
Step 2/3 - Select Actions
When the scanning is completed, a new window will appear, where you can see the
scan results.
If there are no unresolved threats, click Continue. Otherwise, you must configure
new actions to be taken on the unresolved threats in order to protect your system.
The infected objects are displayed in groups, based on the malware they are infected
with. Click the link corresponding to a threat to find out more information about the
infected objects.
You can choose an overall action to be taken for all issues or you can select separate
actions for each group of issues. One or several of the following options can appear
on the menu:
Take No Action
No action will be taken on the detected files. After the scan is completed, you
can open the scan log to view information on these files.
Disinfect
Removes the malware code from infected files.
Delete
Removes detected files from the disk.
Move to quarantine
Moves detected files to quarantine. Quarantined files cannot be executed or
opened; therefore, the risk of getting infected disappears. For more information,
please refer to “Quarantine Area” (p. 81).
Rename files
Changes the name of hidden files by appending .bd.ren to their name. As a
result, you will be able to search for and find such files on your computer, if
any.
Please note that these hidden files are not the files that you deliberately hide
from Windows. They are the files hidden by special programs, known as rootkits.
Rootkits are not malicious in nature. However, they are commonly used to make
viruses or spyware undetectable by normal antivirus programs.
Click Continue to apply the specified actions.
Step 3/3 - View Results
When BitDefender finishes fixing the issues, the scan results will appear in a new
window. If you want comprehensive information on the scanning process, click Show
Log to view the scan log.
Antivirus Protection
70
BitDefender Total Security 2011
Comentarios a estos manuales