Top Banner
SHAREPOINT Administrator's guide
129

BitDefender Security for SharePoint Administration Guide En

Feb 22, 2015

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: BitDefender Security for SharePoint Administration Guide En

SHAREPOINT

Administrator's guide

Page 2: BitDefender Security for SharePoint Administration Guide En

BitDefender Security for SharePointAdministrator's guide

Published 2010.04.26

Copyright© 2010 BitDefender

Legal NoticeAll rights reserved. No part of this book may be reproduced or transmitted in any form or by any means, electronic ormechanical, including photocopying, recording, or by any information storage and retrieval system, without writtenpermission from an authorized representative of BitDefender. The inclusion of brief quotations in reviews may bepossible only with the mention of the quoted source. The content can not be modified in any way.

Warning and Disclaimer. This product and its documentation are protected by copyright. The information in thisdocument is provided on an “as is” basis, without warranty. Although every precaution has been taken in the preparationof this document, the authors will not have any liability to any person or entity with respect to any loss or damagecaused or alleged to be caused directly or indirectly by the information contained in this work.

This book contains links to third-party Websites that are not under the control of BitDefender, therefore BitDefenderis not responsible for the content of any linked site. If you access a third-party website listed in this document, youwill do so at your own risk. BitDefender provides these links only as a convenience, and the inclusion of the link doesnot imply that BitDefender endorses or accepts any responsibility for the content of the third-party site.

Trademarks. Trademark names may appear in this book. All registered and unregistered trademarks in this documentare the sole property of their respective owners, and are respectfully acknowledged.

BitDefender Security for SharePoint

Page 3: BitDefender Security for SharePoint Administration Guide En

She came to me one morning, one lonely Sunday morningHer long hair flowing in the mid-winter windI know not how she found me, for in darkness I was walkingAnd destruction lay around me, from a fight I could not win

BitDefender Security for SharePoint

Page 4: BitDefender Security for SharePoint Administration Guide En

Table of ContentsLicense and Warranty ..................................................... viiPreface ..................................................................... xii

1. Conventions Used in This Book . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xii1.1. Typographical Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xii1.2. Admonitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiii

2. The Book Structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiii3. Request for Comments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiv

Description ....................................................... 11. Features and Benefits ................................................ 2

Installation ........................................................ 42. System Requirements ................................................ 53. Installing BitDefender Security for SharePoint .................... 6

3.1. Fresh Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63.2. Modifying Existing Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9

4. Repairing or Removing BitDefender .............................. 104.1. Modify BitDefender . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104.2. Repair BitDefender . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114.3. Remove BitDefender . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11

Configuration and Management ............................ 125. Getting Started ...................................................... 136. Dashboard ........................................................... 15

6.1. Status Area . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 156.1.1. Server Scan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 166.1.2. Update Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 176.1.3. License Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19

6.2. Product Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20

7. Monitoring ............................................................ 217.1. Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22

7.1.1. Clearing Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 237.2. Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23

7.2.1. Managing Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 257.2.2. Creating Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 257.2.3. Clearing Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29

iv

BitDefender Security for SharePoint

Page 5: BitDefender Security for SharePoint Administration Guide En

7.3. Alerts & Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 307.3.1. Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 307.3.2. Alerts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 327.3.3. Alert Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36

7.4. Quarantine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 397.4.1. Managing Quarantine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 397.4.2. Clearing Quarantine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40

7.5. Scheduled Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 427.5.1. Managing Scheduled Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 427.5.2. On-demand Scanning Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 437.5.3. Update Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 497.5.4. Report Generation Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53

8. Server Scan .......................................................... 618.1. On-access Scanning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62

8.1.1. Configuring Microsoft SharePoint Antivirus Settings . . . . . . . . . . . . . . . . . . . . 638.1.2. Scanning Profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63

8.2. On-demand Scanning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 718.2.1. Scanning Files and Folders . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 728.2.2. Scanning Profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73

8.3. Testing Antivirus Protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79

9. Update ................................................................ 819.1. Update . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82

9.1.1. Update Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 829.1.2. Product Update . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82

9.2. Update Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 849.2.1. Configuring Update Schedule . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 849.2.2. Configuring Product Updates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85

9.3. Update Locations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 879.4. Update Notifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 889.5. Update Rollback . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89

10. General .............................................................. 9110.1. Report Virus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9110.2. Report Incidents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9210.3. Exporting/Importing Product Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93

10.3.1. Exporting Product Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9310.3.2. Importing Product Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93

11. License .............................................................. 9411.1. Purchase the full version of the product . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9411.2. Register the product . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9411.3. Register a BitDefender Account . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95

12. Help .................................................................. 98

v

BitDefender Security for SharePoint

Page 6: BitDefender Security for SharePoint Administration Guide En

Troubleshooting and Getting Help ......................... 9913. BitDefender Configuration Repair Tool ........................ 10014. BitDefender Support Tool ....................................... 10315. Support ............................................................ 105

15.1. Asking for Help . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10515.2. BitDefender Knowledge Base . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10515.3. Contact Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106

15.3.1. Web Addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10615.3.2. BitDefender Offices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106

Glossary .................................................................. 109

vi

BitDefender Security for SharePoint

Page 7: BitDefender Security for SharePoint Administration Guide En

License and WarrantyIF YOU DO NOT AGREE TO THESE TERMS AND CONDITIONS DO NOT INSTALLTHE SOFTWARE. BY SELECTING "I ACCEPT", "OK", "CONTINUE", "YES" OR BYINSTALLING OR USING THE SOFTWARE IN ANY WAY, YOU ARE INDICATINGYOUR COMPLETE UNDERSTANDING AND ACCEPTANCE OF THE TERMS OFTHIS AGREEMENT.

These Terms cover BitDefender Corporate Solutions and Services for Companieslicensed to you, including related documentation and any update and upgrade of theapplications delivered to you under the purchased license or any related serviceagreement as defined in the documentation and any copy of these items.

This License Agreement is a legal agreement between you (either an individual or alegal person) and BitDefender for use of BitDefender’s software product identifiedabove, which includes computer software and services, and may include associatedmedia, printedmaterials, and "online" or electronic documentation (hereafter designatedas "BitDefender"), all of which are protected by international copyright laws andinternational treaties. By installing, copying or using BitDefender, you agree to bebound by the terms of this agreement. If you do not agree to the terms of thisagreement, do not install or use BitDefender.

BitDefender License. BitDefender is protected by copyright laws and internationalcopyright treaties, as well as other intellectual property laws and treaties. BitDefenderis licensed, not sold.

GRANT OF LICENSE. BitDefender hereby grants you and only you the followingnon-exclusive, limited, non-transferable and royalty-bearing license to use BitDefender.

APPLICATION SOFTWARE. You may install and use BitDefender, on as manycomputers as necessary with the limitation imposed by the total number of licensedusers. You may make one additional copy for back-up purpose.

SERVER USER LICENSE. This license applies to BitDefender software that providesnetwork services and can be installed on computers that provide network services.You may install this software on as many computers as necessary within the limitationimposed by the total number of users to which these computers provide networkservices. This limitation refers to the total number of users that has to be less than orequal to the number of users of the license.

DESKTOP USER LICENSE. This license applies to BitDefender software that can beinstalled on a single computer or on a single operating system (any physical or virtualmachine running an operating system) and which does not provide network services

License and Warranty vii

BitDefender Security for SharePoint

Page 8: BitDefender Security for SharePoint Administration Guide En

(excepting the case when the desktop computer provides network services by runningBitDefender Management Server). Each user may install this software on a singlecomputer or on a single operating system and may make one additional copy forbackup on a different device. The number of users allowed is the number of the usersof the license.

SUITE LICENSE. This license applies to BitDefender Suites or software bundles.Such Suites or bundles are comprised of:

● server components that can be installed on as many computers or network serversas necessary while retaining the limitation imposed on the total number of clientmachines established by the license bought

● client components, that can be installed on a single desktop computer or on a singleoperating system (any physical or virtual machine running an operating system)which does not provide network services (excepting the case when the desktopcomputer provides network services by running BitDefender Management Server);the number of client machines allowed is less than or equal to the number of clientmachines for which the Suite License is granted. This limitation refers to the totalnumber of computers or operating systems licensed (any physical or virtual machinerunning an operating system).

TERMOF LICENSE. The license granted hereunder shall commence on the purchasingdate of BitDefender and shall expire at the end of the period for which the license ispurchased.

EXPIRATION. The product will cease to perform its functions immediately uponexpiration of the license.

UPGRADES. If BitDefender is labeled as an upgrade, you must be properly licensedto use a product identified by BitDefender as being eligible for the upgrade in orderto use BitDefender. A BitDefender labeled as an upgrade replaces and/or supplementsthe product that formed the basis for your eligibility for the upgrade. You may use theresulting upgraded product only in accordance with the terms of this LicenseAgreement. If BitDefender is an upgrade of a component of a package of softwareprograms that you licensed as a single product, BitDefender may be used andtransferred only as part of that single product package and may not be separated foruse by more than the total number of licensed users. The terms and conditions of thislicense replace and supersede any previous agreements that may have existedbetween you and BitDefender regarding the original product or the resulting upgradedproduct.

License and Warranty viii

BitDefender Security for SharePoint

Page 9: BitDefender Security for SharePoint Administration Guide En

COPYRIGHT. All rights, titles and interest in and to BitDefender and all copyright rightsin and to BitDefender (including but not limited to any images, photographs, logos,animations, video, audio, music, text, and "applets" incorporated into BitDefender),the accompanying printed materials, and any copies of BitDefender are owned byBitDefender. BitDefender is protected by copyright laws and international treatyprovisions. Therefore, you must treat BitDefender like any other copyrighted material.You may not copy the printed materials accompanying BitDefender. You must produceand include all copyright notices in their original form for all copies created irrespectiveof the media or form in which BitDefender exists. You may not sub-license, rent, sell,lease or share the BitDefender license. You may not reverse engineer, recompile,disassemble, create derivative works, modify, translate, or make any attempt to discoverthe source code for BitDefender.

LIMITED WARRANTY. BitDefender warrants that the media on which BitDefender isdistributed is free from defects for a period of thirty days from the date of delivery ofBitDefender to you. Your sole remedy for a breach of this warranty will be thatBitDefender , at its option, may replace the defective media upon receipt of thedamaged media, or refund the money you paid for BitDefender. BitDefender does notwarrant that BitDefender will be uninterrupted or error free or that the errors will becorrected. BitDefender does not warrant that BitDefender will meet your requirements.

EXCEPT AS EXPRESSLY SET FORTH IN THIS AGREEMENT, BITDEFENDERDISCLAIMS ALL OTHERWARRANTIES, EXPRESS OR IMPLIED, WITH RESPECTTOTHEPRODUCTS, ENHANCEMENTS,MAINTENANCEORSUPPORTRELATEDTHERETO, OR ANY OTHER MATERIALS (TANGIBLE OR INTANGIBLE) ORSERVICESSUPPLIEDBYHIM. BITDEFENDERHEREBYEXPRESSLYDISCLAIMSANY IMPLIED WARRANTIES AND CONDITIONS, INCLUDING, WITHOUTLIMITATION, THE IMPLIEDWARRANTIES OF MERCHANTABILITY, FITNESS FORA PARTICULAR PURPOSE, TITLE, NON INTERFERENCE, ACCURACY OF DATA,ACCURACY OF INFORMATIONAL CONTENT, SYSTEM INTEGRATION, AND NONINFRINGEMENT OF THIRD PARTY RIGHTS BY FILTERING, DISABLING, ORREMOVINGSUCHTHIRDPARTY’S SOFTWARE, SPYWARE, ADWARE, COOKIES,EMAILS, DOCUMENTS, ADVERTISEMENTS OR THE LIKE, WHETHER ARISINGBYSTATUTE, LAW,COURSEOFDEALING,CUSTOMANDPRACTICE,ORTRADEUSAGE.

DISCLAIMEROFDAMAGES. Anyone using, testing, or evaluating BitDefender bearsall risk to the quality and performance of BitDefender. In no event shall BitDefenderbe liable for any damages of any kind, including, without limitation, direct or indirectdamages arising out of the use, performance, or delivery of BitDefender, even ifBitDefender has been advised of the existence or possibility of such damages. SOMESTATES DO NOT ALLOW THE LIMITATION OR EXCLUSION OF LIABILITY FOR

License and Warranty ix

BitDefender Security for SharePoint

Page 10: BitDefender Security for SharePoint Administration Guide En

INCIDENTAL OR CONSEQUENTIAL DAMAGES, SO THE ABOVE LIMITATION OREXCLUSION MAY NOT APPLY TO YOU. IN NO CASE SHALL BITDEFENDER'SLIABILITY EXCEED THE PURCHASE PRICE PAID BY YOU FOR BITDEFENDER.The disclaimers and limitations set forth above will apply regardless of whether youaccept to use, evaluate, or test BitDefender.

IMPORTANT NOTICE TO USERS. THIS SOFTWARE IS NOT FAULT-TOLERANTAND IS NOT DESIGNED OR INTENDED FOR USE IN ANY HAZARDOUSENVIRONMENT REQUIRING FAIL-SAFE PERFORMANCE OR OPERATION. THISSOFTWARE IS NOT FOR USE IN THE OPERATION OF AIRCRAFT NAVIGATION,NUCLEAR FACILITIES, OR COMMUNICATION SYSTEMS, WEAPONS SYSTEMS,DIRECT OR INDIRECT LIFE-SUPPORT SYSTEMS, AIR TRAFFIC CONTROL, ORANY APPLICATION OR INSTALLATION WHERE FAILURE COULD RESULT INDEATH, SEVERE PHYSICAL INJURY OR PROPERTY DAMAGE.

GENERAL. This Agreement will be governed by the laws of Romania and byinternational copyright regulations and treaties. The exclusive jurisdiction and venueto adjudicate any dispute arising out of these License Terms shall be of the courts ofRomania.

Prices, costs and fees for use of BitDefender are subject to change without prior noticeto you.

In the event of invalidity of any provision of this Agreement, the invalidity shall notaffect the validity of the remaining portions of this Agreement.

BitDefender and BitDefender logos are trademarks of BitDefender. All other trademarksused in the product or in associated materials are the property of their respectiveowners.

The license will terminate immediately without notice if you are in breach of any of itsterms and conditions. You shall not be entitled to a refund from BitDefender or anyresellers of BitDefender as a result of termination. The terms and conditions concerningconfidentiality and restrictions on use shall remain in force even after any termination.

BitDefender may revise these Terms at any time and the revised terms shallautomatically apply to the corresponding versions of the Software distributed with therevised terms. If any part of these Terms is found void and unenforceable, it will notaffect the validity of rest of the Terms, which shall remain valid and enforceable.

In case of controversy or inconsistency between translations of these Terms to otherlanguages, the English version issued by BitDefender shall prevail.

License and Warranty x

BitDefender Security for SharePoint

Page 11: BitDefender Security for SharePoint Administration Guide En

Contact BitDefender, at 24 Preciziei Street, West Gate Park, Building H2, ground floor,Sector 6, Bucharest, Romania, or at Tel No: 40-21-206.34.70 or Fax: 40-21-264.17.99,e-mail address: [email protected].

License and Warranty xi

BitDefender Security for SharePoint

Page 12: BitDefender Security for SharePoint Administration Guide En

PrefaceThis guide is intended to all companies which have chosen BitDefender Security forSharePoint as a security solution for their SharePoint servers. The informationpresented in this book is suitable not only for computer literates, it is accessible toeveryone who is able to work under Windows.

This book will describe for you BitDefender Security for SharePoint, the Companyand the team who built it, will guide you through the installation process, will teachyou how to configure it. You will find out how to use BitDefender Security forSharePoint, how to update, test and customize it. You will learn how to get best fromBitDefender.

We wish you a pleasant and useful lecture.

1. Conventions Used in This Book1.1. Typographical Conventions

Several text styles are used in the book for an improved readability. Their aspect andmeaning are presented in the table below.

DescriptionAppearanceSyntax samples are printed with monospacedcharacters.

sample syntax

The URL links is pointing to some externallocation, on http or ftp servers.

http://www.bitdefender.com

E-mail messages are inserted in the text forcontact information.

[email protected]

This is an internal link, towards some locationinside the document.

“Preface” (p. xii)

File and directories are printed usingmonospaced font.

filename

All the product options are printed using strongcharacters.

option

Preface xii

BitDefender Security for SharePoint

Page 13: BitDefender Security for SharePoint Administration Guide En

DescriptionAppearanceThe code listing is printed with monospacedcharacters.

sample code listing

1.2. AdmonitionsThe admonitions are in-text notes, graphically marked, bringing to your attentionadditional information related to the current paragraph.

NoteThe note is just a short observation. Although you can omit it, the notes can providevaluable information, such as specific feature or a link to some related topic.

ImportantThis requires your attention and is not recommended to skip over it. Usually, it providesnon-critical but significant information.

WarningThis is critical information you should treat with increased caution. Nothing bad willhappen if you follow the indications. You should read and understand it, because itdescribes something extremely risky.

2. The Book StructureThe book consists of 4 parts, containing the major topics: Description, Installation,Configuration and Management, Troubleshooting and Getting Help. Moreover, aglossary is provided to clarify some technical terms.

Description. BitDefender Security for SharePoint and its features are presented toyou.

Installation. Step by step instructions for installing BitDefender on a workstation.This is a comprehensive tutorial on installing BitDefender Security for SharePoint.Starting with the prerequisites for a successfully installation, you are guided throughthe whole installation process. Finally, the removing procedure is described in caseyou need to uninstall BitDefender.

Configuration andManagement. Description of basic administration andmaintenanceof BitDefender. The chapters explain in detail all options of BitDefender Security forSharePoint, how to register and configure the product, how to scan the SharePointserver and how to perform the updates.

Preface xiii

BitDefender Security for SharePoint

Page 14: BitDefender Security for SharePoint Administration Guide En

Troubleshooting and Getting Help. Where to look and where to ask for help ifsomething unexpected appears.

Glossary. The Glossary tries to explain some technical and uncommon terms youwill find in the pages of this document.

3. Request for CommentsWe invite you to help us improve the book. We have tested and verified all of theinformation to the best of our ability. Please write to tell us about any flaws you findin this book or how you think it could be improved, to help us provide you with the bestdocumentation possible.

Let us know by sending an e-mail to [email protected].

ImportantPlease write all of your documentation-related e-mails in English so that we can processthem efficiently.

Preface xiv

BitDefender Security for SharePoint

Page 15: BitDefender Security for SharePoint Administration Guide En

Description

1

BitDefender Security for SharePoint

Page 16: BitDefender Security for SharePoint Administration Guide En

1. Features and BenefitsBitDefender Security for SharePoint performs on-access, real–time scanning ofuploaded and downloaded files in the document libraries and lists, with excellentcleanup rates, and an option to quarantine infected documents.

Whenever a file is uploaded or downloaded, it is immediately scanned. If theBitDefender Antivirus Scanner finds an infection, the file will be treated according tothe profile selected by the administrator. Additionally, BitDefender can be set to notifyadministrators about occurring events through mail or net send alerts.

On-Demand scanning features allow for scheduled system scans to be performedoutside of peak work hours without impacting the overall performance or availabilityof the system.

The advanced reporting and logging tools and integration with BitDefenderManagementServer further enhance the value of BitDefender Security for SharePoint, as a securitysolution for your collaboration needs.

Key Features● Deep integration with the SharePoint server to optimize and accelerate the scanningprocess

● Proactive heuristic protection against zero-day threats● Custom antivirus scanning profiles allow improved flexibility● Certified antivirus engines● Centralized management support through integration with BitDefender ManagementServer

BitDefender TechnologiesB-HAVE. BitDefender Security for SharePoint includes B-HAVE, a patent pendingtechnology which analyzes the behavior of potentially malicious codes, inside a virtualcomputer, eliminating false positives and significantly increasing detection rates fornew and unknown malware.

Certified Antivirus Engines. BitDefender's award winning scan engines featuringthe B-HAVE technology have been recognized by ICSA Labs, Virus Bulletin andCheckmark to provide the most proactive antivirus protection available.

Features and Benefits 2

BitDefender Security for SharePoint

Page 17: BitDefender Security for SharePoint Administration Guide En

Services● Advanced Update System

For permanent file protection, the solution receives the latest updates and patchesbased on three configurable technologies: on-demand, scheduled and automatic.

● Upgrades

Registered users benefit from free upgrades to any new version of the productduring the license period. Special price offers are also available to returningcustomers.

● Free 24/7 Professional Technical Support

Certified representatives provide BitDefender business customers with freepermanent support online, by telephone or e-mail. This is supplemented by an onlinedatabase with answers to Frequently Asked Questions and fixes for common issues.

Features and Benefits 3

BitDefender Security for SharePoint

Page 18: BitDefender Security for SharePoint Administration Guide En

Installation

4

BitDefender Security for SharePoint

Page 19: BitDefender Security for SharePoint Administration Guide En

2. System RequirementsBefore installing the product, make sure that the systemmeets the following minimumsystem requirements:

● Operating System:Microsoft Windows Server 2003 with SP1 (SP2 is recommended)

Microsoft Windows Server 2008 / Microsoft Windows Server 2008 R2

● Microsoft Office SharePoint Server 2007 or

● Microsoft Windows SharePoint Services 3.0

● Microsoft Internet Explorer version 6.0 or higher (level 1) or Mozilla Firefox version3.0 or higher (level 2)

● Minimum 1 GB of free space on the hard drive

System Requirements 5

BitDefender Security for SharePoint

Page 20: BitDefender Security for SharePoint Administration Guide En

3. Installing BitDefender Security for SharePointThe installation package contains other BitDefender Security for Windows Serversproducts besides BitDefender Security for SharePoint. You should install all theproducts you want to use at the same time. If you install only BitDefender Security forSharePoint, you will then need to modify the existing installation whenever otherBitDefender products are installed at a later time. As a result of this action, some filesmay need to be replaced, which may temporarily interfere with the operation of theexisting installed products.

Depending on whether or not you already have BitDefender products installed on thecomputer, there are two ways to install BitDefender Security for SharePoint:

● Fresh installation - no other product from the installation package is installed onthe computer.

● Modifying an existing installation - at least one other product from the installationpackage is already installed on the computer.

3.1. Fresh InstallationTo begin a fresh installation, locate the setup file and double-click it. A wizard willappear and you must follow its steps to complete installation.

Installing BitDefender Security for SharePoint 6

BitDefender Security for SharePoint

Page 21: BitDefender Security for SharePoint Administration Guide En

Installation Steps

Follow these steps to install BitDefender Security for SharePoint:

1. Click Next to continue or click Cancel if you want to quit installation.

2. Please read the License Agreement, select I accept the terms in the LicenseAgreement and click Next.

NoteIf you do not agree to these terms click Cancel. The installation process will beabandoned and you will exit setup.

3. You can see the list of all BitDefender products designed forWindows-based serversavailable in the installation package.

Installing BitDefender Security for SharePoint 7

BitDefender Security for SharePoint

Page 22: BitDefender Security for SharePoint Administration Guide En

Select BitDefender Security for SharePoint, click the corresponding arrow and thenclickWill be installed on local hard drive on the shortcut menu.

The default installation folder is displayed on the lower part of the window. To selecta different installation folder, click Browse, locate the folder and then click OK toset the location.

NoteYou can also install other BitDefender products for Windows-based servers. Selectthem as shown before. The items marked with a red cross will not be installed.

Click Next.4. Based on the system configuration and on the number of BitDefender products you

have chosen to install, BitDefender computes an optimal number of scanninginstances. Though not recommended, you may change this value for systems withpowerful multicore CPUs to speed up scanning.

Click Next.5. BitDefender Security for SharePoint contains an incident management module that

allows creating incident reports during product crashes. By agreeing to send theincident reports to the BitDefender Lab, you agree to help us find quick fixes forour bugs. You could make a major contribution to the development of a stableproduct that satisfies your needs. The reports will only be used for debuggingpurposes. They will never be used as commercial data or disclosed to third parties.

To send incident reports to the BitDefender Lab, select I agree to submit incidentreports to the BitDefender Lab and specify your e-mail address.

Click Next.6. If you do not want to view the readme file at the end of the installation, clear the

View Readme file check box.

BitDefender will need to start or reset the Internet Information Service during theinstallation process. You have to aknowledge this by selecting the check boxcorresponding to the information before the process can continue. Click Install inorder to begin the installation of the product.

7. Click Finish. You may be asked to restart the system so that the setup wizard cancomplete the installation process. We recommend doing so as soon as possible.

Installing BitDefender Security for SharePoint 8

BitDefender Security for SharePoint

Page 23: BitDefender Security for SharePoint Administration Guide En

3.2. Modifying Existing InstallationIn order to install BitDefender Security for SharePoint when one or more BitDefenderSecurity for Windows Servers products are already installed on the computer, youneed to follow these steps:

1. Follow the next path from the Windows Start Menu: Start → Programs →BitDefender Security for Windows Servers→ Modify, Repair or Uninstall.

NoteAlternatively, you can double click the BitDefender Security for Windows Serverssetup file.

A welcome window will appear, click Next to begin.

2. Select Modify.3. You have now reached Step 3 of the “Fresh Installation” (p. 6) wizard. Follow

steps 3 through 7 to complete the installation.

Installing BitDefender Security for SharePoint 9

BitDefender Security for SharePoint

Page 24: BitDefender Security for SharePoint Administration Guide En

4. Repairing or Removing BitDefenderIf you want to repair or remove BitDefender Security for SharePoint, follow the pathfrom the Windows start menu: Start → Programs → BitDefender Security forWindows Servers→ Modify, Repair or Uninstall.You will be requested to confirm your choice by clicking Next. A new window willappear where you can select:

● Modify - to add new BitDefender products for Windows-based servers or to removecurrently installed products.

● Repair - to re-install BitDefender Security for SharePoint.

● Remove - to remove all installed components.

Modify, Repair or Remove BitDefender

4.1. Modify BitDefenderThe BitDefender Security for SharePoint installation package is part of a bigger packagethat contains all available BitDefender Security for Windows Servers products.

If you chooseModify, a new window will appear from which you can select individualBitDefender products for installation or removal.

You should install all the products you want to use at the same time. To install aproduct, click the corresponding arrow and then select Will be installed on local

Repairing or Removing BitDefender 10

BitDefender Security for SharePoint

Page 25: BitDefender Security for SharePoint Administration Guide En

hard drive on the shortcut menu. To remove a product, click the corresponding arrowand then select Entire feature will be unavailable on the shortcut menu.

4.2. Repair BitDefenderIf BitDefender Security for SharePoint starts to perform unexpectedly, you can repairit in order to restore its functionality. The repair process consists in completelyre-installing the product.

If you choose Repair, a new window will appear. Click Repair to start the process.

ImportantDuring the repair process all BitDefender products installed on the computer willtemporarily cease to function.

4.3. Remove BitDefenderIf you want to uninstall all BitDefender products, choose Remove.

NoteWe recommend that you choose Remove for a clean re-installation.

If you choose to remove BitDefender, a new window will appear. Click Remove tostart unsinstalling BitDefender from your computer.

ImportantThis will remove all BitDefender Security for Windows Servers products from yourcomputer. If you have additional BitDefender products installed and only wish to removeBitDefender Security for SharePoint, please use the Modify option.

After the removal process is over, we recommend that you delete the BitDefenderfolder from Program Files.

An error occurred while removing BitDefenderIf an error has occurred while removing BitDefender, the removal process will beaborted and a new window will appear. Click Run UninstallTool to make sure thatBitDefender has been completely removed. The uninstall tool will remove all the filesand registry keys that were not removed during the automatic removal process.

Repairing or Removing BitDefender 11

BitDefender Security for SharePoint

Page 26: BitDefender Security for SharePoint Administration Guide En

Configuration and Management

12

BitDefender Security for SharePoint

Page 27: BitDefender Security for SharePoint Administration Guide En

5. Getting StartedBitDefender Security for SharePoint seamlessly integrates with Microsoft OfficeSharePoint Server 2007 . The management console provides access to all featuresand settings of BitDefender Security for SharePoint.

To open the management console, follow these steps:

1. Access the Microsoft Office SharePoint Server 2007 Central Administration page

2. On the top navigation bar, click Operations3. On the Operations page, in the BitDefender section, click BitDefender Security

for SharePoint.

NoteAlternatively, you can follow this path from theWindows start menu: Start→ Programs→ BitDefender Security for Windows Servers → BitDefender Security forSharePoint.

On the upper part of the page you can see the BitDefender menu:

● Home - displays the dashboard.

The dashboard provides you with useful information on the status of BitDefenderSecurity for SharePoint and helps you easily solve the issues that require yourattention.

● Monitoring - offers links to the following sections:Statistics - offers statistical information on the product activity.Reports - allows creating customized reports on the product activity.Alerts & Logs - allows configuring the logging options and sending alerts aboutthe events that occur during product operation, such as an update error or aninfected file detected.Quarantine - shows the quarantined files. These files were found to be infectedor suspect and were moved to the quarantine folder, according to the specifiedaction.Scheduled Tasks - allows creating scheduled tasks through an intuitive wizard.You can schedule updates, on-demand scanning processes and reports to begenerated.

● Server Scan - allows configuring BitDefender to scan the server.

● Update - allows updating BitDefender and configuring update settings.

Getting Started 13

BitDefender Security for SharePoint

Page 28: BitDefender Security for SharePoint Administration Guide En

● General - allows configuring BitDefender to send the BitDefender Lab reportsregarding the viruses found on the server and the incidents that occurred duringproduct operation, as well as exporting and importing product settings.

● License - allows registering BitDefender, creating a BitDefender account andaccessing a web page from where BitDefender can be purchased.

● Help - allows getting help and support and viewing version information.

Getting Started 14

BitDefender Security for SharePoint

Page 29: BitDefender Security for SharePoint Administration Guide En

6. DashboardTo see the dashboard, click Home in the BitDefender menu.

Dashboard

The dashboard provides you with useful information on the status of BitDefenderSecurity for SharePoint and helps you easily solve the issues that require your attention.You should check the dashboard frequently in order to quickly identify and solve theissues affecting the security of the server.

6.1. Status AreaThe Status area contains information about existing issues and helps you fix them.

Three status icons, monitoring three categories of issues, immediately inform youabout the existence of specific issues:

● Server Scan● Update Status● License Status

Dashboard 15

BitDefender Security for SharePoint

Page 30: BitDefender Security for SharePoint Administration Guide En

NoteThe License Status icon and the related issues are not available if BitDefender Securityfor SharePoint is managed by BitDefender Management Server.

To the left of the status icons you can see the number of issues affecting the securityof the server, if any.

The status icons can be green, orange or red, depending on the existing issues thataffect the security of the server:

● Green indicates that no issue requires your attention.● Orange indicates the existence of issues that pose medium security risks. Theseissues do not require your immediate attention, but you should check them as soonas possible.

● Red indicates the existence of critical security issues, which require your immediateattention.

Details about these issues, are displayed in the Issue Details section.

The Issue Details section contains three tables, one for each category. Each tabledisplays the monitored items and their current status. When there is an issueconcerning one of the monitored items, a red FIX link is displayed. To quickly solvethe existing issues, click the FIX links, one by one, or the Fix all issues button.

ImportantFor every monitored item, there is a check box selected by default in the Monitorcolumn. If you do not want a specific item to be monitored, just clear the correspondingcheck box.

6.1.1. Server ScanIf the Server Scan icon is orange or red, there are issues affecting the scanning activityof BitDefender Security for SharePoint.

Check the Server scan table to see the current status of Real-time protection.The issues that can be reported are listed in the following table:

DescriptionStatusReal-time protection is disabled and the server is notprotected against malware.

Scan files is off

Click Fix to enable real-time protection.

Dashboard 16

BitDefender Security for SharePoint

Page 31: BitDefender Security for SharePoint Administration Guide En

DescriptionStatusReal-time protection is enabled, but scanning files onupload and/or download has been disabled from theMicrosoft SharePoint antivirus settings page.

Scan files on upload /download is off

Click Fix to enable scaning files on upload anddownload.This feature has been disabled from the MicrosoftSharePoint antivirus settings page. Click Fix to enableit.

Attempt to clean infecteddocuments is off

The licensing period has expired. Click Fix to open theregistration page where you can register BitDefenderSecurity for SharePoint with a new license key.

Registration has expired

6.1.2. Update StatusIf the Update Status icon is orange or red, there are update issues affecting BitDefenderSecurity for SharePoint.

Check the Update Status table to see the monitored items and their current status.

● Last signature update status. The issues that can be reported are listed in thefollowing table:

DescriptionStatusContacting one or both update locations was notpossible during the last signature and/or productupdate process.

At least one updatelocation failed (AV UpdateLocation / Product UpdateLocation) Click Fix to initiate a new update.

Click Fix to initiate a new update. The status willchange to Updating (%percent).

No update was performed

You need to go to Update > Locations and select theAllow unsigned updates check box for your server.

Update failed because theupdates on your serverare not signed, and youchose not to allowunsigned updates

Dashboard 17

BitDefender Security for SharePoint

Page 32: BitDefender Security for SharePoint Administration Guide En

● Last product update. The issues that can be reported are listed in the followingtable:

DescriptionStatusAutomatic product updates are disabled, making youserver more vulnerable to security threats. Click Fixto enable automatic product updates.

Automatic productupdates are disabled

The new kit may come with new features andfunctionalities.

A new kit is available andit is not installed on yoursystem Click Fix to download and install the kit. You will have

to confirm your choice by clicking OK. Installing thekit might require a server reboot.A product update has been downloaded but is not yetinstalled.

Product updatedownloaded, please installit Click Fix to install the update.

● Signature updates older than one day status. The issues that can be reportedare listed in the following table:

DescriptionStatusMore than one day passed since the last update.Updates are oldClick Fix to initiate a new update. The status willchange to Updating (%percent).

● Automatic update status. The issues that can be reported are listed in the followingtable:

DescriptionStatusBitDefender Security for SharePoint is notautomatically updated on a regular basis.

Automatic update is offand no scheduled updatetask is defined and on Click Fix to enable automatic update. If not already

configured, the update interval is set to one hour.

Dashboard 18

BitDefender Security for SharePoint

Page 33: BitDefender Security for SharePoint Administration Guide En

6.1.3. License StatusIf the License Status icon is orange or red, there are issues concerning the license ofyour BitDefender Security for SharePoint.

NoteThe License Status button and the related issues are not available if BitDefender Securityfor SharePoint is managed by BitDefender Management Server. In this case, theregistration procedure is performed from the management console of BitDefenderManagement Server.

Check the License Status table to see the monitored items and their current status.

● Registration status. The issues that can be reported are listed in the followingtable:

DescriptionStatusThis status is displayed during the trial period. ClickFix to open the registration page where you can

You are using a trialversion of the product andyou should register it register BitDefender Security for SharePoint with a

new license key.You have entered an invalid license key. Click Fix toopen the registration page where you can register

The serial number youintroduced is not valid

BitDefender Security for SharePoint with a new licensekey.This status is displayed during the last 30 days of thelicensing period. Click Fix to open the registration

Your product registrationwill expire in x days. You

page where you can register BitDefender Security forSharePoint with a new license key.

should renew yourregistration

The licensing period has expired. Click Fix to openthe registration page where you can register

Product registrationexpired

BitDefender Security for SharePoint with a new licensekey.

● My account status. The issues that can be reported are listed in the followingtable:

Dashboard 19

BitDefender Security for SharePoint

Page 34: BitDefender Security for SharePoint Administration Guide En

DescriptionStatusYou have not registered an account yet. Click Fix toopen the My Account page where you can create anew account or log in to an existing one.

You do not have anaccount. Please create anaccount

Click Fix to open the My Account page where youcan create a new account or log in to an existing one.

The password youintroduced is incorrect.Please try again

Click Fix to open the My Account page where youcan create a new account or log in to an existing one.

Account locked

A connection with the BitDefender server could notbe established. Click Fix to open theMy Account pageand try again later.

Server error! Please tryagain later

● Registration will expire alert. The status of this item can change as shown in thefollowing table:

DescriptionStatusThis status is displayed during the last 30 days of thelicensing period. Click Fix to open the registration

You have x daysremaining from yourlicense key wizard and register BitDefender Security for

SharePoint with a new license key.The licensing period has expired.Product is expiredClick Fix to open the registration wizard and registerBitDefender Security for SharePoint with a new licensekey.

6.2. Product StatusThe information regarding the product status is displayed in theProduct status section.You can see the name of the server BitDefender Security for SharePoint is installedon, as well as the product version and the number of available malware signatures.

Dashboard 20

BitDefender Security for SharePoint

Page 35: BitDefender Security for SharePoint Administration Guide En

7. MonitoringTheMonitoring menu provides you with all the necessary means to monitor and controlthe product activity. The following sections are grouped under Monitoring:

● Statistics - offers statistical information on the product activity.

● Reports - allows creating customized reports on the product activity.

● Alerts & Logs - allows configuring the logging options and sending alerts about theevents that occur during product operation, such as an update error or an infectedfile detected.

● Quarantine - shows the quarantined files. These files were found to be infected orsuspect and were moved to the quarantine folder, according to the specified action.

● Scheduled Tasks - allows creating scheduled tasks through an intuitive wizard. Youcan schedule updates, on-demand scanning processes and reports to be generated.

In this chapter, you can find a detailed description of each section.

Monitoring 21

BitDefender Security for SharePoint

Page 36: BitDefender Security for SharePoint Administration Guide En

7.1. StatisticsIf you want to see detailed statistics regarding the real-time scanning activity ofBitDefender Security for SharePoint, go to Statistics under Monitoring in theBitDefender menu.

Statistics

BitDefender stores data about the objects scanned in real time in a database. Usingthis database, BitDefender offers detailed statistics that allow you to assess:

● the security status of the SharePoint server.

● the existing threats and their damage potential.

The following types of statistics are available:

DescriptionTypeProvides overall statistics on the real-time scanning activity ofBitDefender Security for SharePoint:

Summary

● number of scanned items.

Monitoring 22

BitDefender Security for SharePoint

Page 37: BitDefender Security for SharePoint Administration Guide En

DescriptionType● number of items found infected / suspicious / clean.● number of items that could not be scanned.● number of viruses detected.● number of riskware detected, as a total and by riskware type.● number of solved issues, as a total and by action type.

A pie chart displays the percentage of infected, suspicious, notscannable and clean files representing the total number ofscanned files.Shows the top 10 malware detected. These statistics areavailable on the lower part of the page.

Top Malware

The statistics are grouped into 4 time intervals: today, last week, last month and total.Click a link to access the corresponding statistics.

NoteThe statistics are refreshed every 60 seconds in order to provide you with real-timeinformation.

7.1.1. Clearing StatisticsBy default, BitDefender automatically clears statistical information older than oneweek. To change the time period for which statistics are to be stored, go to the PurgeOptions tab on the Statistics page.

Type in the edit box how many days / weeks / months statistical information shouldbe stored and click Apply to save the changes.

To clear statistics manually, select Delete all statistics now and click Apply.

NoteReports and statistics are created using the same database. Clearing statistics will alsoaffect the accuracy of the reports.

7.2. ReportsBitDefender allows creating reports regarding its scanning activity conducted over acertain period of time. You may find reports very useful, as you can print them or sendthem to other people interested in the security status of the server.

Monitoring 23

BitDefender Security for SharePoint

Page 38: BitDefender Security for SharePoint Administration Guide En

Reports can be generated in HTML, text or comma-separated values (CSV) format.You can create the following types of reports:

DescriptionReport TypeProvides complete information on the threats detected duringa specific time period.

Antivirus Total

Provides a table containing the threats detected during a specifictime period, ordered by number of files infected.

Top Viruses

The reports are saved in ?:\Program Files\BitDefender\BitDefenderSecurity for SharePoint\Reports\.

NoteReports are created based on the information in the BitDefender database, which is bydefault deleted every week. If the records were deleted sometime during the time periodcovered by the report, then the report will provide inaccurate information.

To create, view and manage reports, go to Reports under Monitoring.

ImportantIn the Reports section you can also find the on-demand scan reports.

Monitoring 24

BitDefender Security for SharePoint

Page 39: BitDefender Security for SharePoint Administration Guide En

Reports

All existing reports are listed in the table. For each report, the following information isprovided: the report name, the date when the report was generated, the type ofinformation it contains and the format.

7.2.1. Managing ReportsTo manage the reports, use the provided buttons:

● New Report - launches a wizard that will help you create a new report.

● Delete - deletes one or several selected reports.

● View Report - opens a selected report.

7.2.2. Creating ReportsTo create reports on the product activity, click New Report and follow the wizard thatwill appear.

Monitoring 25

BitDefender Security for SharePoint

Page 40: BitDefender Security for SharePoint Administration Guide En

Step 1/5 - Welcome to the Report Wizard.

Welcome

Click Next to continue.

Step 2/5 - Select Report Type

Select Report Type

Select one of the report types available.

DescriptionReport TypeProvides complete information on the threats detected duringa specific time period.

Antivirus Total

Monitoring 26

BitDefender Security for SharePoint

Page 41: BitDefender Security for SharePoint Administration Guide En

DescriptionReport TypeProvides a table containing the threats detected during a specifictime period, ordered by number of files infected.

Top Viruses

Click Next.

Step 3/5 - Select Report Format

Select Report Format

Select the format of the report file (HTML, text or CSV). Depending on your selection,the report will be created as an HTML, text or comma-separated values (CSV) file.

Click Next.

Monitoring 27

BitDefender Security for SharePoint

Page 42: BitDefender Security for SharePoint Administration Guide En

Step 4/5 - Select Time Interval

Select Time Interval

Select the time interval covered in the report:

● Last day● Last week● Last month● Custom

If you need information about the BitDefender activity related to a specific time interval,select Custom and specify the start and end date. To specify the start and stop dates,either type new values in the date fields or click the calendar icon and select datesfrom the calendar.

NoteThe date format is month/day/year.

Only the records from the specified period will appear in the report.

Click Next.

Monitoring 28

BitDefender Security for SharePoint

Page 43: BitDefender Security for SharePoint Administration Guide En

Step 5/5 - View Summary

View Summary

This window displays the selected report settings. You can make any changes byreturning to the previous steps. To do this, either click Back to go to the previous stepor select any step from the left-hand side of the window.

Click Finish to generate the report. The report will appear in the Reports section.

7.2.3. Clearing ReportsTo change the time period for which reports are to be stored, go to the Purge Optionstab on the Reports page. Enter the number of hours / days / weeks / months duringwhich to store reports and click Apply to save the changes.

To clear reports manually, select Delete all reports now and click Apply.

NoteReports older than the specified period will be automatically deleted.

Monitoring 29

BitDefender Security for SharePoint

Page 44: BitDefender Security for SharePoint Administration Guide En

7.3. Alerts & LogsThe Alerts & Logs page is where you can configure the BitDefender notificationsystem.

BitDefender is by default configured to keep a log of its activity. The BitDefender logprovides you with a comprehensive list of the events that occured during productoperation. To configure logging or view the log files, go to the Logs tab.

Moreover, you can configure BitDefender to immediately alert designated people aboutthe occurrence of certain events during product operation. Alerts can be sent throughmail or using the net send command. You can completely disable notifications foreach event or you can configure BitDefender to send mail and net send alerts whenthe event occurs. To configure alerts for each event, go to the Alerts tab.

NoteWindows Server 2008 does not provide support for net send alerts.

To configure the settings of the mail and net send alert notification services, go to theSettings tab

7.3.1. LogsBitDefender is by default configured to keep a log of its activity. The BitDefender logprovides you with a comprehensive list of the events that occured during productoperation.

NoteBy de fau l t , t he l og f i l e i s saved in : ?:\ProgramFiles\BitDefender\BitDefender for Windows ServersServices\BDLog.

To configure logging and view the log files, go to Alerts & Logs under Monitoring inthe BitDefender menu.

Monitoring 30

BitDefender Security for SharePoint

Page 45: BitDefender Security for SharePoint Administration Guide En

Logs

Examining LogsClick View last log to open the last log file.

Configuring LoggingTo log the product activity to a file, select Enable file logging.BitDefender creates the log file in?:\Program Files\BitDefender\BitDefenderfor Windows Servers Services\BDLog. By default, when the file reaches thesize limit of 1024 KB, a new log file is created.

Specify the size limit of the log files in the Maximum log size field. If you do not wantto limit the size of the log file, enter 0 in the edit field.

You can specify a different folder where files should be saved by providing its path inthe corresponding field.

Click Save to apply the changes.

Monitoring 31

BitDefender Security for SharePoint

Page 46: BitDefender Security for SharePoint Administration Guide En

7.3.2. AlertsYou can completely disable notifications for each event or you can configureBitDefender to send mail and net send alerts when the event occurs.

To specify the notification methods for each event, go to Alerts & Logs underMonitoring in the BitDefender menu and then the Alerts tab.

Alerts

All of the events that may occur are listed in the table. There are 3 types of events:

● Information - such events provide information about the product activity.

● Warning - such events provide critical information about aspects of the productactivity which require your attention.

● Error - such events provide information about errors that appear during productoperation.

Here is the list of the events that may appear:

Monitoring 32

BitDefender Security for SharePoint

Page 47: BitDefender Security for SharePoint Administration Guide En

DescriptionEventGroups all the errors that may appear duringproduct operation, such as service start failure.

BitDefender Error

Refers to the occurrence of an error during theupdate process.

Update Error

Occurs when an infected file or a file suspectedof being infected has been detected.

Infected/suspect file detected

Groups critical information regarding the activityof BitDefender.

BitDefender Warning

Occurs when a file could not be scanned byBitDefender.

File not scanned

Occurs when a product update is available.Product updateGroups information regarding the activity ofBitDefender.

BitDefender information

Indicates the expiration of the registration period.Key expiredIndicates that there are 3 days left before theproduct expires.

Key will expire

Occurs whenever an on-demand scan isperformed.

On-demand scanning

Contains information about the update process.Update informationOccurs whenever a report is generated.Report generated

Configuring EventsYou can configure the notification methods separately for each event in the list. Tocustomize the notifications for a specific event, select it and edit the available optionsfrom the Events settings section on the right-hand side of the page.

Enable/disable notificationsTo enable/disable notifications for one or several selected events, select/clear thecorresponding check box.

NoteIf event notification is disabled, the event is not logged and no alert is sent when it takesplace.

Monitoring 33

BitDefender Security for SharePoint

Page 48: BitDefender Security for SharePoint Administration Guide En

Select Event ImportanceSet the importance of the event from the Notification Settings section:

● Low - a record of the event is kept in the log file. No alert is sent when the eventtakes place.

● Medium - log the event and send mail alerts when the event takes place.

● High - log the event and send both mail and net send alerts when the event takesplace.

Configure Mail AlertsIf the importance of the event is medium or high, mail alerts will be sent. You can editthe alert text and specify the alert recipients.

Click Save to apply the changes.

● Each event comes with a default alert text which is displayed in the SMTP alertText box. To change this text, edit the contents of the text box.

ImportantYou should NOT modify the strings that begin with the $ symbol as they providevaluable information about the event.

● Alerts are sent by default to the addresses defined in the Settings tab. Provideadditional e-mail addresses in the SMTP recipients box to add recipients to thelist. Addresses must be separated by comma (",") or semicolon (";").

To import e-mail addresses from a txt file, click Import..., select the file and thenclickOpen. If you want to export the list to a txt file, click Export..., select a locationand click Save.

Configure Net Send AlertsIf the importance of the event is high, net send alerts will be sent. You can edit thealert text and specify the alert recipients.

● Each event comes with a default alert text which is displayed in the NetSend alertText box. To change this text, edit the contents of the text box.

ImportantYou should NOT modify the strings that begin with the $ symbol as they providevaluable information about the event.

Monitoring 34

BitDefender Security for SharePoint

Page 49: BitDefender Security for SharePoint Administration Guide En

● Alerts are sent by default to the computer names defined in the Settings tab. Provideadditional computer names in the NetSend recipients box to add recipients to thelist. Computer names must be separated by comma (",") or semicolon (";").

To import computer names from a txt file, click Import..., select the file and thenclickOpen. If you want to export the list to a txt file, click Export..., select a locationand click Save.

Click Save to apply the changes.

Monitoring 35

BitDefender Security for SharePoint

Page 50: BitDefender Security for SharePoint Administration Guide En

7.3.3. Alert SettingsAlerts are messages that include product-related information and which are meant toinform their recipients about the product activity. BitDefender can be set to notify usersand administrators about occurring events through mail or net send alerts.

To configure the alert notification services, go to Alerts & Logs under Monitoring inthe BitDefender menu and then the Settings tab.

Alert Settings

Mail AlertsBitDefender can notify the network administrator by sending configurable mail alertsin case an event for which they have been set takes place. Enabling this alert willprovide you with relevant and timely information about the status of your server, andmay eliminate the need to access the BitDefender management console.

NoteThis module integrates with an SMTP Server. It works with an ESMTP server as well,but it does not use the ESMTP protocol because it is implemented on SMTP.

In order to use the mail notification service, follow these steps:

Monitoring 36

BitDefender Security for SharePoint

Page 51: BitDefender Security for SharePoint Administration Guide En

1. Select Enable Mail Notification to activate the mail notification service

2. Configure the SMTP settings:

● SMTP Server - enter the IP address of the SMTP server that your network usesto send messages.

● From - enter the e-mail address that will appear in the sender field.

ImportantProvide a valid e-mail address for the SMTP server, otherwise the server maydecline to send an e-mail whose sender (e-mail address) is unknown to it.

3. If the SMTP server used to send messages requires authentication, select UseSMTP Server Authentication and enter the user name and password in thecorresponding fields.

NoteNTLM authentication is not supported.

4. Indicate the recipients of the mail alerts by entering their e-mail addresses in theGlobal SMTP Recievers text box. To remove e-mail addresses from the list, deletethem from the text box.

To import e-mail addresses from a txt file, click Import..., select the file and thenclick Open.If you want to export the list to a txt file, click Export... and save the file to thedesired location.

NoteThe recipients specified here will be alerted upon the occurrence of an event forwhich this type of alert has been set. To specify different recipients for each event,go to the Alerts tab and configure the events. For more information, please refer to“Configuring Events” (p. 33).

5. Click Save to apply the changes.

To disable this service, clear the Enable Mail Notification check box and click Save.

Monitoring 37

BitDefender Security for SharePoint

Page 52: BitDefender Security for SharePoint Administration Guide En

Net Send AlertsBitDefender can notify the network administrator by sending configurable alerts throughthe net send command upon the occurrence of an event for which they have beenset.

NoteThis module integrates with the Net Send command of the Windows Operating Systemon which the product is installed and it provides alerts regarding the product activity. Inorder to receive such alerts, the Messenger and Alert services must be enabled by theadministrator on the server and on the client workstations.

In order to use the net send notification service, follow these steps:

1. Select Enable Net Send to activate the net send notification service.

2. Indicate the recipients of the net send alerts by entering their computer names inthe Global NetSend Recievers text box. To remove recipients from the list, deletetheir computer names from the text box.

To import computer names from a txt file, click Import..., select the file and thenclick Open.If you want to export the list to a txt file, click Export... and save the file to thedesired location.

NoteThe recipients specified here will be alerted upon the occurrence of an event forwhich this type of alert has been set. To specify different recipients for each event,go to the Alerts tab and configure the events. For more information, please refer to“Configuring Events” (p. 33).

3. Click Save to apply the changes.

To disable this service, clear the Enable Net Send check box and click Save.

ImportantIn case of a virus outbreak it is not advisable to use this type of alert.

Monitoring 38

BitDefender Security for SharePoint

Page 53: BitDefender Security for SharePoint Administration Guide En

7.4. QuarantineBitDefender allows isolating infected or suspicious files in a secure area, namedquarantine. By isolating these files, the risk of getting infected disappears.

ImportantThe quarantine folder is common for both on-access and on-demand scanning.

To see the quarantined files and manage them, go to Quarantine under Monitoringin the BitDefender menu.

Quarantine

You can see the quarantined files listed in the table. For each quarantined file, thefollowing information is provided: the file name, the original location, the virus nameand the date when it was quarantined.

7.4.1. Managing QuarantineTo manage the quarantined files, use the provided buttons:

● Select all - select all quarantined items

Monitoring 39

BitDefender Security for SharePoint

Page 54: BitDefender Security for SharePoint Administration Guide En

● Delete - delete the selected quarantined files

● Restore - decrypt selected quarantined files and save them to a location selectedfrom the drop-down list:

disk location - select this option to restore the selected files on a location on thehard drive

web application location - select this option to restore the selected files to aweb application location

initial location - select this option to restore the selected files to their originallocation

Click to browse for a location.

This way you can open or execute quarantined files.

7.4.2. Clearing QuarantineBy default, quarantined files older than one week are automatically deleted. To changethe time period for which files are stored in the quarantine, go to the Purge Optionstab on the Quarantine page.

Purge Options

Monitoring 40

BitDefender Security for SharePoint

Page 55: BitDefender Security for SharePoint Administration Guide En

Type the number of days / weeks / months in the corresponding field.

To clear the quarantine manually, select Delete all items in quarantine now.Click Apply to save the changes

Monitoring 41

BitDefender Security for SharePoint

Page 56: BitDefender Security for SharePoint Administration Guide En

7.5. Scheduled TasksScheduled tasks provide great flexibility and help perform administrative security taskswithout increasing the workload and affecting the performance of the SharePointserver. You can set BitDefender to perform specific tasks one-time only or on a regularbasis according to a convenient schedule. You can schedule the following tasks:

● on-demand scanning processes.● update processes.● report generation tasks.

To create or configure scheduled tasks, go to Scheduled Tasks under Monitoringin the BitDefender menu.

Scheduled Tasks

You can see all the existing scheduled tasks listed in the table. For each task, thefollowing information is provided: the task type and name, the last time when it wasperformed, the next time it is scheduled to run and the status.

7.5.1. Managing Scheduled TasksTo manage the scheduled tasks, use these buttons:

Monitoring 42

BitDefender Security for SharePoint

Page 57: BitDefender Security for SharePoint Administration Guide En

● Run now - runs a selected scheduled task.● Enable/Disable - enables/disables one or several selected scheduled tasks.● New Task - launches a wizard that will help you create a new scheduled task.

NoteThe configuration wizard is different for each type of scheduled task.

● View Task - opens the configuration wizard for a selected scheduled task, allowingyou to modify it and to configure more advanced settings.

● Stop Task - stops the task that is currently running.● Delete - deletes one or several selected scheduled tasks. You will have to confirmyour choice by clicking Yes.

7.5.2. On-demand Scanning TasksScheduling Tasks

To create a new scheduled task, click New task. The configuration wizard will appearand it will guide you through the process of creating a scheduled task.

Follow these steps to schedule an on-demand scanning task:

Step 1/5 - Welcome to the Scheduled Tasks Wizard

Welcome

Click Next.

Monitoring 43

BitDefender Security for SharePoint

Page 58: BitDefender Security for SharePoint Administration Guide En

Step 2/5 - Select Task Type

Select Task Type

Provide the task name and then select On-demand Scanning Task.Click Next.

Step 3/5 - Configure Schedule

Configure the Task Schedule

Specify the task schedule.

You must choose one of the following options from the menu:

Monitoring 44

BitDefender Security for SharePoint

Page 59: BitDefender Security for SharePoint Administration Guide En

● Once - to run the task one time only, at a given moment.

Specify the start date and time in the Start Date / Start Time fields.

● Periodically - to run the task periodically, at certain time intervals (minutes, hours,days, weeks, months, years), starting with a specified date and time.

To configure the necessary settings, follow these steps:

1. Specify the start date in the Start Date field.

2. If you want to run the task repeatedly until a certain date, check End Date andspecify the end date in the corresponding field.

3. Specify the start time in the Start Time field.

4. Specify the task frequency by specifying the number of minutes / hours / days /weeks / months / years between two successive occurrences of such task, in thecorresponding field.

● Week Days - to run the task repeatedly only in certain days of the week startingwith a specified date and time.

To configure the necessary settings, follow these steps:

1. Specify the start date in the Start Date field.

2. If you want to run the task repeatedly until a certain date, check End Date andspecify the end date in corresponding field.

3. Specify the start time in the Start Time field.

4. Specify the day or days of the week on which the task should be run.

Click Next.

Monitoring 45

BitDefender Security for SharePoint

Page 60: BitDefender Security for SharePoint Administration Guide En

Step 4/5 - Select Scan Profile

Select Scan Profile

You can use one of the following scan profiles:

DescriptionScan ProfileThe SharePoint server is scanned for all types of malware.Packed files and archives are included in the scan. The

High

maximum archive depth scanned is 16. Please note thatonly files under 100 megabytes (MB) in size are scanned.Allows performing a quick scan of the server. Files arescanned for spyware and adware and the maximum archive

Low

depth scanned is 8. Only files under 50 megabytes (MB) insize are scanned.

Click Next.

Monitoring 46

BitDefender Security for SharePoint

Page 61: BitDefender Security for SharePoint Administration Guide En

Step 5/5 - View Summary

View Summary

This window displays the task settings. You can make any changes by returning tothe previous steps. To do this, either click Back to go to the previous step or selectany step from the left-hand side of the window.

Click Finish to save the scheduled task.

NoteThe task will appear on the Scheduled Tasks page.

Configuring PropertiesIn order to modify an existing scheduled task, select it and click View Task.The configuration wizard will appear. Select any step from the left-hand side of thewindow or click Next to follow the wizard step by step.

1. Welcome - the welcome screen.

2. Select Task Type - edit the name of the task.

3. Schedule Settings - modify the task schedule.

Specify the task schedule.

You must choose one of the following options from the menu:

● Once - to run the task one time only, at a given moment.

Monitoring 47

BitDefender Security for SharePoint

Page 62: BitDefender Security for SharePoint Administration Guide En

Specify the start date and time in the Start Date / Start Time fields.

● Periodically - to run the task periodically, at certain time intervals (minutes,hours, days, weeks, months, years), starting with a specified date and time.

To configure the necessary settings, follow these steps:

a. Specify the start date in the Start Date field.

b. If you want to run the task repeatedly until a certain date, check End Date andspecify the end date in the corresponding field.

c. Specify the start time in the Start Time field.

d. Specify the task frequency by specifying the number of minutes / hours / days/ weeks / months / years between two successive occurrences of such task,in the corresponding field.

● Week Days - to run the task repeatedly only in certain days of the week startingwith a specified date and time.

To configure the necessary settings, follow these steps:

a. Specify the start date in the Start Date field.

b. If you want to run the task repeatedly until a certain date, check End Date andspecify the end date in corresponding field.

c. Specify the start time in the Start Time field.

d. Specify the day or days of the week on which the task should be run.

4. Select Scanning Options - select one of the following scanning profiles:

DescriptionScan ProfileThe SharePoint server is scanned for all types ofmalware. Packed files and archives are included in the

High

scan. Themaximum archive depth scanned is 16. Pleasenote that only files under 100 megabytes (MB) in sizeare scanned.Allows performing a quick scan of the server. Files arescanned for spyware and adware and the maximum

Low

archive depth scanned is 8. Only files under 50megabytes (MB) in size are scanned.

Monitoring 48

BitDefender Security for SharePoint

Page 63: BitDefender Security for SharePoint Administration Guide En

5. Summary - displays the task settings. When you are done configuring the taskproperties, go to Summary and click Finish to save the settings. If you want toclose the configuration window without making any changes, click Cancel.

7.5.3. Update TasksScheduling Tasks

To create a new scheduled task, click New task. The configuration wizard will appearand it will guide you through the process of creating a scheduled task.

NoteThe scheduled update tasks will not deactivate the automatic update.

Follow these steps to schedule an update task:

Step 1/4 - Welcome to the Scheduled Tasks Wizard

Welcome

Click Next.

Monitoring 49

BitDefender Security for SharePoint

Page 64: BitDefender Security for SharePoint Administration Guide En

Step 2/4 - Select Task Type

Select Task Type

Provide the task name and then select Update Task.Click Next.

Step 3/4 - Configure Schedule

Configure the Task Schedule

Specify the task schedule.

You must choose one of the following options from the menu:

Monitoring 50

BitDefender Security for SharePoint

Page 65: BitDefender Security for SharePoint Administration Guide En

● Once - to run the task one time only, at a given moment.

Specify the start date and time in the Start Date / Start Time fields.

● Periodically - to run the task periodically, at certain time intervals (minutes, hours,days, weeks, months, years), starting with a specified date and time.

To configure the necessary settings, follow these steps:

1. Specify the start date in the Start Date field.

2. If you want to run the task repeatedly until a certain date, check End Date andspecify the end date in the corresponding field.

3. Specify the start time in the Start Time field.

4. Specify the task frequency by specifying the number of minutes / hours / days /weeks / months / years between two successive occurrences of such task, in thecorresponding field.

● Week Days - to run the task repeatedly only in certain days of the week startingwith a specified date and time.

To configure the necessary settings, follow these steps:

1. Specify the start date in the Start Date field.

2. If you want to run the task repeatedly until a certain date, check End Date andspecify the end date in corresponding field.

3. Specify the start time in the Start Time field.

4. Specify the day or days of the week on which the task should be run.

Click Next.

Monitoring 51

BitDefender Security for SharePoint

Page 66: BitDefender Security for SharePoint Administration Guide En

Step 4/4 - View Summary

View Summary

This window displays the task settings. You can make any changes by returning tothe previous steps. To do this, either click Back to go to the previous step or selectany step from the left-hand side of the window.

Click Finish to save the scheduled task.

NoteThe task will appear in the Scheduled Tasks section.

Configuring PropertiesIn order to modify an existing scheduled task, select it and click View Task.The configuration wizard will appear. Select any step from the left-hand side of thewindow or click Next to follow the wizard step by step.

1. Welcome - the welcome screen.

2. Select Task Type - edit the name of the task.

3. Schedule Settings - modify the task schedule.

Specify the task schedule.

You must choose one of the following options from the menu:

● Once - to run the task one time only, at a given moment.

Monitoring 52

BitDefender Security for SharePoint

Page 67: BitDefender Security for SharePoint Administration Guide En

Specify the start date and time in the Start Date / Start Time fields.

● Periodically - to run the task periodically, at certain time intervals (minutes,hours, days, weeks, months, years), starting with a specified date and time.

To configure the necessary settings, follow these steps:

a. Specify the start date in the Start Date field.

b. If you want to run the task repeatedly until a certain date, check End Date andspecify the end date in the corresponding field.

c. Specify the start time in the Start Time field.

d. Specify the task frequency by specifying the number of minutes / hours / days/ weeks / months / years between two successive occurrences of such task,in the corresponding field.

● Week Days - to run the task repeatedly only in certain days of the week startingwith a specified date and time.

To configure the necessary settings, follow these steps:

a. Specify the start date in the Start Date field.

b. If you want to run the task repeatedly until a certain date, check End Date andspecify the end date in corresponding field.

c. Specify the start time in the Start Time field.

d. Specify the day or days of the week on which the task should be run.

4. Summary - displays the task settings. When you are done configuring the taskproperties, go to Summary and click Finish to save the settings. If you want toclose the configuration window without making any changes, click Cancel.

7.5.4. Report Generation TasksScheduling Tasks

To create a new scheduled task, click New task. The configuration wizard will appearand it will guide you through the process of creating a scheduled task.

Follow these steps to schedule a report generation task:

Monitoring 53

BitDefender Security for SharePoint

Page 68: BitDefender Security for SharePoint Administration Guide En

Step 1/7 - Welcome to the Scheduled Tasks Wizard

Welcome

Click Next.

Step 2/7 - Select Task Type

Select Task Type

Provide the task name and then select Generate Report Task.Click Next.

Monitoring 54

BitDefender Security for SharePoint

Page 69: BitDefender Security for SharePoint Administration Guide En

Step 3/7 - Configure Schedule

Configure the Task Schedule

Specify the task schedule.

You must choose one of the following options from the menu:

● Once - to run the task one time only, at a given moment.

Specify the start date and time in the Start Date / Start Time fields.

● Periodically - to run the task periodically, at certain time intervals (minutes, hours,days, weeks, months, years), starting with a specified date and time.

To configure the necessary settings, follow these steps:

1. Specify the start date in the Start Date field.

2. If you want to run the task repeatedly until a certain date, check End Date andspecify the end date in the corresponding field.

3. Specify the start time in the Start Time field.

4. Specify the task frequency by specifying the number of minutes / hours / days /weeks / months / years between two successive occurrences of such task, in thecorresponding field.

● Week Days - to run the task repeatedly only in certain days of the week startingwith a specified date and time.

To configure the necessary settings, follow these steps:

1. Specify the start date in the Start Date field.

Monitoring 55

BitDefender Security for SharePoint

Page 70: BitDefender Security for SharePoint Administration Guide En

2. If you want to run the task repeatedly until a certain date, check End Date andspecify the end date in corresponding field.

3. Specify the start time in the Start Time field.

4. Specify the day or days of the week on which the task should be run.

Click Next.

Step 4/7 - Select Report Type

Select Report Type

Select one of the report types available.

DescriptionReport TypeProvides complete information on the threats detected duringa specific time period.

Antivirus Total

Provides a table containing the threats detected during a specifictime period, ordered by number of files infected.

Top Viruses

Click Next.

Monitoring 56

BitDefender Security for SharePoint

Page 71: BitDefender Security for SharePoint Administration Guide En

Step 5/7 - Select Report Format

Select Report Format

Select the format of the report file (HTML, text or CSV). Depending on your selection,the report will be created as an HTML, text or comma-separated values (CSV) file.

Click Next.

Step 6/7 - Select Time Interval

Select Time Interval

Select the time interval covered in the report:

Monitoring 57

BitDefender Security for SharePoint

Page 72: BitDefender Security for SharePoint Administration Guide En

● Last day● Last week● Last month● Custom

If you need information about the BitDefender activity related to a specific time interval,select Custom and specify the start and end date. To specify the start and stop dates,either type new values in the date fields or click the calendar icon and select datesfrom the calendar.

NoteThe date format is month/day/year.

Only the records from the specified period will appear in the report.

Click Next.

Step 7/7 - View Summary

View Summary

This window displays the task settings. You can make any changes by returning tothe previous steps. To do this, either click Back to go to the previous step or selectany step from the left-hand side of the window.

Click Finish to save the scheduled task.

Monitoring 58

BitDefender Security for SharePoint

Page 73: BitDefender Security for SharePoint Administration Guide En

NoteThe task will appear in the Scheduled Tasks section.

Configuring PropertiesIn order to modify an existing scheduled task, select it and click View Task.The configuration wizard will appear. Select any step from the left-hand side of thewindow or click Next to follow the wizard step by step.

1. Welcome - the welcome screen.

2. Select Task Type - edit the name of the task.

3. Schedule Settings - modify the task schedule.

Specify the task schedule.

You must choose one of the following options from the menu:

● Once - to run the task one time only, at a given moment.

Specify the start date and time in the Start Date / Start Time fields.

● Periodically - to run the task periodically, at certain time intervals (minutes,hours, days, weeks, months, years), starting with a specified date and time.

To configure the necessary settings, follow these steps:

a. Specify the start date in the Start Date field.

b. If you want to run the task repeatedly until a certain date, check End Date andspecify the end date in the corresponding field.

c. Specify the start time in the Start Time field.

d. Specify the task frequency by specifying the number of minutes / hours / days/ weeks / months / years between two successive occurrences of such task,in the corresponding field.

● Week Days - to run the task repeatedly only in certain days of the week startingwith a specified date and time.

To configure the necessary settings, follow these steps:

a. Specify the start date in the Start Date field.

b. If you want to run the task repeatedly until a certain date, check End Date andspecify the end date in corresponding field.

c. Specify the start time in the Start Time field.

Monitoring 59

BitDefender Security for SharePoint

Page 74: BitDefender Security for SharePoint Administration Guide En

d. Specify the day or days of the week on which the task should be run.

4. Select Report Type - select one of the following report types:

DescriptionReport TypeProvides complete information on the threats detected duringa specific time period.

Antivirus Total

Provides a table containing the threats detected during aspecific time period, ordered by number of files infected.

Top Viruses

5. Select Report Format - select the format of the report files: HTML, text or CSV6. Select Report Time Interval - select the time interval covered by the report:

● Last day● Last week● Last month● CustomIf you need information about the BitDefender activity related to a specific timeinterval, select Custom and specify the start and end date. To specify the start andstop dates, either type new values in the date fields or click the calendar iconand select dates from the calendar.

NoteThe date format is month/day/year.

Only the records from the specified period will appear in the report.

7. Summary - displays the task settings. When you are done configuring the taskproperties, go to Summary and click Finish to save the settings. If you want toclose the configuration window without making any changes, click Cancel.

Monitoring 60

BitDefender Security for SharePoint

Page 75: BitDefender Security for SharePoint Administration Guide En

8. Server ScanServer Scan allows configuring the way in which BitDefender scans the server.

BitDefender Security for SharePoint offers protection against various kinds of malware,such as viruses, spyware, adware, rootkits and so on. The product offers two layersof protection:

● On-access scanning - prevents users from downloading or uploading infected filesand thus causing the infection to spread. BitDefender scans files as they aredownloaded and uploaded according to the current protection level settings. Theactions to be taken on the infected and suspect files detected also depend on thecurrent protection level.

By default, on-access protection is set to the Medium level, which providesreasonable detection efficiency with low use of system resources. BitDefender isconfigured to disinfect infected files, deny access if disinfection fails and to denyaccess to suspect files. To customize on-access scanning, go toOn-access Scannerunder Server scan in the BitDefender menu.

NoteOn-access scanning is also referred to as real-time protection - files are scanned asthe users access them.

● On-demand scanning - allows detecting and removing the malware that alreadyresides on the server. This is the classic scan initiated by the administrator - youchoose what libraries, folders or files BitDefender should scan, and BitDefenderscans them.

To configure and initiate on-demand scanning, go to On-demand Scanner underServer scan in the BitDefender menu. There are several scan modes that you canrun. Use the custom mode to fully configure the scanning settings and the scantarget.

You can schedule on-demand scanning tasks to run at a specific time or on a regularbasis. To learn more, please refer to “Scheduled Tasks” (p. 42).

Server Scan 61

BitDefender Security for SharePoint

Page 76: BitDefender Security for SharePoint Administration Guide En

8.1. On-access ScanningThe on-access scanner keeps the server safe from new viruses, spyware and riskware.It also prevents users from downloading or uploading infected files and thus causingthe infection to spread throughout the network.

BitDefender scans files as they are uploaded or downloaded according to the currentscanning profile. The actions to be taken on the infected and suspect files detectedalso depend on the current protection level.

To configure the on-access scanner, go to On-access Scanner under Server scanin the BitDefender menu.

On-access Scanner

On-access scanning is enabled by default. If you want to disable it, clear the EnableBitDefender Security for SharePoint on-access scanner check box and click Save.

ImportantKeep on-access scanning enabled in order to protect the SharePoint server and theworkstations that use its resources against viruses, spyware and other malware.

Server Scan 62

BitDefender Security for SharePoint

Page 77: BitDefender Security for SharePoint Administration Guide En

8.1.1. Configuring Microsoft SharePoint Antivirus SettingsMicrosoft Office SharePoint Server 2007 allows you to configure general settings forvirus scanning from its Antivirus page.

You can access this page by clicking Configure Microsoft SharePoint AntivirusSettings on the BitDefender On-access scanner page.

The following settings can be configured:

● Antivirus Settings - select the options you want to enable:

Scan documents on upload

Scan documents on download

Allow users to download infected documents

Attempt to clean infected documents

● Antivirus Time Out - specify how long the virus scanner should run before timingout.

● Antivirus Threads - specify the number of execution threads on the server that thevirus scanner may use.

Click OK to save the selected settings.

NoteFor more information about configuring the Microsoft Office SharePoint Server 2007antivirus settings, please refer to the product documentation.

8.1.2. Scanning ProfilesTo open this section, go toOn-access Scanner under Server scan in the BitDefendermenu and select the On-access settings tab.

Server Scan 63

BitDefender Security for SharePoint

Page 78: BitDefender Security for SharePoint Administration Guide En

Scanning Profiles

This is where you can configure the real-time antivirus scanning profiles.

Managing ProfilesAll existing profiles appear in the Current scanning profile drop-down list. Select aprofile from the list and you can view its detailed settings in the Profile Settingssection.

The actions to be taken on the infected and suspect files detected are configurablefor each default scanning profile. For more information about default profiles, pleaserefer to “Configuring Default Scanning Profiles” (p. 65).If you want to configure the scan settings as well, you have to create custom profiles.For more information on how to create custom profiles, please refer to “CreatingCustom Scanning Profiles” (p. 67).To manage the scanning profiles, use the available buttons:

● Set the active scanning profile by selecting it from the drop-down list and clickingSave changes.

● Set the default scanning profile by selecting it from the drop-down list and clickingSet as default.

Server Scan 64

BitDefender Security for SharePoint

Page 79: BitDefender Security for SharePoint Administration Guide En

● Delete a profile by selecting it from the drop-down list and clicking Delete.

NoteDefault profiles can not be deleted.

● Create a new scanning profile by entering a name in the Create a new profile fieldand clicking Create.

Configuring Default Scanning ProfilesScanning profiles allow you to easily configure on-access scanning. You can use oneof the default scanning profiles or create custom profiles.

The default scanning profiles are described in the following table:

DescriptionScanningProfileOffers high security. The resource consumption level is moderate.High

● All downloaded and uploaded files, regardless of their extensionand size, are scanned.

● Files are scanned for all kinds of malware (viruses, Trojans,spyware, adware, riskware, dialers and so on).

● BitDefender scans inside archives.● The default action taken on infected files is Disinfect. Ifdisinfection fails, the files will be moved to quarantine.

● The default action taken on suspect files is Deny.

Offers standard security. The resource consumption level is low.Medium

● Only the files that do not exceed 10 megabytes (MB) arescanned.

● Files are scanned only for viruses, adware and spyware.● BitDefender does not scan inside archives.● The default action taken on infected files is Disinfect. Ifdisinfection fails, the files will be moved to quarantine.

● The default action taken on suspect files is Deny.

Covers basic security needs. The resource consumption level isvery low.

Low

Server Scan 65

BitDefender Security for SharePoint

Page 80: BitDefender Security for SharePoint Administration Guide En

DescriptionScanningProfile● Only the accessed application files that do not exceed 5megabytes (MB) are scanned.

● Files are scanned only for viruses, adware and spyware.● BitDefender does not scan inside archives.● The default action taken on infected files is Disinfect. Ifdisinfection fails, downloading or uploading such files is denied.

● The default action taken on suspect files is Deny.

Each default scanning profile allows configuring the actions to be taken on infectedand suspect files. When an infected or suspect file is detected, the first action in thecorresponding list is applied. If this action fails, the next action in the list is applied andso on.

You can change the order in which actions are to be applied. Select an action andclick or to move it up or down in the list.

Actions for infected files. The following actions are available for infected files:

DescriptionActionRemove the malware code from the infected files.Disinfection may fail in some cases, such as when theinfected file is inside specific mail archives.

Disinfect

Deny uploading or downloading of infected files by the users.DenyMove infected files from their original location to thequarantine folder. Quarantined files cannot be executed oropened; therefore, the risk of getting infected disappears.

Move to Quarantine

Immediately remove infected files from the server, withoutany warning.

Delete

Simply ignore the infected files.Ignore

WarningDo not set Ignore as the first action in the list. Doing thiswill allow users to download and upload ALL infected files.

Actions for suspect files. The following actions are available for suspect files:

Server Scan 66

BitDefender Security for SharePoint

Page 81: BitDefender Security for SharePoint Administration Guide En

DescriptionActionDeny uploading or downloading of infected files by the users.DenyMove suspect files from their original location to thequarantine folder. Quarantined files cannot be executed oropened; therefore, the risk of getting infected disappears.

Move to Quarantine

Immediately remove suspect files from the server, withoutany warning.

Delete

Simply ignore the infected files.IgnoreYou should not set this action the first in the list unless youexplicitly want ALL suspect files to be allowed to beuploaded and downloaded. This poses a high security risk,since some of these files are very likely to carry some formof malware.

Click Save Changes to apply the changes.

Creating Custom Scanning ProfilesIf you find that the default scanning profiles do not suit your needs, you can createyour own custom profiles. To create a custom profile, follow these steps:

1. Select a scanning profile from the list. The settings of the selected profile will bethe default settings of the new profile.

2. Enter the name of the profile in the Create a new profile field.3. Click Create.

The newly created profile will appear in the Current scanning profile drop-down list.To learn how to configure custom profiles, please refer to “Configuring CustomScanning Profiles” (p. 67).

Configuring Custom Scanning ProfilesTo configure the settings for a custom scanning profile, first you need to select it fromthe list. The following options can be configured from the Profile Settings section:

DescriptionSettingsConfigure the actions to be taken on the infected and suspectfiles detected by BitDefender.

Actions

Server Scan 67

BitDefender Security for SharePoint

Page 82: BitDefender Security for SharePoint Administration Guide En

DescriptionSettingsSelect the types of malware you want BitDefender tol scan for.Malware scannedConfigure BitDefender to scan packed files, archives or filesexceeding a configured size limit.

Advanced scansettings

Configure BitDefender to scan only files having specificextensions.

Filters

Configure ActionsYou can configure different actions for infected and suspect files. There is a list ofactions for each type of detected files (infected or suspect). When an infected orsuspect file is detected, the first action in the corresponding list is applied. If this actionfails, the next action in the list is applied and so on.

You can change the order in which actions are to be applied. Select an action andclick or to move it up or down in the list.

Actions for infected files. The following actions are available for infected files:

DescriptionActionRemove the malware code from the infected files.Disinfection may fail in some cases, such as when theinfected file is inside specific mail archives.

Disinfect

Deny uploading or downloading of infected files by the users.DenyMove infected files from their original location to thequarantine folder. Quarantined files cannot be executed oropened; therefore, the risk of getting infected disappears.

Move to Quarantine

Immediately remove infected files from the server, withoutany warning.

Delete

Simply ignore the infected files.Ignore

WarningDo not set Ignore as the first action in the list. Doing thiswill allow users to download and upload ALL infected files.

Actions for suspect files. The following actions are available for suspect files:

Server Scan 68

BitDefender Security for SharePoint

Page 83: BitDefender Security for SharePoint Administration Guide En

DescriptionActionDeny uploading or downloading of infected files by the users.DenyMove suspect files from their original location to thequarantine folder. Quarantined files cannot be executed oropened; therefore, the risk of getting infected disappears.

Move to Quarantine

Immediately remove suspect files from the server, withoutany warning.

Delete

Simply ignore the infected files.IgnoreYou should not set this action the first in the list unless youexplicitly want ALL suspect files to be allowed to beuploaded and downloaded. This poses a high security risk,since some of these files are very likely to carry some formof malware.

Configure Malware ScannedBitDefender can scan files not only for viruses, but also for riskware threats. To enableBitDefender to scan for riskware, in the Malware scanned section, first select theScan for riskware check box and then select which types of riskware BitDefenderwill scan for:

● Applications● Adware● Dialers● Spyware

Configure Advanced Scan SettingsThe following advanced settings can be configured from theAdvanced scan settingssection:

● Scan packed files - select this option to scan inside packed files.

● Scan inside archives - select this option to scan inside archives. Provide themaximum archive depth to scan in the Max archive depth field.

● Max file size to scan (KB) - select this option to set a maximum size for the filesBitDefender will scan. Enter the size in the corresponding field.

Server Scan 69

BitDefender Security for SharePoint

Page 84: BitDefender Security for SharePoint Administration Guide En

Configure FiltersSome file types are more likely to carry viruses than others. For example, the risk ofgetting infected when executing an .exe file is much higher than when opening a.txt or a .gif file.

To specify the file types to be scanned, select one of the following options from theFilters section:

DescriptionOptionAccessed files are scanned regardless of their type.Scan all extensionsOnly application files are scanned. This category islimited to files with the following extensions: .exe; .com;

Scan only application files

.dll; .ocx; .scr; .bin; .dat; .386; .vxd; .sys;

.wdm; .cla; .class; .ovl; .ole; .hlp; .doc; .dot;

.xls; .ppt; .wbk; .wiz; .pot; .ppa; .xla; .xlt;

.vbs; .vbe; .mdb; .rtf; .htm; .hta; .html; .xml;

.xtp; .php; .asp; .js; .shs; .chm; .lnk; .pif;

.prc; .url; .smm; .pdf; .msi; .ini; .csc; .cmd;

.bas; .bat; .drv; .cpl.

Viruses usually infect application files. Therefore, thesefile types should always be scanned on access.Only the files with the specified extensions are scanned.You must type in the edit field the file extensions to be

Scan custom extensions

scanned by BitDefender, separating them by semicolons(";").The files with the specified extensions are NOT scanned.You must type in the edit field the file extensions NOT

Scan all except thefollowing extensions

to be scanned by BitDefender, separating them bysemicolons (";").

You should not exclude from scanning file typescommonly known to carry viruses, such as .exe, .doc,.ppt, .xls, .rtf, .pif, .bat and others.

After completing the configuration for the custom profile, click Save changes to applythe settings.

Server Scan 70

BitDefender Security for SharePoint

Page 85: BitDefender Security for SharePoint Administration Guide En

8.2. On-demand ScanningOn-demand scanning provides an additional protection layer for the SharePoint server.You should periodically scan the server to make sure it is free from malware threats(viruses, spyware or rootkits). It is recommended to perform a comprehensive systemscan every week.

ImportantImmediately after installing BitDefender Security for SharePoint, please run anOn-Demand Scan to detect/clean any infections that might already be on the server.

To configure and initiate on-demand scanning, go to On-demand Scanner underServer scan in the BitDefender menu.

On-demand Scanner

On-demand scanning is based on scanning profiles. A scanning profile specifies:

● the locations (libraries, folders, files) to be scanned.

● the scan settings.

● the items excluded from scanning.

● the actions to be taken on the infected or suspect files detected.

Server Scan 71

BitDefender Security for SharePoint

Page 86: BitDefender Security for SharePoint Administration Guide En

For more information, please refer to “Scanning Profiles” (p. 73).

8.2.1. Scanning Files and FoldersHere are some tips regarding on-demand scanning:

● Avoid scanning the server when the server workload is at high levels, especially inthe case of a thorough scanning. It is recommended to perform scans when theserver is idle or nearly idle. For example, you should perform thorough system scansin weekends or at night.

● Before you start scanning, you should update BitDefender to enable it to detect thelatest malware discovered. To immediately update BitDefender, follow these steps:

1. In the BitDefender menu, click Update.2. On the Update tab, click Update Now.If you have created a scheduled scan task to run periodically, you should also createa scheduled update task to run a few minutes before the scan task.

ImportantIf you have disabled Automatic update or the update frequency is low, updatingBitDefender before scanning is a MUST.

● Perform a high scan once a week to make sure that no malware is lodged in thesystem. To this purpose, you can conveniently schedule an on-demand scanningtask to run every week. To learn more, please refer to “Scheduled Tasks” (p. 42).

To scan files and folders for malware threats, follow these steps:

1. Go to the On-demand scan tab.

2. Select a scanning profile.

3. Click Scan to start scanning.

During the scan, information regarding its progress is displayed:

● Scan status displays the activity of the scanner

● Current file scanned displays the name and path of the file that is being scannedat one time. A progress bar shows how the scan of each file progresses.

You can stop the scan at any time by clicking Cancel Scan.

Server Scan 72

BitDefender Security for SharePoint

Page 87: BitDefender Security for SharePoint Administration Guide En

A detailed scan report is created every time you perform an on-demand scan. ClickOn-demand scanning results to go to Reports where you can view the scan reports.

8.2.2. Scanning ProfilesTo open this section, go toOn-demand Scanner underServer scan in the BitDefendermenu and select the On-demand Settings tab.

On-demand Scanning Profiles

This is where you can configure the on-demand antivirus scanning profiles.

Managing ProfilesAll existing profiles appear in the Current scanning profile drop-down list. Select aprofile from the list and you can view its detailed settings in the Profile Settingssection.

The actions to be taken on the infected and suspect files detected are configurablefor each default scanning profile. For more information about default profiles, pleaserefer to “Configuring Default Scanning Profiles” (p. 74).

Server Scan 73

BitDefender Security for SharePoint

Page 88: BitDefender Security for SharePoint Administration Guide En

If you want to configure the scan settings as well, you have to create custom profiles.For more information on how to create custom profiles, please refer to “CreatingCustom Scanning Profiles” (p. 76).To manage the scanning profiles, use the available buttons:

● Set the active scanning profile by selecting it from the drop-down list and clickingSave changes.

● Delete a scanning profile by selecting it from the drop-down list and clicking Delete.

NoteDefault scanning profiles can not be deleted.

● Create a new scanning profile by entering a name in the Create a new profile fieldand clicking Create.

● View the scan location of a default profile or select the scan location of a customprofile by clicking Choose scan location.

Configuring Default Scanning ProfilesScanning profiles allow you to easily configure on-demand scanning. You can useone of the default scanning profiles or create custom profiles.

The default scanning profiles are described in the following table:

DescriptionScaning ProfileAllows performing a comprehensive scan of CentralAdministration and all the sites. The pre-defined scansettings offer the highest detection efficiency.

High

By default, BitDefender is configured to take the followingactions:

● Disinfect infected files. If disinfection fails, the files willbe moved to quarantine.

● Move suspect files to quarantine.

Allows a quick scan of all sites using a pre-definedconfiguration of the scan settings. Only files that do notexceed 5 megabytes (MB) are scanned.

Low

Server Scan 74

BitDefender Security for SharePoint

Page 89: BitDefender Security for SharePoint Administration Guide En

DescriptionScaning ProfileBy default, BitDefender is configured to take the followingactions:

● Disinfect infected files. If disinfection fails, the files willbe moved to quarantine.

● Move suspect files to quarantine.

Each default scanning profile allows configuring the actions to be taken on infectedand suspect files. When an infected or suspect file is detected, the first action in thecorresponding list is applied. If this action fails, the next action in the list is applied andso on.

You can change the order in which actions are to be applied. Select an action andclick or to move it up or down in the list.

Actions for infected files. The following actions are available for infected files:

DescriptionActionRemove the malware code from the infected files.Disinfection may fail in some cases, such as when theinfected file is inside specific mail archives.

Disinfect

Move infected files from their original location to thequarantine folder. Quarantined files cannot be executed oropened; therefore, the risk of getting infected disappears.

Move to Quarantine

Immediately remove infected files from the server, withoutany warning.

Delete

Simply ignore the infected files.Ignore

WarningDo not set Ignore as the first action in the list. Doing thiswill allow users to download and upload ALL infected files.

Actions for suspect files. The following actions are available for suspect files:

Server Scan 75

BitDefender Security for SharePoint

Page 90: BitDefender Security for SharePoint Administration Guide En

DescriptionActionMove suspect files from their original location to thequarantine folder. Quarantined files cannot be executed oropened; therefore, the risk of getting infected disappears.

Move to Quarantine

Immediately remove suspect files from the server, withoutany warning.

Delete

Simply ignore the infected files.IgnoreYou should not set this action the first in the list unless youexplicitly want ALL suspect files to be allowed to beuploaded and downloaded. This poses a high security risk,since some of these files are very likely to carry some formof malware.

Click Save Changes to apply the changes.

Creating Custom Scanning ProfilesIf you find that the default scanning profiles do not suit your needs, you can createyour own custom profiles. To create a custom profile, enter its name in the Create anew profile field and clickCreate. The newly created profile will appear in theCurrentscanning profile drop-down list. To learn how to configure custom profiles, pleaserefer to “Configuring Custom Scanning Profiles” (p. 76).

Configuring Custom Scanning ProfilesTo configure the settings for a custom scanning profile, first you need to select it fromthe list. The following options can be configured from the Profile Settings section:

DescriptionSettingsConfigure the actions to be taken on the infected and suspectfiles detected by BitDefender.

Actions

Select the types of malware you want BitDefender tol scan for.Malware scannedConfigure BitDefender to scan packed files, archives or filesexceeding a configured size limit.

Advanced scansettings

Configure BitDefender to scan only files having specificextensions.

Filters

Server Scan 76

BitDefender Security for SharePoint

Page 91: BitDefender Security for SharePoint Administration Guide En

Configure ActionsYou can configure different actions for infected and suspect files. There is a list ofactions for each type of detected files (infected or suspect). When an infected orsuspect file is detected, the first action in the corresponding list is applied. If this actionfails, the next action in the list is applied and so on.

You can change the order in which actions are to be applied. Select an action andclick or to move it up or down in the list.

Actions for infected files. The following actions are available for infected files:

DescriptionActionRemove the malware code from the infected files.Disinfection may fail in some cases, such as when theinfected file is inside specific mail archives.

Disinfect

Move infected files from their original location to thequarantine folder. Quarantined files cannot be executed oropened; therefore, the risk of getting infected disappears.

Move to Quarantine

Immediately remove infected files from the server, withoutany warning.

Delete

Simply ignore the infected files.Ignore

WarningDo not set Ignore as the first action in the list. Doing thiswill allow users to download and upload ALL infected files.

Actions for suspect files. The following actions are available for suspect files:

DescriptionActionMove suspect files from their original location to thequarantine folder. Quarantined files cannot be executed oropened; therefore, the risk of getting infected disappears.

Move to Quarantine

Immediately remove suspect files from the server, withoutany warning.

Delete

Simply ignore the infected files.Ignore

Server Scan 77

BitDefender Security for SharePoint

Page 92: BitDefender Security for SharePoint Administration Guide En

DescriptionActionYou should not set this action the first in the list unless youexplicitly want ALL suspect files to be allowed to beuploaded and downloaded. This poses a high security risk,since some of these files are very likely to carry some formof malware.

Configure Malware ScannedTo enable BitDefender to scan not only for viruses, but also for riskware, in theMalwarescanned section, select the Scan for riskware check box. Select the types of riskwareBitDefender will scan for by selecting the corresponding check boxes:

DescriptionOptionScans for legitimate applications that can be used as aspying tool, to hide malicious applications or for othermalicious intent

Applications

Scans for adware threatsAdwareScans for applications dialing premium rate phonenumbers

Dialers

Scans for known spyware threatsSpyware

Configure Advanced Scan SettingsThe following advanced settings can be configured from theAdvanced scan settingssection:

● Scan packed files - select this option to scan inside packed files.

● Scan inside archives - select this option to scan inside archives. Provide themaximum archive depth to scan in the Max archive depth field.

● Max file size to scan (KB) - select this option to set a maximum size for the filesBitDefender will scan. Enter the size in the corresponding field.

Configure FiltersSome file types are more likely to carry viruses than others. For example, the risk ofgetting infected when executing an .exe file is much higher than when opening a.txt or a .gif file.

Server Scan 78

BitDefender Security for SharePoint

Page 93: BitDefender Security for SharePoint Administration Guide En

To specify the file types to be scanned, select one of the following options from theFilters section:

DescriptionOptionFiles are scanned regardless of their type.Scan all extensionsOnly application files are scanned. This category islimited to files with the following extensions: .exe; .com;

Scan only application files

.dll; .ocx; .scr; .bin; .dat; .386; .vxd; .sys;

.wdm; .cla; .class; .ovl; .ole; .hlp; .doc; .dot;

.xls; .ppt; .wbk; .wiz; .pot; .ppa; .xla; .xlt;

.vbs; .vbe; .mdb; .rtf; .htm; .hta; .html; .xml;

.xtp; .php; .asp; .js; .shs; .chm; .lnk; .pif;

.prc; .url; .smm; .pdf; .msi; .ini; .csc; .cmd;

.bas; .bat; .drv; .cpl.

Viruses usually infect application files. Therefore, thesefile types should always be scanned.Only the files with the specified extensions are scanned.You must type in the edit field the file extensions to be

Scan custom extensions

scanned by BitDefender, separating them by semicolons(";").The files with the specified extensions are NOT scanned.You must type in the edit field the file extensions NOT

Scan all except thefollowing extensions

to be scanned by BitDefender, separating them bysemicolons (";").

You should not exclude from scanning file typescommonly known to carry viruses, such as .exe, .doc,.ppt, .xls, .rtf, .pif, .bat and others.

After completing the configuration for the custom profile, click Save changes to applythe settings.

8.3. Testing Antivirus ProtectionYou can verify that the BitDefender Antivirus component works properly with the helpof a special test file, known as the EICAR Standard Anti-virus Test file. EICAR standsfor the European Institute of Computer Anti-virus Research. This is a dummy file,detected by antivirus products.

Server Scan 79

BitDefender Security for SharePoint

Page 94: BitDefender Security for SharePoint Administration Guide En

The file can be created using any text editor, provided the file is saved in standardMS-DOS ASCII format and is 68 bytes long. It might also be 70 bytes if the editor putsa CR/LF at the end.

The file must contain the following single line:

X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*

Save the file under any name with a COM extension (for example EICAR.COM) andupload it to a library. BitDefender must treat this file as an infected document.

You can visit the EICAR website at http://eicar.com, read the documentation anddownload the file from one of the locations on the following web page:http://eicar.com/anti_virus_test_file.htm.

Server Scan 80

BitDefender Security for SharePoint

Page 95: BitDefender Security for SharePoint Administration Guide En

9. UpdateNew viruses and spyware are found and identified every day. This is why it is veryimportant to keep BitDefender up to date with the latest signatures.

The automatic update feature allows updating BitDefender automatically, on a regularbasis, without the administrator's intervention. By default, BitDefender automaticallychecks for updates every hour. If newmalware signatures or scanning engine updatesare detected, BitDefender will automatically download and install them.

The update can also be done anytime you want by clicking Update now from theUpdate section or by creating a scheduled update task.

Updates can be classified in the following ways:

● Antivirus updates - the files containing virus and spyware signatures, as well asthe scanning engine, are updated to ensure permanent protection against the newthreats that appear.

● Product updates - when a new product version is released, new features and scantechniques are introduced to the effect of improving the product's performance.

Update 81

BitDefender Security for SharePoint

Page 96: BitDefender Security for SharePoint Administration Guide En

9.1. UpdateTo find out information on the update status and if updates are available, click Updatein the BitDefender menu.

Update

9.1.1. Update InformationIn the Update Information section, you can see the update status and when the lastupdate check and update were performed.

If you want to update BitDefender immediately, just click Update Now. The Updatemodule will check the specified update locations for updates. If newmalware signaturesor scanning engine updates are detected, BitDefender will automatically downloadand install them.

9.1.2. Product UpdateThe product updates are different from the signature updates. Their function is todeliver bug fixes and new features to the product.

There are two types of updates for the product:

Update 82

BitDefender Security for SharePoint

Page 97: BitDefender Security for SharePoint Administration Guide En

● product updates (patches) - these are files that bring improvements to the currentproduct; they are usually smaller size updates that do not require a new version ofthe product to be delivered.

● version updates - these are installation packages of a new released version of theproduct.

NoteIn order not to interfere with the server's operation, by default product updates are notautomatically installed. Go to the Update section periodically to see if there are anyproduct updates available and to install them. For more information on how to enableand configure automatic product updates, please refer to “Configuring Product Updates”(p. 85).

When a new patch is available, it is downloaded on the local computer and informationabout it is displayed. You can then choose if you want to install it immediately orschedule it for a later date.

When a newer version of BitDefender Security for SharePoint is available, you willsee information about that version. Also, you will be provided with a link to the webpage where you can download the installation package from. Click the respective linkand download and install the new version.

Update 83

BitDefender Security for SharePoint

Page 98: BitDefender Security for SharePoint Administration Guide En

9.2. Update SettingsTo configure the update frequency and the product update settings, click Update inthe BitDefender menu and then the Settings tab.

Update Settings

9.2.1. Configuring Update ScheduleThere are two ways to update BitDefender Security for SharePoint on a regular basis:

● Using the automatic update. The automatic update feature allows updatingBitDefender automatically, on a regular basis, without the administrator's intervention.By default, BitDefender checks for updates at the specified update locations, everyhour. If new malware signatures or scanning engine updates are detected,BitDefender will automatically download and install them.

ImportantKeep automatic update enabled in order to be protected against the latest threats.

To change the frequency at which BitDefender checks for updates, select the numberof hours between two consecutive checks for updates from the Automatic update

Update 84

BitDefender Security for SharePoint

Page 99: BitDefender Security for SharePoint Administration Guide En

interval drop-down list. To disable the automatic update, clear the check boxcorresponding to Automatic update interval.Click Apply to save the changes.

● Using a scheduled update task. Scheduled update tasks allow automaticallyupdating the BitDefender malware signatures and scanning engines according toa convenient schedule. For more information, please refer to “Update Tasks” (p.49).

NoteScheduled update tasks will not de-activate automatic update so that the updatelocations will be checked for new updates on a regular basis.

9.2.2. Configuring Product UpdatesInstalling product updates regularly is essential to the security of your server. Dependingon the level of interference with the server, there are three types of product updates:

● product updates that do not require stopping server traffic or to reboot the server● product updates that require stopping server traffic, but do not require to reboot theserver

● product updates that require to reboot the server

To configure automatic downloads and installation for each type of product update,select one of the following options:

● Download updates and install automaticallySelect this option and BitDefender will automatically download and install productupdates. This is the recommended choice for product updates that do not requirestopping server traffic or a server reboot.

● Download updates automatically and install... at...Select this option if you want BitDefender to install available updates at certaintimes. Select from the corresponding drop-down lists the date (day and time) whenyou want this to happen.

This way you can configure BitDefender to perform product updates at times whenit is least likely for interferences to occur with server activity (during night time, forexample).

● Download updates and let me decide when to install them

Update 85

BitDefender Security for SharePoint

Page 100: BitDefender Security for SharePoint Administration Guide En

Select this option if you want BitDefender to automatically download product updates,but let you decide when to install them. This is the recommended choice for productupdates that require stopping server traffic or a server reboot.

To disable automatic product updates, select the No automatic product updatescheck box.

NoteYour server will be more vulnerable unless you install updates regularly.

Click Apply to save the changes.

Update 86

BitDefender Security for SharePoint

Page 101: BitDefender Security for SharePoint Administration Guide En

9.3. Update LocationsTo set the update locations, click Update in the BitDefender menu and then theLocations tab.

Update Locations

BitDefender can update from the local network, over the Internet, directly or througha proxy server.

For more reliable and faster updates, you can configure two update locations: a Firstupdate location and a Second update location. Both require the configuration ofthe following options:

● Update location - type the address of the update server. By default, the primaryupdate location is: upgrade.bitdefender.com.

NoteIf you are connected to a local network that has BitDefender virus signatures placedlocally, you can change the location of the updates here.

● Allow unsigned updates - select this option to allow updates from a local serverto be installed.

Update 87

BitDefender Security for SharePoint

Page 102: BitDefender Security for SharePoint Administration Guide En

● Use proxy - select this option if the company uses a proxy server. The followingsettings must be specified:

IP/Name - type the IP of the proxy server.

Port - type the port BitDefender uses to connect to the proxy server.

User - type a user name recognized by the proxy.

Password - type the valid password of the previously specified user.

Click Apply to save the changes.

9.4. Update NotificationsBitDefender can be configured to notify you about special events that occur during itsoperation. To specify which update events should BitDefender notify you about, clickUpdate in the BitDefender menu and then the Notifications tab.

Update Notifications

Select the update events you want to be informed about:

● Update performed - when an update was performed.

● No update available - when no update is available.

Update 88

BitDefender Security for SharePoint

Page 103: BitDefender Security for SharePoint Administration Guide En

● Update failed - when an error occurred during an update and the update failed.

● Product update available - when a product update is available.

To configure BitDefender only to log the occurrence of an event, or also to alert youabout it through mail or netsend, go to Monitoring>Alerts & Logs, Alerts tab andconfigure the corresponding event. For more information, please refer to “ConfiguringEvents” (p. 33).Click Apply to save the changes.

9.5. Update RollbackIf you have performed a product update since first installing BitDefender, you canalways revert to the previous product version using the Rollback feature. This featureis very useful in case the product starts behaving unexpectedly. To see if there is anyrollback available, click Update in the BitDefender menu and then the Rollback tab.

Update Rollback

If a rollback is available, the current product version and the version you can roll backto will be displayed. Click Roll Back and confirm your choice by clicking Yes in theconfirmation window to perform the rollback action.

Update 89

BitDefender Security for SharePoint

Page 104: BitDefender Security for SharePoint Administration Guide En

After a rollback is performed, the version currently in use and the previous version willbe displayed. You can use the provided link to update back to the newer version.

Update 90

BitDefender Security for SharePoint

Page 105: BitDefender Security for SharePoint Administration Guide En

10. GeneralThis is where you can configure BitDefender to send the BitDefender Lab reportsregarding the viruses found on the server and the incidents that occurred during productoperation, and where you can import/export product settings.

10.1. Report VirusReal-time Virus Reporting (RTVR) allows sending reports about the viruses found onyour server to the BitDefender Lab in order to help us identify new viruses and findquick remedies for them. Your contribution could be essential for developing new toolsto protect you and other users against virus threats.

The reports will not contain any personally identifiable data, such as your name, IPaddress or others. The information supplied will contain only the name of the country,the virus name, the number of infected files and the total number of scanned files.The reports themselves are used only for statistic purposes and will never be usedas commercial data or disclosed to third parties.

To configure Real-time Virus Reporting, go to Report Virus under General in theBitDefender menu.

Report Virus

General 91

BitDefender Security for SharePoint

Page 106: BitDefender Security for SharePoint Administration Guide En

Real-time Virus Reporting is disabled by default. To activate it, follow these steps:

1. Select Enable real-time virus reports.2. Click Apply to save the changes.

10.2. Report IncidentsBitDefender Security for SharePoint contains an incident management module thatallows creating incident reports during product crashes. By agreeing to send theincident reports to the BitDefender Lab, you agree to help us find quick fixes for ourbugs. You could make a major contribution to the development of a stable productthat satisfies your needs. The reports will only be used for debugging purposes. Theywill never be used as commercial data or disclosed to third parties.

To configure the incident management module, go toReport Incidents underGeneralin the BitDefender menu.

Report Incidents

By default, the reports created automatically during product crashes are not sent tothe BitDefender Lab. To configure BitDefender to send incident reports to theBitDefender Lab, follow these steps:

1. Select I agree to submit incident reports to the BitDefender Lab.

General 92

BitDefender Security for SharePoint

Page 107: BitDefender Security for SharePoint Administration Guide En

2. Specify your e-mail address.

3. Click Apply to save the changes.

10.3. Exporting/Importing Product SettingsYou can export and import the product settings. This helps you easily configure otherBitDefender Security for SharePoint products and restore configured settings in caseyou repair or reinstall the product.

10.3.1. Exporting Product SettingsTo export product settings, go to Export Settings under General in the BitDefendermenu.

All you need to do is click Export and select the folder where you want the productsettings file to be saved.

10.3.2. Importing Product SettingsTo import product settings, go to Import Settings under General in the BitDefendermenu.

To import previously saved product settings, follow these steps:

1. Click Import. A new window will appear.

2. Locate and select the settings file.

3. Click Open to import the settings.

NoteBitDefender does not protect the SharePoint server while importing product settings.Therefore, it is recommended that you remove the server from the network beforeinitiating this process.

4. Wait until the Import Tool completes the importing process.

5. The Import Tool informs you when the settings have been successfully imported.

Click Exit to close the window.

General 93

BitDefender Security for SharePoint

Page 108: BitDefender Security for SharePoint Administration Guide En

11. LicenseBitDefender Security for SharePoint comes with a 30-day trial period. If you decidethat BitDefender Security for SharePoint is the best choice for your organization,proceed to purchase and register its full version. You should also create a BitDefenderaccount in order to benefit from free BitDefender technical support and other freeservices.

NoteIf BitDefender Security for SharePoint is under the management of BitDefenderManagement Server, the product and account registration are performed from themanagement console of BitDefender Management Server.

11.1. Purchase the full version of the productGo to Buy under License in the BitDefender menu if you want to purchase the fullversion of BitDefender Security for SharePoint. This will open a web page from whereyou can buy the product.

11.2. Register the productTo register BitDefender Security for SharePoint, go to Register Now under Licensein the BitDefender menu.

License 94

BitDefender Security for SharePoint

Page 109: BitDefender Security for SharePoint Administration Guide En

Registration

You can see the status of your registration on the upper part of the page.

If you do not have a BitDefender license, click the provided link to go to the BitDefenderonline store and purchase a license key.

To register the product, enter a valid serial number in the License key field and clickRegister Now.

NoteIf the provided license key is not valid, you will be prompted to provide another licensekey.

11.3. Register a BitDefender AccountTo create or log in to a BitDefender account, go to My Account under License in theBitDefender menu.

License 95

BitDefender Security for SharePoint

Page 110: BitDefender Security for SharePoint Administration Guide En

Account Registratiion

You can see the current account status on the upper part of the page. Proceedaccording to your current situation.

I do not have a BitDefender accountTo create a BitDefender account, all you have to do is enter the required information:

NoteThe data you provide here will remain confidential.

● Account (e-mail) - type in your e-mail address.

● Password - type in a password for your BitDefender account. The password mustbe at least four characters long.

● Retype password - type in again the previously specified password.

● First name - type in your first name.

● Last name - type in your last name.

Click Create to finish.

License 96

BitDefender Security for SharePoint

Page 111: BitDefender Security for SharePoint Administration Guide En

NoteUse the provided e-mail address and password to log in to your account athttp://myaccount.bitdefender.com.

To successfully create an account you must first activate your e-mail address. Checkyour e-mail address and follow the instructions in the e-mail sent to you by theBitDefender registration service.

I already have a BitDefender accountIf you already have an active account, provide the e-mail address and the passwordof your account in the corresponding fields and click Login.

NoteIf you provide an incorrect password, you will be prompted to re-type it when you clickLogin.

If you have forgotten your password, click Forgot password? and follow theinstructions to create a new password.

License 97

BitDefender Security for SharePoint

Page 112: BitDefender Security for SharePoint Administration Guide En

12. HelpThis is where you can access the product documentation, the BitDefender KnowledgeBase and see version information.

If you need information on how to use the product, clickBD Security Help underHelpin the BitDefender menu. This will open the BitDefender Security for SharePoint helpfile.

If you have problems with the product and need help troubleshooting, click SupportunderHelp in the BitDefender menu. You will be directed to the BitDefender KnowledgeBase, where you can find documents addressing the most common issues and fromwhere you can contact BitDefender Customer Care. For more information about gettinghelp, please refer to “Troubleshooting and Getting Help” (p. 99).To get version information, click About BD Security under Help in the BitDefendermenu. Here you can see the version numbers of the BitDefender modules.

Help 98

BitDefender Security for SharePoint

Page 113: BitDefender Security for SharePoint Administration Guide En

Troubleshooting and Getting Help

99

BitDefender Security for SharePoint

Page 114: BitDefender Security for SharePoint Administration Guide En

13. BitDefender Configuration Repair ToolIf you have problems with BitDefender Security for SharePoint, you can use theBitDefender Configuration Repair Tool to restore the last known good configuration.The BitDefender Configuration Repair Tool backs the configuration file up every hourso that you can restore it if needed. This tool can be successfully used to fix a corruptconfiguration file issue, which may occur in extreme situations such as a forced systemshutdown caused by a blackout.

To restore the last known good version of the configuration file, follow these steps:

1. Open the BitDefender Configuration Repair Tool using this path from the Windowsstart menu: Start → Programs → BitDefender Security for Windows Servers→ BitDefender Configuration Repair Tool.

BitDefender Configuration Repair Tool

2. Click Restore to begin restoring the backup copy of the configuration file.

3. Wait until the BitDefender Configuration Repair Tool completes the restorationprocess.

BitDefender Configuration Repair Tool 100

BitDefender Security for SharePoint

Page 115: BitDefender Security for SharePoint Administration Guide En

Repairing Configuration

The window displays the status of the restoration process. First, the BitDefenderConfiguration Repair Tool stops the services belonging to the BitDefender Securityfor Windows Servers products installed on the system (services belonging toMicrosoft applications may also be stopped; for example, Microsoft ExchangeTransport, if BitDefender Security for Exchange is installed). Then, the BitDefenderConfiguration Repair Tool replaces the corrupt configuration file with the backupfile (an older working copy of the configuration file). Finally, the BitDefenderConfiguration Repair Tool restarts the processes previously stopped.

4. The BitDefender Configuration Repair Tool informs you when the backup copy ofthe configuration file has been successfully restored.

BitDefender Configuration Repair Tool 101

BitDefender Security for SharePoint

Page 116: BitDefender Security for SharePoint Administration Guide En

Finish

Click Exit to close the window.

BitDefender Configuration Repair Tool 102

BitDefender Security for SharePoint

Page 117: BitDefender Security for SharePoint Administration Guide En

14. BitDefender Support ToolThe BitDefender Support Tool creates a zip archive of files required by our supporttechnicians to troubleshoot BitDefender Security for SharePoint.

Send the zip archive together with your request for support in order to reduce the timeneeded to resolve the query.

To use the Support Tool, follow these steps:

1. Open the BitDefender Support Tool using this path from the Windows start menu:Start → All Programs → BitDefender Security for Windows Servers →BitDefender Support Tool.

BitDefender Support Tool

2. Click Next.3. Wait until the Support Tool finishes gathering information.

BitDefender Support Tool 103

BitDefender Security for SharePoint

Page 118: BitDefender Security for SharePoint Administration Guide En

Gathering Information

The Support Tool gathers product information, information related to otherapplications installed on the machine and the software and hardware configuration.

4. The Support Tool informs you when the process has completed.

Finish

The name of the zip archive that has been created on your desktop is displayed inthis window. Click Finish to close the window.

BitDefender Support Tool 104

BitDefender Security for SharePoint

Page 119: BitDefender Security for SharePoint Administration Guide En

15. SupportWith BitDefender, dedication to saving customers’ time and money by providing themost advanced products at the fairest prices has always been a top priority. Moreover,we believe that a successful business is based on good communication andcommitment to excellence in customer support.

You are welcome to ask for support at any time. Our customer care representativeswill provide you with all the assistance you need.

15.1. Asking for HelpYou can ask for help via the BitDefender Web Self-Service or via the telephone. TheBitDefender Web Self-Service assists you with solutions to BitDefender-related issuesand provides means to contact BitDefender Customer Care. The BitDefender WebSelf-Service addresses and the technical support phone numbers are provided insection “Contact Information” (p. 106).To ask for help via the BitDefender Web Self-Service, follow these steps:

1. Go to http://kb.bitdefender.com and access the Business section. This is whereyou can find the BitDefender Knowledge Base for the BitDefender business products.The BitDefender Knowledge Base hosts numerous articles that contain solutionsto BitDefender-related issues.

2. Select your product from the list.

3. Search the BitDefender Knowledge Base for articles that may provide a solution toyour problem.

4. Please read the article most relevant to your problem and try the proposed solution.

5. If this solution does not solve your problem, use the link in the article to contactBitDefender Customer Care. It is recommended that you first login to yourBitDefender account and then contact the BitDefender support representatives bye-mail, chat or phone.

15.2. BitDefender Knowledge BaseThe BitDefender Knowledge Base is an online repository of information about theBitDefender products. It stores, in an easily accessible format, reports on the resultsof the ongoing technical support and bugfixing activities of the BitDefender support

Support 105

BitDefender Security for SharePoint

Page 120: BitDefender Security for SharePoint Administration Guide En

and development teams, along with more general articles about virus prevention, themanagement of BitDefender solutions with detailed explanations, and many otherarticles.

The BitDefender Knowledge Base is open to the public and freely searchable. Theextensive information it contains is yet another means of providing BitDefendercustomers with the technical knowledge and insight they need. All valid requests forinformation or bug reports coming from BitDefender clients eventually find their wayinto the BitDefender Knowledge Base, as bugfix reports, workaround cheatsheets orinformational articles to supplement product helpfiles.

The BitDefender Knowledge Base is available any time at http://kb.bitdefender.com.

15.3. Contact InformationEfficient communication is the key to a successful business. During the past 10 yearsBITDEFENDER has established an unquestionable reputation by constantly strivingfor better communication so as to exceed the expectations of our clients and partners.Should you have any questions, do not hesitate to contact us.

15.3.1. Web AddressesSales department: [email protected] self-service: http://kb.bitdefender.comDocumentation: [email protected] Program: [email protected]: [email protected] Relations: [email protected] Opportunities: [email protected] Submissions: [email protected] Submissions: [email protected] Abuse: [email protected] web site: http://www.bitdefender.comProduct ftp archives: ftp://ftp.bitdefender.com/pubLocal distributors: http://www.bitdefender.com/partner_list

15.3.2. BitDefender OfficesThe BitDefender offices are ready to respond to any inquiries regarding their areas ofoperation, both in commercial and in general matters. Their respective addresses andcontacts are listed below.

Support 106

BitDefender Security for SharePoint

Page 121: BitDefender Security for SharePoint Administration Guide En

North AmericaBitDefender, LLC6301 NW 5th Way, Suite 3500Fort Lauderdale, Florida 33309Phone (sales&technical support): 1-954-776-6262Sales: [email protected]: http://www.bitdefender.comWeb Self-Service: http://kb.bitdefender.com/site/KnowledgeBase/showMain/2/

UK and IrelandBusiness Centre 10 Queen StreetNewcastle, StaffordshireST5 1EDUKPhone (sales&technical support): +44 (0) 8451-305096E-mail: [email protected]: [email protected]: http://www.bitdefender.co.ukWeb Self-Service: http://kb.bitdefender.com/site/KnowledgeBase/showMain/2/

GermanyBitDefender GmbHAirport Office CenterRobert-Bosch-Straße 259439 HolzwickedeDeutschlandPhone (office&sales): +49 (0)2301 91 84 222Phone (technical support): +49 (0)2301 91 84 444Sales: [email protected]: http://www.bitdefender.deWeb Self-Service: http://www.bitdefender.de/site/KnowledgeBase/showMain/2/

Spain and Latin AmericaBitDefender España SLUC/ Balmes, 191, 2º, 1ª08006 BarcelonaEspaña

Support 107

BitDefender Security for SharePoint

Page 122: BitDefender Security for SharePoint Administration Guide En

Fax: +34 932179128Phone (office&sales): +34 902190765Phone (technical support): +34 935026910Sales: [email protected]: http://www.bitdefender.esWeb Self-Service: http://www.bitdefender.es/site/KnowledgeBase/showMain/2/

RomaniaBITDEFENDER SRLWest Gate Park, Building H2, 24 Preciziei StreetBucharest, Sector 6Fax: +40 21 2641799Phone (sales&technical support): +40 21 2063470Sales: [email protected]: http://www.bitdefender.roWeb Self-Service: http://www.bitdefender.ro/site/KnowledgeBase/showMain/2/

EMEA and APAC Business UnitBITDEFENDER SRLWest Gate Park, Building H2, 24 Preciziei StreetBucharest, Sector 6RomaniaFax: +40 21 2641799Phone (sales&technical support): +40 21 2063470Sales: [email protected]: http://www.bitdefender.comWeb Self-Service: http://www.bitdefender.com/site/KnowledgeBase/showMain/2/

Support 108

BitDefender Security for SharePoint

Page 123: BitDefender Security for SharePoint Administration Guide En

GlossaryActiveX

ActiveX is a model for writing programs so that other programs and the operatingsystem can call them. ActiveX technology is used with Microsoft Internet Explorerto make interactive Web pages that look and behave like computer programs,rather than static pages. With ActiveX, users can ask or answer questions, usepush buttons, and interact in other ways with the Web page. ActiveX controls areoften written using Visual Basic.

Active X is notable for a complete lack of security controls; computer securityexperts discourage its use over the Internet.

AdwareAdware is often combined with a host application that is provided at no chargeas long as the user agrees to accept the adware. Because adware applicationsare usually installed after the user has agreed to a licensing agreement that statesthe purpose of the application, no offense is committed.

However, pop-up advertisements can become an annoyance, and in some casesdegrade system performance. Also, the information that some of these applicationscollect may cause privacy concerns for users who were not fully aware of theterms in the license agreement.

ArchiveA disk, tape, or directory that contains files that have been backed up.

A file that contains one or more files in a compressed format.

BackdoorA hole in the security of a system deliberately left in place by designers ormaintainers. The motivation for such holes is not always sinister; some operatingsystems, for example, come out of the box with privileged accounts intended foruse by field service technicians or the vendor's maintenance programmers.

Boot sectorA sector at the beginning of each disk that identifies the disk's architecture (sectorsize, cluster size, and so on). For startup disks, the boot sector also contains aprogram that loads the operating system.

Boot virusA virus that infects the boot sector of a fixed or floppy disk. An attempt to bootfrom a diskette infected with a boot sector virus will cause the virus to become

Glossary 109

BitDefender Security for SharePoint

Page 124: BitDefender Security for SharePoint Administration Guide En

active in memory. Every time you boot your system from that point on, you willhave the virus active in memory.

BrowserShort for Web browser, a software application used to locate and display Webpages. The two most popular browsers are Netscape Navigator and MicrosoftInternet Explorer. Both of these are graphical browsers, which means that theycan display graphics as well as text. In addition, most modern browsers canpresent multimedia information, including sound and video, though they requireplug-ins for some formats.

Command lineIn a command line interface, the user types commands in the space provideddirectly on the screen using command language.

CookieWithin the Internet industry, cookies are described as small files containinginformation about individual computers that can be analyzed and used byadvertisers to track your online interests and tastes. In this realm, cookietechnology is still being developed and the intention is to target ads directly towhat you've said your interests are. It's a double-edge sword for many peoplebecause on one hand, it's efficient and pertinent as you only see ads about whatyou're interested in. On the other hand, it involves actually "tracking" and"following" where you go and what you click. Understandably so, there is a debateover privacy and many people feel offended by the notion that they are viewedas a "SKU number" (you know, the bar code on the back of packages that getsscanned at the grocery check-out line). While this viewpoint may be extreme, insome cases it is accurate.

Disk driveIt's a machine that reads data from and writes data onto a disk.

A hard disk drive reads and writes hard disks.

A floppy drive accesses floppy disks.

Disk drives can be either internal (housed within a computer) or external (housedin a separate box that connects to the computer).

DownloadTo copy data (usually an entire file) from a main source to a peripheral device.The term is often used to describe the process of copying a file from an onlineservice to one's own computer. Downloading can also refer to copying a file froma network file server to a computer on the network.

Glossary 110

BitDefender Security for SharePoint

Page 125: BitDefender Security for SharePoint Administration Guide En

E-mailElectronic mail. A service that sends messages on computers via local or globalnetworks.

EventsAn action or occurrence detected by a program. Events can be user actions, suchas clicking a mouse button or pressing a key, or system occurrences, such asrunning out of memory.

False positiveOccurs when a scanner identifies a file as infected when in fact it is not.

Filename extensionThe portion of a filename, following the final point, which indicates the kind ofdata stored in the file.

Many operating systems use filename extensions, e.g. Unix, VMS, and MS-DOS.They are usually from one to three letters (some sad old OSes support no morethan three). Examples include "c" for C source code, "ps" for PostScript, "txt" forarbitrary text.

HeuristicA rule-based method of identifying new viruses. This method of scanning doesnot rely on specific virus signatures. The advantage of the heuristic scan is thatit is not fooled by a new variant of an existing virus. However, it might occasionallyreport suspicious code in normal programs, generating the so-called "falsepositive".

IPInternet Protocol - A routable protocol in the TCP/IP protocol suite that isresponsible for IP addressing, routing, and the fragmentation and reassembly ofIP packets.

Java appletA Java program which is designed to run only on a web page. To use an appleton a web page, you would specify the name of the applet and the size (lengthand width, in pixels) that the applet can utilize. When the web page is accessed,the browser downloads the applet from a server and runs it on the user's machine(the client). Applets differ from applications in that they are governed by a strictsecurity protocol.

For example, even though applets run on the client, they cannot read or writedata onto the client's machine. Additionally, applets are further restricted so thatthey can only read and write data from the same domain that they are servedfrom.

Glossary 111

BitDefender Security for SharePoint

Page 126: BitDefender Security for SharePoint Administration Guide En

Macro virusA type of computer virus that is encoded as a macro embedded in a document.Many applications, such as Microsoft Word and Excel, support powerful macrolanguages.

These applications allow you to embed a macro in a document, and have themacro execute each time the document is opened.

Mail clientAn e-mail client is an application that enables you to send and receive e-mail.

MemoryInternal storage areas in the computer. The term memory identifies data storagethat comes in the form of chips, and the word storage is used for memory thatexists on tapes or disks. Every computer comes with a certain amount of physicalmemory, usually referred to as main memory or RAM.

Non-heuristicThis method of scanning relies on specific virus signatures. The advantage of thenon-heuristic scan is that it is not fooled by what might seem to be a virus, anddoes not generate false alarms.

Packed programsA file in a compression format. Many operating systems and applications containcommands that enable you to pack a file so that it takes up less memory. Forexample, suppose you have a text file containing ten consecutive spacecharacters. Normally, this would require ten bytes of storage.

However, a program that packs files would replace the space characters by aspecial space-series character followed by the number of spaces being replaced.In this case, the ten spaces would require only two bytes. This is just one packingtechnique - there are many more.

PathThe exact directions to a file on a computer. These directions are usually describedby means of the hierarchical filing system from the top down.

The route between any two points, such as the communications channel betweentwo computers.

PhishingThe act of sending an e-mail to a user falsely claiming to be an establishedlegitimate enterprise in an attempt to scam the user into surrendering privateinformation that will be used for identity theft. The e-mail directs the user to visita Web site where they are asked to update personal information, such as

Glossary 112

BitDefender Security for SharePoint

Page 127: BitDefender Security for SharePoint Administration Guide En

passwords and credit card, social security, and bank account numbers, that thelegitimate organization already has. The Web site, however, is bogus and set uponly to steal the user’s information.

Polymorphic virusA virus that changes its form with each file it infects. Since they have no consistentbinary pattern, such viruses are hard to identify.

PortAn interface on a computer to which you can connect a device. Personalcomputers have various types of ports. Internally, there are several ports forconnecting disk drives, display screens, and keyboards. Externally, personalcomputers have ports for connecting modems, printers, mice, and other peripheraldevices.

In TCP/IP and UDP networks, an endpoint to a logical connection. The port numberidentifies what type of port it is. For example, port 80 is used for HTTP traffic.

Report fileA file that lists actions that have occurred. BitDefender maintains a report filelisting the path scanned, the folders, the number of archives and files scanned,how many infected and suspicious files were found.

RootkitA rootkit is a set of software tools which offer administrator-level access to asystem. The term was first used for the UNIX operating systems and it referredto recompiled tools which provided intruders administrative rights, allowing themto conceal their presence so as not to be seen by the system administrators.

The main role of rootkits is to hide processes, files, logins and logs. They mayalso intercept data from terminals, network connections or peripherals, if theyincorporate the appropriate software.

Rootkits are not malicious in nature. For example, systems and even someapplications hide critical files using rootkits. However, they are mostly used tohide malware or to conceal the presence of an intruder into the system. Whencombined with malware, rootkits pose a great threat to the integrity and the securityof a system. They can monitor traffic, create backdoors into the system, alter filesand logs and avoid detection.

ScriptAnother term for macro or batch file, a script is a list of commands that can beexecuted without user interaction.

Glossary 113

BitDefender Security for SharePoint

Page 128: BitDefender Security for SharePoint Administration Guide En

SpamElectronic junk mail or junk newsgroup postings. Generally known as anyunsolicited e-mail.

SpywareAny software that covertly gathers user information through the user's Internetconnection without his or her knowledge, usually for advertising purposes. Spywareapplications are typically bundled as a hidden component of freeware or sharewareprograms that can be downloaded from the Internet; however, it should be notedthat the majority of shareware and freeware applications do not come withspyware. Once installed, the spyware monitors user activity on the Internet andtransmits that information in the background to someone else. Spyware can alsogather information about e-mail addresses and even passwords and credit cardnumbers.

Spyware's similarity to a Trojan horse is the fact that users unwittingly install theproduct when they install something else. A common way to become a victim ofspyware is to download certain peer-to-peer file swapping products that areavailable today.

Aside from the questions of ethics and privacy, spyware steals from the user byusing the computer's memory resources and also by eating bandwidth as it sendsinformation back to the spyware's home base via the user's Internet connection.Because spyware is usingmemory and system resources, the applications runningin the background can lead to system crashes or general system instability.

Startup itemsAny files placed in this folder will open when the computer starts. For example,a startup screen, a sound file to be played when the computer first starts, areminder calendar, or application programs can be startup items. Normally, analias of a file is placed in this folder rather than the file itself.

System trayIntroduced with Windows 95, the system tray is located in the Windows taskbar(usually at the bottom next to the clock) and contains miniature icons for easyaccess to system functions such as fax, printer, modem, volume, and more.Double click or right click an icon to view and access the details and controls.

TCP/IPTransmission Control Protocol/Internet Protocol - A set of networking protocolswidely used on the Internet that provides communications across interconnectednetworks of computers with diverse hardware architectures and various operatingsystems. TCP/IP includes standards for how computers communicate andconventions for connecting networks and routing traffic.

Glossary 114

BitDefender Security for SharePoint

Page 129: BitDefender Security for SharePoint Administration Guide En

TrojanA destructive program that masquerades as a benign application. Unlike viruses,Trojan horses do not replicate themselves but they can be just as destructive.One of the most insidious types of Trojan horse is a program that claims to ridyour computer of viruses but instead introduces viruses onto your computer.

The term comes from a story in Homer's Iliad, in which the Greeks give a giantwooden horse to their foes, the Trojans, ostensibly as a peace offering. But afterthe Trojans drag the horse inside their city walls, Greek soldiers sneak out of thehorse's hollow belly and open the city gates, allowing their compatriots to pour inand capture Troy.

UpdateA new version of a software or hardware product designed to replace an olderversion of the same product. In addition, the installation routines for updates oftencheck to make sure that an older version is already installed on your computer;if not, you cannot install the update.

BitDefender has it's own update module that allows you to manually check forupdates, or let it automatically update the product.

VirusA program or piece of code that is loaded onto your computer without yourknowledge and runs against your will. Most viruses can also replicate themselves.All computer viruses are manmade. A simple virus that can copy itself over andover again is relatively easy to produce. Even such a simple virus is dangerousbecause it will quickly use all available memory and bring the system to a halt.An even more dangerous type of virus is one capable of transmitting itself acrossnetworks and bypassing security systems.

Virus definitionThe binary pattern of a virus, used by the antivirus program to detect and eliminatethe virus.

WormA program that propagates itself over a network, reproducing itself as it goes. Itcannot attach itself to other programs.

Glossary 115

BitDefender Security for SharePoint