Below are details on antivirus policy settings and behaviors.
Scanning Profiles
Choose between three predefined scanning profiles to determine the level of protection. The profile will apply for On access and Behavioral scanning.
- Aggressive: Configures scanning settings for maximum protection against any type of malware. Scans all files from local and network drives (including archived and almost zero-risk files).
- Normal: This option is designed to provide optimum balance between security and performance. Scans all files from local drives and application files from network drives (except for archived and almost zero-risk files).
- Permissive: This option provides basic security and may be useful for less powerful or legacy systems. Scans only accessed application files from local and network drives, as well as incoming emails. Low-risk files, outgoing emails, web traffic, and Spyware are not scanned.
On access Scanning (Real Time Protection)
Scan all accessed files in real-time to protect against a wide range of threats.

Action taken: Deny access
Action taken: Deny access
Behavioral Scanning (On-Execute/Advanced Threat Control) - Windows Only
Continuously monitor apps and processes using Bitdefender's heuristic scoring algorithm to detect publicly known as well as new threats before they are associated as risks.

Action taken: Block and disinfect
Action taken: Block and disinfect
On-demand Scanning
Immediately run or schedule a quick or full scan task. Quick scans target running processes and common vulnerable locations while full scans scan the entire device for maximum protection against any type of malware.

Action Taken: Disinfect, or move to quarantine if disinfect fails
Action Taken: Disinfect, or move to quarantine if disinfect fails
Device Scanning - Windows Only
Scan external USB devices and CD/DVD media when they are connected to the computer.

Action taken: Ask user to scan.
Action taken: Ask user to scan.
Firewall - Windows Only
Protect devices from inbound and outbound unauthorized connection attempts, both on local networks and on the internet.

Protect from port scans to block hackers from finding vulnerable ports.
Enable/Disable Internet Connection Sharing, a Windows service that allows a computer to share its internet connection with other computers.
Protect from port scans to block hackers from finding vulnerable ports.
Enable/Disable Internet Connection Sharing, a Windows service that allows a computer to share its internet connection with other computers.
Traffic Scanning
Scans all inbound HTTP traffic in real time to detect and block malware from being downloaded to the endpoint. If a web page contains or distributes malware, it will be automatically blocked and a warning page will be displayed to the user.
Scans email traffic (POP3/SMTP) for Windows only: Incoming emails (POP3) are scanned to block malware from being downloaded to the endpoint. Outgoing emails (SMTP) are scanned to prevent malware from infecting other endpoints.

Scans email traffic (POP3/SMTP) for Windows only: Incoming emails (POP3) are scanned to block malware from being downloaded to the endpoint. Outgoing emails (SMTP) are scanned to prevent malware from infecting other endpoints.
Anti-phishing
Block URLs of known phishing and fraudulent websites, or malicious content such as spyware or viruses. When a user tries to go to the webpage, a special warning page will be displayed instead to inform the user that it is a dangerous web page.
Action taken: Block connection to website.
Add URLs to exclusions to whitelist websites from being blocked.
Uninstallation Password
Protect the antivirus agent with a password to prevent uninstallation from unauthorized users.

Silent Mode
Hide the antivirus agent tray icon on the remote computer to prevent user interaction.
