe BitDefender Knowledge Base is an online repository of information about theBitDefender products. It stores, in an easily accessible format, reports on the resultsof the ongoing technical support and bugfixing activities of the BitDefender support
Support 105
BitDefender Security for SharePoint
and development teams, along with more general articles about virus prevention, themanagement of BitDefender solutions with detailed explanations, and many otherarticles.
The BitDefender Knowledge Base is open to the public and freely searchable. Theextensive information it contains is yet another means of providing BitDefendercustomers with the technical knowledge and insight they need. All valid requests forinformation or bug reports coming from BitDefender clients eventually find their wayinto the BitDefender Knowledge Base, as bugfix reports, workaround cheatsheets orinformational articles to supplement product helpfiles.
The BitDefender Knowledge Base is available any time at http://kb.bitdefender.com.
15.3. Contact InformationEfficient communication is the key to a successful business. During the past 10 yearsBITDEFENDER has established an unquestionable reputation by constantly strivingfor better communication so as to exceed the expectations of our clients and partners.Should you have any questions, do not hesitate to contact us.
15.3.1. Web AddressesSales department: [email protected] self-service: http://kb.bitdefender.comDocumentation: [email protected] Program: [email protected]: [email protected] Relations: [email protected] Opportunities: [email protected] Submissions: [email protected] Submissions: [email protected] Abuse: [email protected] web site: http://www.bitdefender.comProduct ftp archives: ftp://ftp.bitdefender.com/pubLocal distributors: http://www.bitdefender.com/partner_list
15.3.2. BitDefender OfficesThe BitDefender offices are ready to respond to any inquiries regarding their areas ofoperation, both in commercial and in general matters. Their respective addresses andcontacts are listed below.
Support 106
BitDefender Security for SharePoint
North AmericaBitDefender, LLC6301 NW 5th Way, Suite 3500Fort Lauderdale, Florida 33309Phone (sales&technical support): 1-954-776-6262Sales: [email protected]: http://www.bitdefender.comWeb Self-Service: http://kb.bitdefender.com/site/KnowledgeBase/showMain/2/
UK and IrelandBusiness Centre 10 Queen StreetNewcastle, StaffordshireST5 1EDUKPhone (sales&technical support): +44 (0) 8451-305096E-mail: [email protected]: [email protected]: http://www.bitdefender.co.ukWeb Self-Service: http://kb.bitdefender.com/site/KnowledgeBase/showMain/2/
GermanyBitDefender GmbHAirport Office CenterRobert-Bosch-Straße 259439 HolzwickedeDeutschlandPhone (office&sales): +49 (0)2301 91 84 222Phone (technical support): +49 (0)2301 91 84 444Sales: [email protected]: http://www.bitdefender.deWeb Self-Service: http://www.bitdefender.de/site/KnowledgeBase/showMain/2/
Spain and Latin AmericaBitDefender España SLUC/ Balmes, 191, 2º, 1ª08006 BarcelonaEspaña
Support 107
BitDefender Security for SharePoint
Fax: +34 932179128Phone (office&sales): +34 902190765Phone (technical support): +34 935026910Sales: [email protected]: http://www.bitdefender.esWeb Self-Service: http://www.bitdefender.es/site/KnowledgeBase/showMain/2/
RomaniaBITDEFENDER SRLWest Gate Park, Building H2, 24 Preciziei StreetBucharest, Sector 6Fax: +40 21 2641799Phone (sales&technical support): +40 21 2063470Sales: [email protected]: http://www.bitdefender.roWeb Self-Service: http://www.bitdefender.ro/site/KnowledgeBase/showMain/2/
EMEA and APAC Business UnitBITDEFENDER SRLWest Gate Park, Building H2, 24 Preciziei StreetBucharest, Sector 6RomaniaFax: +40 21 2641799Phone (sales&technical support): +40 21 2063470Sales: [email protected]: http://www.bitdefender.comWeb Self-Service: http://www.bitdefender.com/site/KnowledgeBase/showMain/2/
Support 108
BitDefender Security for SharePoint
GlossaryActiveX
ActiveX is a model for writing programs so that other programs and the operatingsystem can call them. ActiveX technology is used with Microsoft Internet Explorerto make interactive Web pages that look and behave like computer programs,rather than static pages. With ActiveX, users can ask or answer questions, usepush buttons, and interact in other ways with the Web page. ActiveX controls areoften written using Visual Basic.
Active X is notable for a complete lack of security controls; computer securityexperts discourage its use over the Internet.
AdwareAdware is often combined with a host application that is provided at no chargeas long as the user agrees to accept the adware. Because adware applicationsare usually installed after the user has agreed to a licensing agreement that statesthe purpose of the application, no offense is committed.
However, pop-up advertisements can become an annoyance, and in some casesdegrade system performance. Also, the information that some of these applicationscollect may cause privacy concerns for users who were not fully aware of theterms in the license agreement.
ArchiveA disk, tape, or directory that contains files that have been backed up.
A file that contains one or more files in a compressed format.
BackdoorA hole in the security of a system deliberately left in place by designers ormaintainers. The motivation for such holes is not always sinister; some operatingsystems, for example, come out of the box with privileged accounts intended foruse by field service technicians or the vendor's maintenance programmers.
Boot sectorA sector at the beginning of each disk that identifies the disk's architecture (sectorsize, cluster size, and so on). For startup disks, the boot sector also contains aprogram that loads the operating system.
Boot virusA virus that infects the boot sector of a fixed or floppy disk. An attempt to bootfrom a diskette infected with a boot sector virus will cause the virus to become
Glossary 109
BitDefender Security for SharePoint
active in memory. Every time you boot your system from that point on, you willhave the virus active in memory.
BrowserShort for Web browser, a software application used to locate and display Webpages. The two most popular browsers are Netscape Navigator and MicrosoftInternet Explorer. Both of these are graphical browsers, which means that theycan display graphics as well as text. In addition, most modern browsers canpresent multimedia information, including sound and video, though they requireplug-ins for some formats.
Command lineIn a command line interface, the user types commands in the space provideddirectly on the screen using command language.
CookieWithin the Internet industry, cookies are described as small files containinginformation about individual computers that can be analyzed and used byadvertisers to track your online interests and tastes. In this realm, cookietechnology is still being developed and the intention is to target ads directly towhat you've said your interests are. It's a double-edge sword for many peoplebecause on one hand, it's efficient and pertinent as you only see ads about whatyou're interested in. On the other hand, it involves actually "tracking" and"following" where you go and what you click. Understandably so, there is a debateover privacy and many people feel offended by the notion that they are viewedas a "SKU number" (you know, the bar code on the back of packages that getsscanned at the grocery check-out line). While this viewpoint may be extreme, insome cases it is accurate.
Disk driveIt's a machine that reads data from and writes data onto a disk.
A hard disk drive reads and writes hard disks.
A floppy drive accesses floppy disks.
Disk drives can be either internal (housed within a computer) or external (housedin a separate box that connects to the computer).
DownloadTo copy data (usually an entire file) from a main source to a peripheral device.The term is often used to describe the process of copying a file from an onlineservice to one's own computer. Downloading can also refer to copying a file froma network file server to a computer on the network.
Glossary 110
BitDefender Security for SharePoint
E-mailElectronic mail. A service that sends messages on computers via local or globalnetworks.
EventsAn action or occurrence detected by a program. Events can be user actions, suchas clicking a mouse button or pressing a key, or system occurrences, such asrunning out of memory.
False positiveOccurs when a scanner identifies a file as infected when in fact it is not.
Filename extensionThe portion of a filename, following the final point, which indicates the kind ofdata stored in the file.
Many operating systems use filename extensions, e.g. Unix, VMS, and MS-DOS.They are usually from one to three letters (some sad old OSes support no morethan three). Examples include "c" for C source code, "ps" for PostScript, "txt" forarbitrary text.
HeuristicA rule-based method of identifying new viruses. This method of scanning doesnot rely on specific virus signatures. The advantage of the heuristic scan is thatit is not fooled by a new variant of an existing virus. However, it might occasionallyreport suspicious code in normal programs, generating the so-called "falsepositive".
IPInternet Protocol - A routable protocol in the TCP/IP protocol suite that isresponsible for IP addressing, routing, and the fragmentation and reassembly ofIP packets.
Java appletA Java program which is designed to run only on a web page. To use an appleton a web page, you would specify the name of the applet and the size (lengthand width, in pixels) that the applet can utilize. When the web page is accessed,the browser downloads the applet from a server and runs it on the user's machine(the client). Applets differ from applications in that they are governed by a strictsecurity protocol.
For example, even though applets run on the client, they cannot read or writedata onto the client's machine. Additionally, applets are further restricted so thatthey can only read and write data from the same domain that they are servedfrom.
Glossary 111
BitDefender Security for SharePoint
Macro virusA type of computer virus that is encoded as a macro embedded in a document.Many applications, such as Microsoft Word and Excel, support powerful macrolanguages.
These applications allow you to embed a macro in a document, and have themacro execute each time the document is opened.
Mail clientAn e-mail client is an application that enables you to send and receive e-mail.
MemoryInternal storage areas in the computer. The term memory identifies data storagethat comes in the form of chips, and the word storage is used for memory thatexists on tapes or disks. Every computer comes with a certain amount of physicalmemory, usually referred to as main memory or RAM.
Non-heuristicThis method of scanning relies on specific virus signatures. The advantage of thenon-heuristic scan is that it is not fooled by what might seem to be a virus, anddoes not generate false alarms.
Packed programsA file in a compression format. Many operating systems and applications containcommands that enable you to pack a file so that it takes up less memory. Forexample, suppose you have a text file containing ten consecutive spacecharacters. Normally, this would require ten bytes of storage.
However, a program that packs files would replace the space characters by aspecial space-series character followed by the number of spaces being replaced.In this case, the ten spaces would require only two bytes. This is just one packingtechnique - there are many more.
PathThe exact directions to a file on a computer. These directions are usually describedby means of the hierarchical filing system from the top down.
The route between any two points, such as the communications channel betweentwo computers.
PhishingThe act of sending an e-mail to a user falsely claiming to be an establishedlegitimate enterprise in an attempt to scam the user into surrendering privateinformation that will be used for identity theft. The e-mail directs the user to visita Web site where they are asked to update personal information, such as
Glossary 112
BitDefender Security for SharePoint
passwords and credit card, social security, and bank account numbers, that thelegitimate organization already has. The Web site, however, is bogus and set uponly to steal the user’s information.
Polymorphic virusA virus that changes its form with each file it infects. Since they have no consistentbinary pattern, such viruses are hard to identify.
PortAn interface on a computer to which you can connect a device. Personalcomputers have various types of ports. Internally, there are several ports forconnecting disk drives, display screens, and keyboards. Externally, personalcomputers have ports for connecting modems, printers, mice, and other peripheraldevices.
In TCP/IP and UDP networks, an endpoint to a logical connection. The port numberidentifies what type of port it is. For example, port 80 is used for HTTP traffic.
Report fileA file that lists actions that have occurred. BitDefender maintains a report filelisting the path scanned, the folders, the number of archives and files scanned,how many infected and suspicious files were found.
RootkitA rootkit is a set of software tools which offer administrator-level access to asystem. The term was first used for the UNIX operating systems and it referredto recompiled tools which provided intruders administrative rights, allowing themto conceal their presence so as not to be seen by the system administrators.
The main role of rootkits is to hide processes, files, logins and logs. They mayalso intercept data from terminals, network connections or peripherals, if theyincorporate the appropriate software.
Rootkits are not malicious in nature. For example, systems and even someapplications hide critical files using rootkits. However, they are mostly used tohide malware or to conceal the presence of an intruder into the system. Whencombined with malware, rootkits pose a great threat to the integrity and the securityof a system. They can monitor traffic, create backdoors into the system, alter filesand logs and avoid detection.
ScriptAnother term for macro or batch file, a script is a list of commands that can beexecuted without user interaction.
Glossary 113
BitDefender Security for SharePoint
SpamElectronic junk mail or junk newsgroup postings. Generally known as anyunsolicited e-mail.
SpywareAny software that covertly gathers user information through the user's Internetconnection without his or her knowledge, usually for advertising purposes. Spywareapplications are typically bundled as a hidden component of freeware or sharewareprograms that can be downloaded from the Internet; however, it should be notedthat the majority of shareware and freeware applications do not come withspyware. Once installed, the spyware monitors user activity on the Internet andtransmits that information in the background to someone else. Spyware can alsogather information about e-mail addresses and even passwords and credit cardnumbers.
Spyware's similarity to a Trojan horse is the fact that users unwittingly install theproduct when they install something else. A common way to become a victim ofspyware is to download certain peer-to-peer file swapping products that areavailable today.
Aside from the questions of ethics and privacy, spyware steals from the user byusing the computer's memory resources and also by eating bandwidth as it sendsinformation back to the spyware's home base via the user's Internet connection.Because spyware is usingmemory and system resources, the applications runningin the background can lead to system crashes or general system instability.
Startup itemsAny files placed in this folder will open when the computer starts. For example,a startup screen, a sound file to be played when the computer first starts, areminder calendar, or application programs can be startup items. Normally, analias of a file is placed in this folder rather than the file itself.
System trayIntroduced with Windows 95, the system tray is located in the Windows taskbar(usually at the bottom next to the clock) and contains miniature icons for easyaccess to system functions such as fax, printer, modem, volume, and more.Double click or right click an icon to view and access the details and controls.
TCP/IPTransmission Control Protocol/Internet Protocol - A set of networking protocolswidely used on the Internet that provides communications across interconnectednetworks of computers with diverse hardware architectures and various operatingsystems. TCP/IP includes standards for how computers communicate andconventions for connecting networks and routing traffic.
Glossary 114
BitDefender Security for SharePoint
TrojanA destructive program that masquerades as a benign application. Unlike viruses,Trojan horses do not replicate themselves but they can be just as destructive.One of the most insidious types of Trojan horse is a program that claims to ridyour computer of viruses but instead introduces viruses onto your computer.
The term comes from a story in Homer's Iliad, in which the Greeks give a giantwooden horse to their foes, the Trojans, ostensibly as a peace offering. But afterthe Trojans drag the horse inside their city walls, Greek soldiers sneak out of thehorse's hollow belly and open the city gates, allowing their compatriots to pour inand capture Troy.
UpdateA new version of a software or hardware product designed to replace an olderversion of the same product. In addition, the installation routines for updates oftencheck to make sure that an older version is already installed on your computer;if not, you cannot install the update.
BitDefender has it's own update module that allows you to manually check forupdates, or let it automatically update the product.
VirusA program or piece of code that is loaded onto your computer without yourknowledge and runs against your will. Most viruses can also replicate themselves.All computer viruses are manmade. A simple virus that can copy itself over andover again is relatively easy to produce. Even such a simple virus is dangerousbecause it will quickly use all available memory and bring the system to a halt.An even more dangerous type of virus is one capable of transmitting itself acrossnetworks and bypassing security systems.
Virus definitionThe binary pattern of a virus, used by the antivirus program to detect and eliminatethe virus.
WormA program that propagates itself over a network, reproducing itself as it goes. Itcannot attach itself to other programs.
Glossary 115
BitDefender Security for SharePoint