Bitdefender is one of the most trusted antivirus software that is used by millions of people. It offers a variety of features that protect your device and the data stored on it from all kinds of threats and malware. Bitdefender Active Threat Control is a feature available in most of the Bitdefender programs. This uses proactive and dynamic detection technology to monitor the system events and processes.
The following is the scanning sequence used by the Bitdefender Threat Control feature.
All the files that are accessed, downloaded, or copied from the web are intercepted and sent for scanning.
The file that is sent for scanning is checked against the Bitdefender Signature Database. The file that matches the database is moved to quarantine and Bitdefender will automatically try to disinfect the threat.
B-Have is used to check the file virtually inside the Bitdefender product. If B-Have finds any suspicious, malware-like activity within the file, then it is reported as malicious.
The Active Threat Control option monitors all the processes. Based on the malware action on the specific process, a score is assigned to it. Once the score value reaches or crosses the recommended threshold, that specific process is reported as harm.
Based on your desire, you can enable or disable the Active Threat Control feature. The section below explains how to enable and disable Active Threat Control on the Bitdefender antivirus application.
How to enable Bitdefender Threat Control?
On your computer, launch the Bitdefender antivirus program.
On the main screen of the program, locate and click the View Modules command.
Select the Antivirus option.
Go to the Shield tab of the Antivirus screen.
Navigate to the Active Threat Control section and click the toggle switch beside it.
Now, Active Threat Control will be enabled.
How to disable Bitdefender Threat Control?
To disable the Bitdefender Active Threat Control option, click the toggle switch beside it.
The Active Threat Control option is now disabled successfully.
To know more about Active Threat Control, reach out to our technical experts.