Bitdefender-Packeg Feature Information
Bitdefender-Packeg Feature Information
Endpoint agents with Bitdefender Endpoint Security Tools Relay role serve as communication proxy and
update servers for other endpoints in the network. A Relay endpoint needs at least 10 GB of additional
free disk space on top of the basic security agent configuration requirements.
Key Functions:
❖ Communication Proxy: Relays data between endpoints and the Control Center.
❖ Update Server: Distributes updates locally, reducing the need for direct external connections.
Importance:
❖ Isolated Networks: Essential for networks with single access points, ensuring endpoints receive
updates without direct internet access.
❖ Distributed Networks: Lowers bandwidth usage by consolidating traffic through the relay instead of
multiple direct connections to GravityZone.
Configuration:
Benefits:
Exchange Protection
Bitdefender Exchange Protection is designed to safeguard Microsoft Exchange environments from
various threats, ensuring secure email communication within organizations.
Key Features:
Fahim Mahmud
Deployment and Management:
Benefits:
The database server is responsible for storing and managing critical security data such as
endpoint information, policies, events, and logs. It enables real-time monitoring, reporting, and
centralized management of security policies across the organization’s endpoint, contributing to
enhanced protection against cyber threats.
2.Update Server
The update server is responsible for managing the distribution and deployment of security
updates, patches, and signature files to endpoints and security modules within the organization’s
network. It ensures that all protected devices have the latest security definitions and software
updates to defend against emerging threats effectively.
3.Communication server
The communication server is a central component of the gravity zone architecture that facilitates
communication between different components within the gravity zone ecosystem. It manages
communication channels between gravityzone modules (endpoints, security servers, and the
gravityzone control center), ensuring seamless coordination and operation of the entire security
infrastructure.
4.Web console
The web console is the central interface through which administrators manage and monitor the
Bitdefender gravityzone security platform. It provides a user-friendly web-base dashboard for
configuring security policies and viewing security incidents. The web console offers
comprehensive control and visibility over the organization’s security posture,allowing
administrators to effectively safeguard their digital assets against cyber threats.
Fahim Mahmud
5. Report Builder Database
The Report Builder database is the storage component that houses the data used for generating
reports within the gravity zone. It stores various types of information collected from managed
end points, security events, and network activities. The report builder database provider provides
the necessary data to create customized reports on security status, threat detection, compliance,
and other relevant metrics, helping administrators gain insights into their organization's security
environment.
6.Incidents server
The incident server is a component within the gravityzone architecture responsible for managing
and processing security incidents detected by the gravityzone security modules. It collects and
analyzes data from various sources, including endpoint protection agents. The network server
enables administrators to effectively respond to and remediate security threats through
management capabilities within the gravityzone platform.
- Not included
COVERAGE
* Requires GravityZone Business Security Enterprise
1.Physical Laptops and Desktops (v,v,v)
Physical Laptops and Desktops likely refers to the extent or scope of protection provided by
Bitdefender's security solutions for traditional computing devices such as laptops and desktops.
This coverage typically includes comprehensive protection against various cyber threats,
including malware, ransomware, phishing attacks, and other malicious activities. It ensures the
security and integrity of endpoints within organizations or for individual users, safeguarding
their computing devices and the data stored on them.
Fahim Mahmud
3.Virtual Desktops (v,v,v)
Virtual Desktops likely refers to the extent of protection provided by Bitdefender's security
solutions for virtual desktop infrastructure (VDI) environments. This coverage includes
comprehensive security features designed to safeguard virtual desktops against various cyber
threats, such as malware, ransomware, and data breaches. It ensures the security and integrity of
virtual desktop environments, helping organizations maintain productivity and protect sensitive
data accessed through virtual desktop sessions.
4.Containers (+,+,+)
Containers likely refers to the scope of protection provided by Bitdefender's security solutions
for containerized environments. This coverage includes security features specifically designed to
safeguard containers against various cyber threats, such as malware, vulnerabilities, and
unauthorized access. It ensures the security and integrity of containerized applications and
infrastructure, helping organizations maintain the reliability and compliance of their container
deployments.
Fahim Mahmud
8.Network (- ,-, + (cloud only))
Network likely refers to the range or extent of protection provided by Bitdefender's security
solutions for network infrastructure. This coverage includes features designed to safeguard
network traffic, devices, and communications against various cyber threats, such as malware,
ransomware, intrusion attempts, and data breaches. It ensures the security, integrity, and
availability of organizational networks, helping to prevent unauthorized access, detect suspicious
activities, and mitigate security risks across the network environment.
Fahim Mahmud
{GravityZone Control Center- Policies- Network Protection- Web Protection- Web Traffic Scan/ Email
Traffic Scan}{ Network Protection > General-Select the Exclusions check box to enable the section-For
Type, select URL-Enter the web address and click the add-png Add button}
{ policies- Firewall}
Bitdefender employs both local and cloud-based machine learning for cybersecurity. Local
machine learning analyzes data on users' devices for real-time protection, ensuring privacy and
control. Cloud machine learning processes large datasets to enhance threat detection accuracy
and response times, leveraging scalability and computational power.
Fahim Mahmud
8. Exploit Defense (v,v,v)
Bitdefender advanced anti-exploit technology tackles evasive exploits and stops zero-day attacks
that take advantage of software vulnerabilities. provide an extra layer of protection to customers
from attacks that leverage memory and vulnerable applications such as browsers, document
readers, media files, and runtime (i.e. Flash, Java).
Advanced anti-exploit technology along with machine learning hardens vulnerable applications
and reduces the attack surface.
Bitdefender automatically tries to disinfect files detected with malware. In case malware cannot
be removed, it is contained in quarantine, where it cannot do any harm. Suspicious files are being
ignored. If you want to take action on suspicious files as well, or if you want other default
actions for infected files, then choose to run a Custom Scan.
Network Attack Defense provides a security layer based on a Bitdefender technology that detects
and takes actions against network attacks designed to gain access on endpoints through specific
techniques such as: brute-force attacks, network exploits and password stealers.
{Policies-Antimalware-On-Execute-RM}
Fahim Mahmud
13. Fileless Attack Defense (x,v,v)
Bitdefender's Fileless Attack Defense is a security feature that detects and prevents cyber threats
that operate without leaving traditional file traces. It uses techniques like behavioral analysis,
memory scanning, heuristic analysis, endpoint detection and response, and exploit prevention to
safeguard against these stealthy attacks.
Bitdefender technology combines security capabilities required to protect against modern attacks
that leverage and re-purpose “living-off-the-land,” fileless techniques to run scripts and load
malicious code directly into the memory.
{Policies-Antimalware-On-Execute-FAD}
{Policies-Antimalware-On-Execute-HD}
Bitdefender Sandbox Analysis is a security feature that allows suspicious files or applications to
be run in a controlled virtual environment for analysis. This sandbox environment is isolated
from the main operating system, protecting the system from potential harm. By observing the
behavior of the file or application within the sandbox, Bitdefender can determine if it poses a
threat. This analysis helps in identifying and blocking malware or other malicious activities
before they can cause harm to the user's system.
Bitdefender Attack Forensics is a feature designed to analyze and investigate security incidents
and cyber attacks that have occurred on a system. It provides detailed insights into the attack
vectors, techniques, and payloads used by attackers. By examining the forensic data collected
during an attack, security analysts can understand how the attack occurred, what vulnerabilities
were exploited, and how to better defend against similar threats in the future. This helps
organizations improve their overall security posture and response capabilities.
Fahim Mahmud
{Incidents}
Cross-Endpoint Correlation is a cybersecurity feature that integrates data from various endpoints
across a network. It analyzes this data to detect patterns and anomalies, enhancing threat
detection and response capabilities.
Anomaly Defense is a security feature that detects suspicious behavior in systems or networks
using machine learning and behavioral analysis, helping to identify and mitigate emerging
threats early.
Live and Historical Search is a feature that allows users to search for security events and data in
real-time or from historical records within the Bitdefender security environment. It helps users
quickly locate and analyze security incidents, logs, and other relevant information for incident
investigation, threat detection, and security management purposes..
MITRE Event Tagging (TTPs) aligns security events in Bitdefender with the MITRE ATT&CK
framework, helping users understand and respond to cyber threats more effectively by
recognizing attack patterns.
Fahim Mahmud
7.Endpoint response (-, -, V)
Endpoint Response refers to the suite of actions and measures available to users for addressing
security incidents detected on endpoints within their Bitdefender security environment.
Cross-Source Event Correlation is a feature that correlates security events and data from multiple
sources within the Bitdefender security environment. By analyzing information from various
endpoints and other sources, it enhances threat detection and response capabilities, providing a
more comprehensive view of potential security issues.
Fahim Mahmud
GRAVITYZONE ADD-ONS
Security for Mobile is a comprehensive mobile security solution designed to protect smartphones
and tablets from various cybersecurity threats. It offers features such as real-time malware
detection, web protection against phishing and malicious websites, anti-theft tools to locate, lock,
or wipe a lost device, privacy advisor to monitor app permissions, and VPN for secure browsing
over public Wi-Fi networks. This solution helps users safeguard their mobile devices against
malware, phishing attacks, and other security risks.
Security for Email is an email security solution designed to protect organizations against email-
based threats such as spam, phishing, malware, and other malicious content. It offers features
like anti-spam filtering to block unwanted emails, advanced threat protection to detect and block
malicious attachments or links, content filtering to enforce email policies, and encryption to
secure sensitive information. Bitdefender Security for Email helps organizations ensure the
security and integrity of their email communication channels.
Patch Management is a feature that helps organizations keep their systems up-to-date and secure
by automating the process of deploying software patches and updates. It scans the network for
missing patches, identifies vulnerabilities, and applies the necessary updates to operating
systems, applications, and other software components across endpoints. By ensuring that systems
are patched promptly, Bitdefender Patch Management helps mitigate the risk of security
breaches and exploits related to known vulnerabilities.
Full Disk Encryption is a security feature provided by Bitdefender that encrypts the entire
contents of a disk or storage device. It ensures that all data stored on the disk is protected and
unreadable without the correct decryption key, providing robust defense against unauthorized
access, especially in cases of theft or loss of the device.
Fahim Mahmud
securing containers throughout their lifecycle, Bitdefender helps organizations maintain the
integrity and security of their containerized applications and infrastructure.
Security for Storage is a solution tailored to safeguarding data stored in various storage
environments, such as on-premises servers, virtualized systems, or cloud platforms. It provides
advanced threat protection, encryption, access controls, and data integrity checks to prevent
unauthorized access, data breaches, or data corruption. By ensuring the security of stored data,
Bitdefender helps organizations maintain compliance, protect sensitive information, and
safeguard against data loss or theft.
Integrity Monitoring is a security feature that continuously monitors critical system files and
configurations for any unauthorized changes or modifications. It helps detect potential security
breaches, unauthorized access, or malware infections by alerting administrators to any alterations
in these files. This feature ensures the integrity of system configurations, enhancing overall
security and compliance with security policies.
Centralized Scanning is a feature that allows organizations to perform security scans on multiple
endpoints or devices from a central management console. It enables administrators to schedule
and coordinate scans across the network, ensuring comprehensive protection against malware,
vulnerabilities, and other security threats. Centralized Scanning streamlines security management
and ensures consistent protection across all endpoints within the organization's infrastructure.
GravityZone Data Retention refers to the capability within Bitdefender's GravityZone security
platform to retain security event data for specified durations: 90, 180, or 365 days. This feature
allows organizations to store security-related data for a defined period, facilitating compliance
with regulatory requirements, aiding in forensic investigations, and enabling long-term analysis
of security trends and incidents.
Advanced Threat Intelligence is a feature that provides organizations with highly sophisticated
and up-to-date intelligence on emerging cyber threats. It leverages advanced analytics, machine
learning, and threat intelligence feeds to continuously monitor global threat landscapes. This
Fahim Mahmud
intelligence helps organizations proactively identify and respond to advanced threats, malware,
and targeted attacks more effectively, enhancing overall cybersecurity posture and resilience.
SUPPORT SERVICES
Business Support refers to the assistance and guidance provided by Bitdefender to its business
customers. This support typically includes services such as technical assistance, troubleshooting,
product updates, and access to knowledge resources. It ensures that businesses can effectively
deploy, manage, and optimize their Bitdefender security solutions to address their specific
cybersecurity needs and challenges.
Fahim Mahmud
24x7 SECURITY SERVICES (MDR)
Bitdefender 24x7 Threat Monitoring & Response is a comprehensive service that provides
continuous monitoring of security threats and immediate response to potential incidents around
the clock. It ensures that security professionals are always vigilant, ready to detect and respond
to emerging threats promptly, safeguarding organizations against cyberattacks and data breaches
Bitdefender Threat Hunting Services is a specialized offering that involves proactive and in-
depth investigation into an organization's network environment to uncover potential security
threats or breaches that may have gone undetected by traditional security measures. This service
employs advanced tools, techniques, and expertise to identify and mitigate security risks,
enhancing the overall security posture of the organization.
Bitdefender Threat Intelligence Services involve the collection, analysis, and dissemination of
information about cybersecurity threats and vulnerabilities. These services provide organizations
with valuable insights into emerging threats, malware trends, and potential vulnerabilities
relevant to their specific industry or environment. By leveraging this intelligence, organizations
can enhance their security posture, proactively protect against cyberattacks, and effectively
respond to security incidents.
Fahim Mahmud
6.Dark Web Monitoring (-, -, + Requires Bitdefender MDR)
Bitdefender Dark Web Monitoring is a service that continuously scans the dark web for any
mentions of an organization's sensitive information, such as credentials, financial data, or
intellectual property. By monitoring underground forums, marketplaces, and other illicit online
sources, Bitdefender helps organizations identify potential data breaches or exposures early,
allowing them to take proactive measures to protect their assets and mitigate risks.
Fahim Mahmud