@Alexandru_BD answered to this thread here :
https://community.bitdefender.com/en/discussion/102777
The thread was closed before I could reply with a very important suggestion.
You stated that malware cannot originate from within password-protected archives and that Bitdefender's real-time protection would detect it as soon as it exits the protected archive.
However, if malware is indeed present within the protected archive, why would it remain dormant until the archive is unlocked? This poses a significant risk to the user.
When a Bitdefender user performs a system scan, they are typically connected to the internet, allowing Bitdefender to operate optimally. However, if the archive containing malware is opened offline or if Bitdefender is not installed or active on the user's PC, the user remains vulnerable and uncertain of their system's security.
Before uninstalling the product (even for reinstallation), the (b.d.) should issue a 'clean chit' to the user. This is crucial because malware within the installation archive could potentially activate during the uninstallation process, even if it's for a temporary reinstallation.
This is particularly important for trial users. If they encounter malware remnants on their system after uninstalling the product, it severely damages the company's reputation. Trial users expect a legitimate security solution and will not consider the product reliable if it leaves behind malicious code
There's also the possibility that the virus/malware might disguise itself as a password-protected file. If Bitdefender could store the passwords of files and use them during scans, it could potentially detect malware even when the stored passwords no longer work for the archived file. In such cases, Bitdefender could request the password from the user. If the user cannot provide the correct password, Bitdefender could flag the file as potentially malicious.