Professional Documents
Culture Documents
Administrator's Guide
BitDefender Management Server
Published 2008.03.31
Revision 3.0
Legal Notice
All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means, electronic or
mechanical, including photocopying, recording, or by any information storage and retrieval system, without written
permission from an authorized representative of BitDefender. The inclusion of brief quotations in reviews may be
possible only with the mention of the quoted source. The content can not be modified in any way.
Warning and Disclaimer. This product and its documentation are protected by copyright. The information in this
document is provided on an as is basis, without warranty. Although every precaution has been taken in the preparation
of this document, the authors will not have any liability to any person or entity with respect to any loss or damage
caused or alleged to be caused directly or indirectly by the information contained in this work.
This book contains links to third-party Websites that are not under the control of BitDefender, therefore BitDefender
is not responsible for the content of any linked site. If you access a third-party website listed in this document, you
will do so at your own risk. BitDefender provides these links only as a convenience, and the inclusion of the link does
not imply that BitDefender endorses or accepts any responsibility for the content of the third-party site.
Trademarks. Trademark names may appear in this book. All registered and unregistered trademarks in this document
are the sole property of their respective owners, and are respectfully acknowledged.
BitDefender Management Server
Table of Contents
License and Warranty . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ix
Description ............................................................... 1
1. Features and Benefits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.1. Key Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.2. Key Benefits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
2. Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
2.1. BitDefender Management Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
2.2. BitDefender Client Products . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
2.3. BitDefender Management Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
2.4. BitDefender Management Console . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
2.5. BitDefender Deployment Tool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
2.6. BitDefender Update Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
3. Supported BitDefender Client Products . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
3.1. Workstation Client Products . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
3.2. Server Client Products . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Installation .............................................................. 13
4. System Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
4.1. Requirements of BitDefender Management Server . . . . . . . . . . . . . . . . . . . . . . . . . 14
4.1.1. BitDefender Management Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
4.1.2. BitDefender Management Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
4.1.3. BitDefender Management Console . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
4.2. Requirements of BitDefender Client Products . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
4.2.1. BitDefender Business Client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
5. Installing BitDefender Management Server . . . . . . . . . . . . . . . . . . . . . . . 16
5.1. Step 1/9 - Welcome Window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
5.2. Step 2/9 - Read the License Agreement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
5.3. Step 3/9 - Customize Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
5.4. Step 4/9 - Choose Server Type . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
5.5. Step 5/9 - Specify Communication Ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
5.6. Step 6/9 - Ensure Database Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
5.7. Step 7/9 - Connect to Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
5.8. Step 8/9 - Start Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
5.9. Step 9/9 - Finish Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
6. Repairing or Removing BitDefender . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
iv
BitDefender Management Server
v
BitDefender Management Server
vi
BitDefender Management Server
vii
BitDefender Management Server
viii
BitDefender Management Server
additional copy for backup on a different device. The number of primary users allowed
is the number of the users of the license.
TERM OF LICENSE. The license granted hereunder shall commence on the purchasing
date of BitDefender and shall expire at the end of the period for which the license is
purchased.
EXPIRATION. The product will cease to perform its functions immediately upon
expiration of the license.
UPGRADES. If BitDefender is labeled as an upgrade, you must be properly licensed
to use a product identified by BitDefender as being eligible for the upgrade in order
to use BitDefender. A BitDefender labeled as an upgrade replaces and/or supplements
the product that formed the basis for your eligibility for the upgrade. You may use the
resulting upgraded product only in accordance with the terms of this License
Agreement. If BitDefender is an upgrade of a component of a package of software
programs that you licensed as a single product, BitDefender may be used and
transferred only as part of that single product package and may not be separated for
use by more than the total number of licensed users. The terms and conditions of this
license replace and supersede any previous agreements that may have existed
between you and BitDefender regarding the original product or the resulting upgraded
product.
COPYRIGHT. All rights, titles and interest in and to BitDefender and all copyright rights
in and to BitDefender (including but not limited to any images, photographs, logos,
animations, video, audio, music, text, and "applets" incorporated into BitDefender),
the accompanying printed materials, and any copies of BitDefender are owned by
BitDefender. BitDefender is protected by copyright laws and international treaty
provisions. Therefore, you must treat BitDefender like any other copyrighted material.
You may not copy the printed materials accompanying BitDefender. You must produce
and include all copyright notices in their original form for all copies created irrespective
of the media or form in which BitDefender exists. You may not sub-license, rent, sell,
lease or share the BitDefender license. You may not reverse engineer, recompile,
disassemble, create derivative works, modify, translate, or make any attempt to discover
the source code for BitDefender.
LIMITED WARRANTY. BitDefender warrants that the media on which BitDefender is
distributed is free from defects for a period of thirty days from the date of delivery of
BitDefender to you. Your sole remedy for a breach of this warranty will be that
BitDefender , at its option, may replace the defective media upon receipt of the
damaged media, or refund the money you paid for BitDefender. BitDefender does not
warrant that BitDefender will be uninterrupted or error free or that the errors will be
corrected. BitDefender does not warrant that BitDefender will meet your requirements.
In the event of invalidity of any provision of this Agreement, the invalidity shall not
affect the validity of the remaining portions of this Agreement.
BitDefender and BitDefender logos are trademarks of BitDefender. All other trademarks
used in the product or in associated materials are the property of their respective
owners.
The license will terminate immediately without notice if you are in breach of any of its
terms and conditions. You shall not be entitled to a refund from BitDefender or any
resellers of BitDefender as a result of termination. The terms and conditions concerning
confidentiality and restrictions on use shall remain in force even after any termination.
BitDefender may revise these Terms at any time and the revised terms shall
automatically apply to the corresponding versions of the Software distributed with the
revised terms. If any part of these Terms is found void and unenforceable, it will not
affect the validity of rest of the Terms, which shall remain valid and enforceable.
In case of controversy or inconsistency between translations of these Terms to other
languages, the English version issued by BitDefender shall prevail.
Contact BitDefender, at 5, Fabrica de Glucoza street, 72322-Sector 2, Bucharest,
Romania, or at Tel No: 40-21-2330780 or Fax:40-21-2330763, e-mail address:
office@bitdefender.com.
Description
1
BitDefender Management Server
Provides a series of configurable security policies which can be easily set using
pre-defined templates
Maintains mobile users' compliance with corporate security policies even while
offline
Integrates with Active Directory for an easy and flexible management process
Helps address the compliance issues related to network admission by automatically
detecting new stations
Saves workstation and network resources due to its small memory footprint and
optimized server-client communication
Works in the most commonly used network types (Ethernet, VPN, remote, WiFi)
Allows the setting of two types of clients - power clients, with unrestricted access
to the interface, and restricted clients, with limited access to the interface
Provides a scalable master-slave architecture capable of managing an increased
number of clients connected to a headquarter network from different physical
locations
2. Architecture
BitDefender Client Security has the following components: BitDefender Management
Server, BitDefender client products, BitDefender Management Agent, BitDefender
Management Console, BitDefender Deployment Tool and BitDefender Update Server.
Note
The only components visible to the user are BitDefender Management Console,
BitDefender Deployment Tool and BitDefender Update Server.
The "brain" of the product. The policies received from the user through the
management console are forwarded to the workstations in order to be executed, while
the information received from the workstations is processed by BitDefender
Management Server. The information is then forwarded to the management console
Architecture 5
BitDefender Management Server
Architecture 6
BitDefender Management Server
Note
To manage the BitDefender clients from a workstation other than BitDefender
Management Server, you must perform a custom installation of BitDefender Management
Server on the respective workstation. When reaching the third installation step, disable
all components other than BitDefender Management Console.
Architecture 7
BitDefender Management Server
queries BitDefender Management Server to learn the security policies that need to
be applied to the local workstation.
applies the security policies received from BitDefender Management Server.
sends the results of the applied policies to BitDefender Management Server .
visualize the entire network (managed computers, computers that are not currently
managed by BitDefender Management Server, computers excluded from
management).
Architecture 8
BitDefender Management Server
Note
To install only the management console on a workstation you must perform a custom
installation of BitDefender Management Server. When reaching the third installation
step, disable all components other than BitDefender Management Console.
Note
You can put it on a CD, on a shared folder, send it by e-mail or use a logon script in
order to install it on workstations.
Architecture 9
BitDefender Management Server
updates while the others will update from this local mirror. Moreover, updates will be
performed faster and even on the computers that are not connected to the Internet.
BitDefender Update Server is easy to configure through an intuitive step by step wizard.
Important
You must publish the folder in which updates are downloaded in order to make them
available to the network clients. To this purpose, you can use BitDefender HTTP Server
or another HTTP server such as IIS or Apache.
Architecture 10
BitDefender Management Server
Installation
13
BitDefender Management Server
4. System Requirements
To fulfill its main purpose - centralized administration of all BitDefender security
solutions in a network environment - BitDefender Management Server requires a
Microsoft Windows Network (TCP/IP)-based computer network.
Besides this primary requirement, specific system requirements must be met in order
for BitDefender Management Server and its client products to operate properly.
System Requirements 14
BitDefender Management Server
System Requirements 15
BitDefender Management Server
Note
Before launching the setup wizard, BitDefender will check for newer versions of the
installation package. If a newer version is available, you will be prompted to download
it. Click Yes to download the newer version or No to continue installing the version then
available in the setup file.
BitDefender will also alert you if you have a newer version of BitDefender Management
Server installed.
Welcome Window
License Agreement
Please read the License Agreement, select I accept the terms in the License
Agreement and click Next. A new window will appear.
Note
If you do not agree to these terms click Cancel. The installation process will be
abandoned and you will exit setup.
Custom Installation
If you click any component name, a short description (including the minimum space
required on the hard disk) will appear on the right side. By clicking any component
icon, a menu will appear where you can choose whether to install or not the selected
component.
Installation Path. By default, BitDefender Management Server will be installed in
?:\Program Files\BitDefender\BitDefender Management Server. If you
want to change the installation path, click Browse and select the folder in which you
would like BitDefender Management Server to be installed.
Click Next. A new window will appear.
Note
If you have chosen to install only BitDefender Update Server or only BitDefender
Management Console, skip directly to Step 8/9 - Start Installation (p. 24).
Server Type
Note
For more information on the master-slave architecture, please refer to Architecture
(p. 5).
Communication Ports
You may change the default communication ports in the following fields:
Server port - type in the port that will be used by a master instance of BitDefender
Management Server to communicate with a slave instance. The default port is 8082.
Agent port - type in the port that will be used by BitDefender Management Server
to communicate with BitDefender Management Agent. The default port is 8080.
Console port - type in the port that will be used by BitDefender Management Server
to communicate with BitDefender Management Console. The default port is 8081.
Important
Please take the following into account:
Provide port values between 1 and 65535 and make sure the specified ports are not
used by other applications.
Configure the local firewalls to allow these ports to be used.
Remember the console port as you will need to provide it when connecting to
BitDefender Management Server.
Database Support
Install SQL Server Express - to install Microsoft SQL Server Express on the local
machine and use this instance to manage the necessary information.
Use existing database - to connect to an existing instance of Microsoft SQL Server
/ SQL Server Express and use this instance to manage the necessary information.
Note
If BitDefender detects a database it can work with on the local machine, this option
will be selected by default.
Note
If you have chosen to install SQL Server Express, you will have to wait for the installation
to complete.
Database Credentials
You can see the name of the SQL Server instance (127.0.0.1\SQLEXPRESS) that
will be installed, as well as the database name (em3) and the generic administrator
username (sa).
You must specify the following:
The password must be at least 7 characters long, and it must contain at least one
capital letter, one small letter, one digit and one symbol.
Click Next. A new window will appear.
Database Credentials
You must first provide the information used to connect to the database. The following
fields must be filled in:
SQL Server Instance Name - type in the name of the SQL Server instance.
Port - type in the port used by BitDefender Management Server to communicate
with the database.
Username - type in a username recognized by the database.
Password - type in the password of the previously specified username.
Confirm password - re-type the password.
Database Credentials
You can see the name of the detected SQL Server instance
(127.0.0.1\SQLEXPRESS) and the database name (em3).
You must specify the following:
Start Installation
You can see the third-party products that will be installed on your computer, if any.
Depending on the components selected to be installed and on the software already
installed on the local machine, the following third-party products may be installed:
You can return to the previous steps to make any revisions if you consider this
necessary.
Click Install in order to begin the installation of the product. Please note that the
installation will take several minutes. Please wait for the installation to complete.
Finish
Click Finish. You will be asked to restart your system in order to complete the
installation process. Please do it as soon as possible.
If you have accepted the default settings for the installation path, a new folder, named
BitDefender, will appear in Program Files and it will contain the BitDefender
Management Server subfolder.
Note
We recommend that you choose Remove for a clean re-installation.
If you choose to remove BitDefender, a new window will appear. Click Remove to
start the removal of BitDefender Management Server from your computer.
Note
After the removal process is over, we recommend that you delete the BitDefender
folder from Program Files.
28
BitDefender Management Server
7. Getting Started
BitDefender Management Server and its client products can be configured and
managed through a graphical user interface named BitDefender Management Console.
The new MMC-based management console was designed with the network
administrator's needs in mind and focusing on improving user experience.
By using the management console you can:
visualize the entire network (managed computers, computers that are not currently
managed by BitDefender Management Server, computers excluded from
management).
remotely deploy BitDefender Management Agent on detected network computers
or on computers from Active Directory.
remotely deploy BitDefender client products on managed computers.
set BitDefender Management Server to automatically deploy BitDefender
Management Agent and BitDefender Business Client on newly detected computers.
find out detailed information about a managed computer.
assign policies to managed computers or to computers from Active Directory in
order to configure and even to install BitDefender client products.
run WMI scripts on managed computers in order to remotely perform administrative
tasks.
check the results of the assigned policies and WMI scripts.
configure BitDefender Management Server and monitor its activity.
obtain centralized easy-to-read reports regarding the managed computers.
remotely remove client products installed on managed computers.
Getting Started 29
BitDefender Management Server
Logon Settings
Note
If the instance of BitDefender Management Server is on the local machine, you can
type 127.0.0.1 or Localhost.
Port - type in the port used by the management console to communicate with the
respective instance of BitDefender Management Server.
Getting Started 30
BitDefender Management Server
Note
This port was specified during the installation of BitDefender Management Server. If
you did not change the default value, type 8081.
Management Console
Getting Started 31
BitDefender Management Server
The management console window consists of two panes. In the pane on the left, you
can see the tree menu containing the BitDefender Management Server instances you
are connected to and their related objects. The right pane displays the selected object
from the tree menu.
At the top of the window, you can see the classic MMC menu bar and toolbar.
Getting Started 32
BitDefender Management Server
Action
Tools
Action Menu
The Action menu replicates the options available when you right-click the BitDefender
Management Server instance in the tree menu. The following options are available:
Option Description
Register to server Opens a window where you can type the IP address or
name of a master instance of BitDefender Management
Server that will manage this instance.
Disconnect Disconnects the management console from the
BitDefender Management Server instance.
Refresh Refreshes the BitDefender Management Server
dashboard.
Change password Opens a window where you can change the logon
password of the BitDefender Management Server
instance.
Help Opens the help file.
Getting Started 33
BitDefender Management Server
Tools Menu
The Tools menu allows access to the tools provided by BitDefender Management
Server. The following options are available:
Option Description
Deployment Tool Launches Deployment Tool.
Deployment Tool helps you automatically install, remove
or repair BitDefender products on remote network
computers. It also allows you to create unattended
installation packages for use on computers where
automatic deployment cannot be performed.
Network Builder Launches Network Builder.
Network Builder helps you easily organize the network
computers into a manageable structure and deploy
BitDefender Management Agent on selected computers.
Credentials Manager Opens Credentials Manager where you can save the
credentials used for authentication when deploying
BitDefender Management Agent on remote computers.
Auto Deployment Opens the Automatic Deployment configuration window.
Automatic Deployment allows BitDefender Management
Server to automatically deploy BitDefender Management
Agent and BitDefender Business Client on newly
detected computers.
Registration Opens the Registration Information window where you
can see the license status and register BitDefender
Management Server.
Note
If connected to more than one instance of BitDefender Management Server in the
management console, you must first select the specific instance to use these tools for.
Getting Started 34
BitDefender Management Server
Change Password
Getting Started 35
BitDefender Management Server
8. Registration
BitDefender Management Server comes with a trial period of 30 days. During the trial
period, BitDefender Management Server can manage an unlimited number of
BitDefender Business Client products.
To see the registration status of a specific instance of BitDefender Management Server,
follow these steps:
1. In the tree menu, select the respective instance of BitDefender Management Server.
2. Click Tools and then Registration. A new window will appear.
Registration Information
You can see whether the BitDefender Management Server instance is a trial version
or a registered version. If it is a registered version, you can see the following
information:
the number of licensed BitDefender Business Client products that can be managed
by BitDefender Management Server.
the number of BitDefender Business Client products currently managed by
BitDefender Management Server.
the number of days until the license expires.
Registration 36
BitDefender Management Server
Registration
You can see the new information regarding your license in the Registration
Information window .
Registration 37
BitDefender Management Server
9. Dashboard
Each time you connect to an instance of BitDefender Management Server through
the management console or click, in the tree menu, the name of such instance, a
status pane is displayed. This status pane is referred to as the dashboard.
Dashboard
The dashboard provides you with useful information on the status of the BitDefender
Management Server instance and of its client products and helps you easily solve the
issues that require your attention. You should check the dashboard frequently in order
to quickly identify and solve the issues affecting BitDefender Management Server or
the network security.
Status Buttons. At the top of the pane, you can see the status buttons:
The status buttons change their color depending on the existing issues.
Dashboard 38
BitDefender Management Server
The status buttons will turn to green when you fix the related issues, but they will go
back to yellow or red whenever you forget to do important tasks or a new issue appears.
For example, if you do not update BitDefender Business Client regularly, the Business
Clients Status button will turn to red. In the same way, if you deploy BitDefender
Management Agent on a computer without moving it into a specific group or you forget
to change the default password, the Management Server Status button will turn to
yellow.
Issues List. The issues are displayed under the status buttons in a systematically
organized list. Click a specific status button to see the related issues, if any.
Note
By default, the status pane displays the issues concerning BitDefender Management
Server.
Click to see more information about an issue and instructions on how to quickly fix
it. To hide the details, click .
Follow the instructions provided in order to fix the respective issue.
Dashboard 39
BitDefender Management Server
Note
Computers will be referred to as managed or under the management of BitDefender
Management Server if they have BitDefender Management Agent installed.
Note
The first time you connect to a server, you will find all detected network computers
in this group.
Excluded Computers - contains the network computers which are not monitored at
all by BitDefender Management Server. In this group you can find all network
computers excluded from the Unmanaged Computers or Managed Computers
group.
Computers Directory 40
BitDefender Management Server
Managed Computers
Here you can find the computers managed by BitDefender Management Server.
In the tree menu, you can see all the groups contained by the Managed Computers
group.
Computers Directory 41
BitDefender Management Server
You can see all the computers managed by BitDefender Management Server listed
in the table. The table columns provide you with useful information about the listed
computers:
Note
If No Name is displayed under this column, the respective computer may be a
management switch or a router interface.
Computers Directory 42
BitDefender Management Server
Note
It is important to monitor the Activity field as long inactivity periods might indicate
that the computer is disconnected.
You can hide all managed computers by clicking the corresponding link.
Note
If Managed Computers is not the currently open pane, only Refresh, Paste and Help
will appear on the menu.
Computers Directory 43
BitDefender Management Server
You can see the managed computers which have not yet been placed in a specific
group.
Different from the custom groups, you cannot rename or delete this group. You cannot
create a new sub-group or move an existing group in this group either.
Creating Groups
To create a new sub-group in the Managed Computers group or in a custom group,
follow these steps:
1. Right-click the group into which the new sub-group is to be included and select
Create group. A new group (named New Group) will appear under the parent
group in the tree menu.
2. Rename the newly created group.
Computers Directory 44
BitDefender Management Server
Renaming Groups
To rename a group, right-click it, select Rename and type the new name.
Moving Groups
To move a sub-group from one group to another, follow these steps:
If you are reorganizing the Managed Computers group, we recommend that you use
the Network Builder.
Deleting Groups
To delete a specific group, right-click it and select Delete. You will have to confirm
your action by clicking Yes.
name;
description;
IP address;
the time when they were last detected.
To sort computers by one of the previously mentioned criteria, just click the
corresponding column heading in the table.
For example, if you want to order computers by name click the Computer Name
heading. If you click the heading again, the computers will be displayed in reverse
order.
Computers Directory 45
BitDefender Management Server
Assigning Policies
Computers Directory 46
BitDefender Management Server
You can choose to assign an existing policy or to create and assign a new policy.
Note
For more information, please refer to Policy Templates (p. 138).
Computers Directory 47
BitDefender Management Server
Note
Switching to the other operating mode of BitDefender Business Client will require a
system restart on the target computer. You can use a WMI script to automatically restart
managed computers.
Note
If you delete a managed computer while it is still connected to the network, BitDefender
will eventually detect its activity and restore it in the Managed Computers > Not
Grouped group.
Computers Directory 48
BitDefender Management Server
To exclude several computers from management, select them, right-click the selection
and then select Exclude items from the menu. You will have to confirm your action
by clicking Yes.
Note
The excluded computers will be moved in the Excluded Computers group.
Note
By default, all available columns are displayed. Their default order is the following:
1. Computer Name
2. Description
3. IP Address
4. Activity
In the tree menu, right-click the group, then point to View and select Add/Remove
Columns. A new window will appear allowing you to manage the displayed columns.
You can see the columns that are not displayed (Available columns) and the currently
displayed columns (Displayed columns).
Computers Directory 49
BitDefender Management Server
If you do not want a specific column to be displayed anymore, select it from the
displayed columns and click Remove To display a column not currently displayed,
select it from the available columns and click Add.
To change the order in which columns are displayed, select a column and use the
Move Up and Move Down buttons to change its priority.
To apply the default configuration, click Restore Defaults.
Click OK to save the changes and close the window.
Note
This is very useful if you need printed statistics.
Computers Directory 50
BitDefender Management Server
Note
The first time you connect to an instance of BitDefender Management Server, you will
find all detected network computers in this group.
Unmanaged Computers
You can see the unmanaged computers listed in the table. The table columns provide
you with useful information about the listed computers:
Note
If No Name is displayed under this column, the respective computer may be a
management switch or a router interface.
Computers Directory 51
BitDefender Management Server
Note
It is important to monitor the Activity field as long inactivity periods might indicate
that the computer is disconnected.
Note
If Unmanaged Computers is not the currently open pane, only Refresh and Help will
appear on the menu.
name;
description;
Computers Directory 52
BitDefender Management Server
IP address;
deployment status;
the time when they were last detected.
To sort computers by one of the previously mentioned criteria, just click the
corresponding column heading in the table.
For example, if you want to order computers by name click the Computer Name
heading. If you click the heading again, the computers will be displayed in reverse
order.
Note
When deploying BitDefender Management Agent in the network for the first time, it is
recommended to use Network Builder. To automatically deploy BitDefender Management
Agent on newly detected computers, use Automatic Deployment.
Computers Directory 53
BitDefender Management Server
Deployment Options
Computers Directory 54
BitDefender Management Server
Note
For more information, please refer to Credentials Manager (p. 98).
Do not restart after the installation is completed - the remote computer will not
be restarted once the installation is completed, even if necessary. BitDefender will
wait for a user to restart the computer.
Prompt the user for restart if necessary - the user whose credentials are used
for authentication on the remote computer will be prompted to restart the computer,
if necessary.
Note
The user must confirm or suspend computer restart within 30 seconds, otherwise
the remote computer will be restarted automatically.
Always restart the computer after installation - the remote computer is restarted
immediately after the installation is completed, without alerting the user.
Computers Directory 55
BitDefender Management Server
Note
BitDefender recommends that you do not deploy BitDefender Management Agent
on the computers on which BitDefender Management Server is installed.
To exclude a computer from management, just right-click it and select Exclude from
the menu. You will have to confirm your action by clicking Yes.
To exclude several computers from management, select them, right-click the selection
and then select Exclude items from the menu. You will have to confirm your action
by clicking Yes.
Note
The excluded computers will be moved in the Excluded Computers group.
Computers Directory 56
BitDefender Management Server
Note
If you delete an unmanaged computer while it is still connected to the network,
BitDefender will eventually detect its activity and restore it in the Unmanaged Computers
group.
Note
By default, all available columns are displayed. Their default order is the following:
1. Computer Name
2. Description
3. IP Address
4. Deployment Status
5. Activity
In the tree menu, right-click the group, then point to View and select Add/Remove
Columns. A new window will appear allowing you to manage the displayed columns.
You can see the columns that are not displayed (Available columns) and the currently
displayed columns (Displayed columns).
If you do not want a specific column to be displayed anymore, select it from the
displayed columns and click Remove To display a column not currently displayed,
select it from the available columns and click Add.
Computers Directory 57
BitDefender Management Server
To change the order in which columns are displayed, select a column and use the
Move Up and Move Down buttons to change its priority.
To apply the default configuration, click Restore Defaults.
Click OK to save the changes and close the window.
Note
This is very useful if you need printed statistics.
Note
Computers can be excluded both from the Unmanaged Computers and from the
Managed Computers group. As a rule, exclude the management switches and router
Computers Directory 58
BitDefender Management Server
Excluded Computers
You can see the excluded computers listed in the table. The table columns provide
you with useful information about the listed computers:
Note
If No Name is displayed under this column, the respective computer may be a
management switch or a router interface.
Computers Directory 59
BitDefender Management Server
Note
It is important to monitor the Activity field as long inactivity periods might indicate
that the computer is disconnected.
Note
If Excluded Computers is not the currently open pane, only Refresh and Help will
appear on the menu.
name;
description;
IP address;
the time when they were last detected.
Computers Directory 60
BitDefender Management Server
To sort computers by one of the previously mentioned criteria, just click the
corresponding column heading in the table.
For example, if you want to order computers by name click the Computer Name
heading. If you click the heading again, the computers will be displayed in reverse
order.
Note
If you delete a computer while it is still connected to the network, BitDefender will
eventually detect its activity. The following situations may occur:
Computers Directory 61
BitDefender Management Server
The only method that you can use to restore an excluded computer is to delete it from
the table. This works however only for the main groups. If the computer was excluded
from a sub-group within the Managed Computers group, after BitDefender Management
Agent contacts the server, the respective computer will be placed in the Not Grouped
group.
Note
For more information, please refer to Deleting Computers from Table (p. 61).
Note
By default, all available columns are displayed. Their default order is the following:
1. Computer Name
2. Description
3. IP Address
4. Activity
In the tree menu, right-click the group, then point to View and select Add/Remove
Columns. A new window will appear allowing you to manage the displayed columns.
You can see the columns that are not displayed (Available columns) and the currently
displayed columns (Displayed columns).
Computers Directory 62
BitDefender Management Server
If you do not want a specific column to be displayed anymore, select it from the
displayed columns and click Remove To display a column not currently displayed,
select it from the available columns and click Add.
To change the order in which columns are displayed, select a column and use the
Move Up and Move Down buttons to change its priority.
To apply the default configuration, click Restore Defaults.
Click OK to save the changes and close the window.
Note
This is very useful if you need printed statistics.
Computers Directory 63
BitDefender Management Server
11. Policies
BitDefender client products are administered remotely through policies. A policy defines
a set of security rules a client computer must comply with.
Policies are sent by BitDefender Management Server to BitDefender Management
Agent, which applies them to the local BitDefender client product. Once a policy has
been successfully transmitted to BitDefender Management Agent, it will be applied to
the local BitDefender client product no matter if communication with BitDefender
Management Server fails.
Policies can be assigned to individual clients or to entire groups of clients.
Policies 64
BitDefender Management Server
You can see the available categories of policy templates and the policy templates of
the selected category. Policy templates are grouped based on products:
Note
For detailed information on the options of each template and how to configure them,
please refer to Policy Templates (p. 138).
Policies 65
BitDefender Management Server
Note
The default templates cannot be edited, renamed or given a new description. In order
to have fully customizable templates, duplicate the default templates and then delete
them. All duplicates are fully customizable.
Advanced Settings
You can see the template name and how its settings are configured.
Note
For detailed information on the options of each default template, please refer to Policy
Templates (p. 138).
Policies 66
BitDefender Management Server
At the top of each template pane, you can see the template name and a short
description. Below, you can find the template settings grouped into sections.
Click to expand a section and see all configurable settings. To collapse a section
and hide all settings, click .
Make the desired changes by selecting new settings or providing other parameters.
Note
For detailed information on the options of each default template and how to configure
them, please refer to Policy Templates (p. 138).
Click Finish to save the changes and return to the previous pane. If you want to go
back without saving any changes, click Cancel.
Policies 67
BitDefender Management Server
Renaming Templates
To rename a template, follow these steps:
1. Right-click the policy template based on which the new template is to be created
and select Duplicate. A copy of the selected template will appear in the table.
2. Edit the settings of the new template according to your needs.
3. Rename the template to reflect its purpose.
4. Modify the template description to reflect its settings.
Deleting Templates
To delete a template, right-click it and select Delete. You will have to confirm your
action by clicking Yes.
Important
Please note that all policies created based on the deleted template will also be removed.
Policies 68
BitDefender Management Server
1. Right-click the policy template based on which the new policy is to be created and
select Create policy. The template's pane will be displayed in order for you to be
able to modify the template settings.
2. Configure the policy by editing the template settings.
Note
For detailed information on the options of each template and how to configure them,
please refer to Policy Templates (p. 138).
3. Click Finish. A new pane will be displayed in order for you to be able to assign the
policy.
4. Select the location where clients or groups are to be searched in order to be
assigned the policy. You can select Network Computer to search in the Managed
Computers group or Network User to search in Active Directory.
5. Select the computer, group or domain user to assign the policy to.
6. Select the schedule according to which the policy should run. You can choose from
the menu to run the policy one time only, every minute, hour, day or week. You can
also specify a start and an end time by selecting the corresponding options and
configuring the time from the menus.
7. Click the provided link to assign the policy. The new policy will appear in the Current
Policies pane.
Important
When you assign a new firewall policy to a client, all of the existing firewall rules (created
through the previously assigned policy, through the firewall alerts or by the local users)
are overwritten. If you do not want the rules created through the previously assigned
policy to be lost, you must edit the respective policy as needed (by adding, modifying
or removing rules) and assign it, if not scheduled.
Policies 69
BitDefender Management Server
You can see the available categories of policies and the policies of the selected
category. The current policies are grouped based on products:
Note
For detailed information on the options of each template and how to configure them,
please refer to Policy Templates (p. 138).
Policies 70
BitDefender Management Server
Note
A policy allows configuring the same settings as the template based on which it was
created. For detailed information on the options of each template, please refer to Policy
Templates (p. 138).
Policies 71
BitDefender Management Server
Scan Policy
At the top of each policy pane, you can see the policy name and a short description.
Below, you can find the policy settings grouped into sections.
Click to expand a section and see all configurable settings. To collapse a section
and hide all settings, click .
Make the desired changes by selecting new settings or providing other parametres.
Note
A policy allows configuring the same settings as the template based on which it was
created. For detailed information on the options of each template, please refer to Policy
Templates (p. 138).
Click Finish to save the changes and return to the previous pane. If you want to go
back without saving any changes, click Cancel.
Renaming Policies
To rename a policy, follow these steps:
Policies 72
BitDefender Management Server
3. Press ENTER.
1. Right-click the current policy based on which the new policy is to be created and
select Duplicate. A copy of the selected policy will appear in the table.
2. Edit the settings of the new policy according to your needs.
3. Rename the policy to reflect its purpose.
4. Modify the policy description to reflect its settings.
Deleting Policies
To delete a policy, right-click it and select Delete. You will have to confirm your action
by clicking Yes.
Important
Please note that all policies created based on the deleted policy will also be removed.
Policies 73
BitDefender Management Server
1. Right-click the policy and select Assign policy. A new pane will be displayed in
order for you to be able to assign the policy.
2. Select the location where clients or groups are to be searched in order to be
assigned the policy. You can select Network Computer to search in the Managed
Computers group or Network User to search in Active Directory.
3. Select the computer, group or domain user to assign the policy to.
4. Select the schedule according to which the policy should run. You can choose from
the menu to run the policy one time only, every minute, hour, day or week. You can
also specify a start and an end time by selecting the corresponding options and
configuring the time from the menus.
5. Click the provided link to assign the policy.
Important
When you assign a new firewall policy to a client, all of the existing firewall rules (created
through the previously assigned policy, through the firewall alerts or by the local users)
are overwritten. If you do not want the rules created through the previously assigned
policy to be lost, you must edit the respective policy as needed (by adding, modifying
or removing rules) and assign it, if not scheduled.
Settings
Assigned To
Clients
Settings Tab
Click the Settings tab to see the settings of the selected policy.
Assigned To Tab
Click the Assigned to tab to see the clients that are assigned the selected policy.
You can see the name of the assigned clients, their IP addresses and the policy
schedule.
Policies 74
BitDefender Management Server
If you do not want the policy to be assigned anymore, just click Remove. All policy
responses will be deleted as well as the assigned clients.
If the policy is not assigned to any client, an Assign button is available. Click this
button to assign the policy to specific clients.
Clients Tab
Click the Clients tab to see the results of the selected policy on each assigned client.
You must click Show all responses to see the results.
Policies 75
BitDefender Management Server
find out useful information about the network computers, such as system information,
installed software, startup programs, free disk space and so on.
remove software installed on the network computers.
kill specific processes running on the network computers.
restart or shutdown the network computers.
log off the user logged on the network computers.
In the tree menu, go to WMI Scripts > Create New WMI Script.
In the WMI Scripts pane, click the corresponding link.
WMI Scripts 76
BitDefender Management Server
WMI Scripts 77
BitDefender Management Server
Note
The default templates cannot be edited, renamed or given a new description. In order
to have fully customizable templates, duplicate the default templates and then delete
them. All duplicates are fully customizable.
Remove software
Kill process
To view the settings of a template, right-click it and select View settings. The template
settings will be displayed in a new pane. Click Close to return to the previous pane.
Remove software
Kill process
To edit the settings of a custom Remove software WMI script template, follow these
steps:
1. Right-click the template and select Edit settings. A new pane will be displayed.
2. In the edit field, type the name of the software you want to be removed.
3. Click Finish to save the changes and return to the previous pane.
To edit the settings of a custom Kill process WMI script template, follow these steps:
1. Right-click the template and select Edit settings. A new pane will be displayed.
2. In the edit field, type the name of the process you want to be stopped.
3. Click Finish to save the changes and return to the previous pane.
Renaming Templates
To rename a template, follow these steps:
WMI Scripts 78
BitDefender Management Server
1. Right-click the WMI script template based on which the new template is to be created
and select Duplicate. A copy of the selected template will appear in the table.
2. Edit the settings of the new template according to your needs.
3. Rename the template to reflect its purpose.
4. Modify the template description to reflect its settings.
Deleting Templates
To delete a template, right-click it and select Delete. You will have to confirm your
action by clicking Yes.
Important
Please note that all WMI scripts created based on the deleted template will also be
removed.
WMI Scripts 79
BitDefender Management Server
1. Right-click the WMI script template based on which the new WMI script is to be
created and select Create WMI script. A new pane will be displayed.
2. Configure the WMI script by providing the required parameters, if any, and click
Finish.
Note
Only the WMI script templates listed below and their duplicates have configurable
settings:
Remove software
Kill process
WMI Scripts 80
BitDefender Management Server
You can see the active WMI scripts. You can run these scripts in order to find out
more information about the managed computers and to perform administrative tasks.
WMI Scripts 81
BitDefender Management Server
Remove software
Kill process
To view the settings contained by a template, right-click it and select View settings.
The template settings will be displayed in a new pane. Click Close to return to the
previous pane.
Remove software
Kill process
To edit the settings of a Remove software WMI script, follow these steps:
1. Right-click the WMI script and select Edit settings. A new pane will be displayed.
2. In the edit field, type the name of the software you want to be removed.
3. Click Finish to save the changes and return to the previous pane.
To edit the settings of a Kill process WMI script, follow these steps:
1. Right-click the WMI script and select Edit settings. A new pane will be displayed.
2. In the edit field, type the name of the process you want to be stopped.
3. Click Finish to save the changes and return to the previous pane.
WMI Scripts 82
BitDefender Management Server
1. Right-click the current WMI script based on which the new WMI scripts is to be
created and select Duplicate. A copy of the selected WMI script will appear in the
table.
2. Edit the settings of the new WMI script, if any, according to your needs.
3. Rename the WMI script to reflect its purpose.
4. Modify the WMI script description to reflect its purpose.
Important
Please note that all WMI scripts created based on the deleted WMI script will also be
removed.
Note
When disabled, a WMI script cannot be executed on the assigned clients.
WMI Scripts 83
BitDefender Management Server
Settings
Assigned To
Clients
Settings Tab
Click the Settings tab to see the settings of the selected WMI script.
Note
Only WMI scripts created based on the templates listed below or on their duplicates
have configurable settings:
Remove software
Kill process
Assigned To Tab
Click the Assigned to tab to see the clients the selected WMI script is assigned to.
You can see the name of the respective clients, their IP addresses and the schedule
based on which the WMI script is executed.
If you do not want the WMI script to run on any client anymore, just click Remove. All
data in the Assigned to and the Clients tabs will be deleted.
If the WMI script is not assigned to any client, an Assign button will be available. Click
this button to assign the WMI script to run on specific clients.
Clients Tab
Click the Clients tab to see the results of the selected WMI script for each client it
was assigned to. You must click Show all responses to see the results.
WMI Scripts 84
BitDefender Management Server
Reports are created using the Crystal Reports technology, based on report templates
and information existing in the BitDefender Management Server's database. They
provide you with:
The information is presented as easy-to-read pie charts, tables and graphics, allowing
you to quickly check the network security status and identify security issues.
The reports created are not automatically saved on the disk. However, you can print
them or save them in various formats, such as .doc or .pdf.
Reporting Center 85
BitDefender Management Server
You can see the report templates that you can use to create reports. The following
report templates are available:
Report Description
Product Update Report Provides you with information on the update status of
all of the BitDefender client products managed by
BitDefender Management Server.
Malware Activity Report Provides you with information regarding the malware
activity on the computers managed by BitDefender
Management Server during a specified time interval.
BitDefender Business Provides you with information on the status of the
Client Status Report BitDefender Business Client products managed by
BitDefender Management Server.
Reporting Center 86
BitDefender Management Server
1. Right-click the report you want to create and select Create report. A new pane will
be displayed.
2. Select the BitDefender Management Server instance to create the report for.
3. For malware activity reports, specify the time interval to be covered in the report.
4. Click the provided link in order to create the report.
Note
The time required for reports to be created may vary depending on the number of
managed computers or of BitDefender client products. Please wait for the requested
report to be created.
Report Sample
Reporting Center 87
BitDefender Management Server
At the top of the first report page, you can see the report name, date and, for malware
activity reports, the period it covers. The first page provides you with statistical data
(pie charts and graphics) for all network computers managed by BitDefender
Management Server. There follows detailed information on each managed computer.
To export a report, click the Export Report button and save the file under the
desired name and format.
Go to First Page
Go to Previous Page
Go to Next Page
Go to Last Page
Go to Page
Reporting Center 88
BitDefender Management Server
Reporting Center 89
BitDefender Management Server
Note
We recommend checking Server Activity in case BitDefender Management Server does
not function properly.
Activity Log 90
BitDefender Management Server
You can see in the table the recorded events that match the selected verbosity level.
The table columns provide you with useful information about the listed events:
Level - the event type, which is related to the verbosity level. Depending on the
verbosity level, all or only specific types of events are displayed in the Server Activity
pane. There are three levels:
1 Indicates an error that occurred during the operation of BitDefender
Management Server.
2 Indicates a warning.
3 Indicates a successful operation.
Date\Time - the moment when the event occurred.
Source - the machine the event took place on.
User - the user account under which the event occurred.
Operation - the operation that caused the event.
Message - the debug message, if any. The debug message offers additional
information about the event.
If you want the management console to automatically check for new events every
second, select Autorefresh. You will also be able to select Autoscroll to automatically
scroll down and keep visible the last added event.
Activity Log 91
BitDefender Management Server
To sort events by any of these criteria, just click the corresponding column heading
in the table.
Note
The activity log has a maximum size limit of 10MB. Once the size limit has been reached,
the oldest events will be overwritten as new events occur.
Activity Log 92
BitDefender Management Server
15. Tools
BitDefender Management Server comes with several built-in tools that provide:
In this chapter you can find a detailed description of the BitDefender Management
Server built-in tools.
Note
You should use Network Builder immediately after deploying BitDefender Management
Server.
Using Network Builder, you can drag&drop the detected network computers (those
displayed in the Unmanaged Computers group) or the computers imported from Active
Directory in the Excluded Computers or Managed Computers group. After organizing
the network computers, you can apply changes and deploy BitDefender Management
Agent on the computers that you have moved into the Managed Computers group.
To display the Network Builder pane, click Tools in the management console and
then Network Builder on the menu.
Note
If connected to more than one instance of BitDefender Management Server in the
management console, you must first select the specific instance to use the tool for.
Tools 93
BitDefender Management Server
On the left side of the Network Builder pane, you can see the detected network
computers. These computers are not managed by BitDefender Management Server
and can be found in the Unmanaged Computers group. On the right side, you can
see the Excluded Computers and Managed Computers groups from Computers
Directory. You can click Active Directory Computers to import the computers from
Active Directory and display them instead of the unmanaged computers.
Tools 94
BitDefender Management Server
Deleting Groups
To delete a sub-group of the Managed Computers group, right-click it and select Delete
group.
Note
If you delete an unmanaged computer while it is still connected to the network,
BitDefender will eventually detect its activity and restore it in the Unmanaged Computers
group.
Note
BitDefender recommends that you do not deploy BitDefender Management Agent
on the computers on which BitDefender Management Server is installed.
Tools 95
BitDefender Management Server
Deployment Options
You must specify the deployment options before initiating the deployment of
BitDefender Management Agent
To configure and initiate the deployment of BitDefender Management Agent, follow
these steps:
Tools 96
BitDefender Management Server
Note
For more information, please refer to Credentials Manager (p. 98).
Do not restart after the installation is completed - the remote computer will not
be restarted once the installation is completed, even if necessary. BitDefender will
wait for a user to restart the computer.
Prompt the user for restart if necessary - the user whose credentials are used
for authentication on the remote computer will be prompted to restart the computer,
if necessary.
Note
The user must confirm or suspend computer restart within 30 seconds, otherwise
the remote computer will be restarted automatically.
Always restart the computer after installation - the remote computer is restarted
immediately after the installation is completed, without alerting the user.
Tools 97
BitDefender Management Server
Deployment Status
You can see the status of the deployment process for each computer moved into the
Managed Computers group.
Click Dismiss page to close this pane.
the username of a user account with administrative rights on the remote computer.
the password of the specified user account.
for a domain user account, the domain to which it belongs.
for a local user account (on a standalone or workgroup computer), the computer
name.
Tools 98
BitDefender Management Server
Note
These credentials are used only when deploying BitDefender Management Agent directly
on unmanaged computers or by using Network Builder or Automatic Deployment. If you
use Deployment Tool, you will have to provide the appropriate credentials each time
you use it.
To open the Credentials Manager window, open the management console, click Tools
and then Credentials Manager on the menu.
Credentials Manager
Note
For security reasons, the password is not displayed in the Credentials Manager window,
neither in clear, nor masked.
Tools 99
BitDefender Management Server
Note
The provided password is encrypted in order to Adding New Credentials
avoid a potential security threat.
Domain - if you specified a domain user account, type the respective domain;
otherwise, type the computer name.
Click Add to add the new credentials. If you want to quit, just click Cancel.
When finished adding credentials, click OK to save the changes and close the window
Tools 100
BitDefender Management Server
Note
BitDefender only detects the computers in the same broadcast domain as the
computer on which the BitDefender Management Server is installed.
Open the management console, click Tools and then Deployment Tool on the
menu.
On the Windows Start menu, follow the path: Start Programs BitDefender
Management Server BitDefender Deployment Tool.
A wizard will appear and guide you through the deployment process.
Tools 101
BitDefender Management Server
Note
The wizard steps and use instructions of Deployment Tool will be discussed in the
following sections.
Note
You must choose Automatically Install / Uninstall / Repair a product in the second
step of the wizard.
Welcome Window
Tools 102
BitDefender Management Server
Deployment Method
Select the first option and click Next. A new window will appear.
Tools 103
BitDefender Management Server
Packages
Select the package you want to use and click Next. A new window will appear.
Tools 104
BitDefender Management Server
Operations
You can choose to automatically install, repair or remove the previously selected
package on remote network computers.
Note
If you choose Repair or Remove, you will skip the next step.
Select the operation you want to perform and click Next. A new window will appear.
Tools 105
BitDefender Management Server
Package Components
You can see the installation package selected and its components, if any. Click a
specific component to see its description.
By default, all package components will be installed. If you do not want to install a
specific component, just click its corresponding check box.
Note
You cannot choose not to install core package components.
Tools 106
BitDefender Management Server
Deployment Options
General Options
The options in the General Options category allow you to specify the deployment
behaviour on the target computers. You can check:
Notify user before and after deploying the package - to alert the user logged on
the target computers about the deployment process. Two dialogs will appear on the
user's screen, before and after the deployment process.
Do not display user interface on the target computers (recommended) - to
install the package silently in the background. The Windows Installer interface will
not be displayed on target computers.
Use non interactive Authentication - to provide the administrative credentials
(username and password) that will be used to authenticate on the target computers.
Tools 107
BitDefender Management Server
Important
If you do not provide these credentials, the deployment process will fail.
Credentials
Note
The provided credentials will be used only for the current deployment process. They
will not be saved for future deployments.
Reboot Options
Usually, after the deployment is completed, the target computers must be restarted.
The options in the Reboot Options category allow you to specify how to restart the
target computers. If you select:
Do not reboot target computers - the target computers will not be restarted, even
if necessary. BitDefender will wait for a user to restart them.
Reboot the computer if necessary, and ask the user to confirm - the user will
be prompted to restart the computer, if necessary. If no user response is received
within a certain time interval, the computer is automatically restarted. To specify the
time interval until restart, type the number of seconds in the edit field.
Tools 108
BitDefender Management Server
Note
By default, the time interval until restart is set to 0. This means that the target computer
will be automatically restarted.
Force the target computer to reboot - the target computers will be restarted after
a certain time interval. To specify the time interval until restart, type the number of
seconds in the edit field.
Note
By default, the time interval until restart is set to 0. This means that the target computer
will be automatically restarted.
Target Computers
Tools 109
BitDefender Management Server
You can easily browse the entire Microsoft Windows Network and see all domains
and workgroups in your network.
To specify the target computers, use one the following methods:
Browse the network to find target computers. You must follow the next steps:
1. Double-click a domain or workgroup in the Entire Network list (or select it from
the menu) to see the computers it contains.
2. Double-click the computers you want to add to the target list (or select them and
click Add computers to list).
Note
To select all computers in the list, click one of them and then press CTRL+A.
Type the name or IP address of the target computers directly into the target
list, separated by semicolons ";".
To learn about the syntax you must use, click View some examples. A new window
will appear providing you with examples of valid and wrong syntax.
Click Start to initiate the deployment process. A new window will appear.
Tools 110
BitDefender Management Server
Results
You can see the deployment status on each target computer. Wait until all deployment
processes are finished.
Note
If the deployment process fails, you can see the returned error message explained in
detail.
If you want to save the results in a HTML or a txt file, click Save Results.
Click Finish to close the window.
Note
This is very useful when troubleshooting errors that occurred during deployment.
The following picture presents the deployment results saved in HTML format:
Tools 111
BitDefender Management Server
Tools 112
BitDefender Management Server
Put it on a removable storage device (CD, DVD, USB stick) and then copy it on
network computers.
Send it by e-mail to a certain user.
Transfer it in a shared folder, so that it can be read from any other workstation.
Use a logon script to automatically install it after the login procedure.
To create an unattended installation package, launch Deployment Tool and follow the
wizard steps.
Note
You must choose Create an unattended installation package for later use in the
second step of the wizard.
Welcome Window
Tools 113
BitDefender Management Server
Deployment Method
Select the second option and click Next. A new window will appear.
Tools 114
BitDefender Management Server
Packages
Select the package you want to use and click Next. A new window will appear.
Tools 115
BitDefender Management Server
Package Components
You can see the installation package selected and its components, if any. Click a
specific component to see its description.
By default, all package components will be installed. If you do not want to install a
specific component, just click its corresponding check box.
Note
You cannot choose not to install core package components.
Tools 116
BitDefender Management Server
Deployment Options
General Options
The options in the General Options category allow you to specify the deployment
behaviour on the target computers. You can check:
Notify user before and after deploying the package - to alert the user logged on
the target computers about the deployment process. Two dialogs will appear on the
user's screen, before and after the deployment process.
Do not display user interface on the target computers (recommended) - to
install the package silently in the background. The Windows Installer interface will
not be displayed on target computers.
Tools 117
BitDefender Management Server
Reboot Options
Usually, after the deployment is completed, the target computers must be restarted.
The options in the Reboot Options category allow you to specify how to restart the
target computers. If you select:
Do not reboot target computers - the target computers will not be restarted, even
if necessary. BitDefender will wait for a user to restart them.
Reboot the computer if necessary, and ask the user to confirm - the user will
be prompted to restart the computer, if necessary. If no user response is received
within the specified time interval, the computer is automatically restarted. To specify
the time interval until restart, type the number of seconds in the edit field.
Note
By default, the time interval is set to 0. This means that the target computer will be
automatically restarted.
Force the target computer to reboot - the target computers will be restarted after
the specified time interval. To specify the time interval until restart, type the number
of seconds in the edit field.
Note
By default, the time interval is set to 0. This means that the target computer will be
automatically restarted.
Tools 118
BitDefender Management Server
Saving Options
You can make any changes you want by returning to the previous steps (click Back).
To specify the package name and where to save it, follow the next steps:
1. Click Browse.
2. Select the location where to save the file. You can save it on the local machine or
on a network share.
3. Save the file with the desired name. The default filename is deploypack.exe.
Note
We recommend that you choose an explicit filename, such as
deploypack_bdagent.exe.
You can also type the full path and name of the installation package directly in the
edit field.
Click Next to create and save the unattended installation package. A new window will
appear.
Tools 119
BitDefender Management Server
Results
Note
By default, Automatic Deployment is disabled. BitDefender Management Agent will be
deployed only on the computers detected after enabling Automatic Deployment.
Tools 120
BitDefender Management Server
Automatic Deployment
To remove IP addresses from the list, select them and click Remove Selected. You
will have to confirm your action by clicking Yes.
Tools 121
BitDefender Management Server
Note
BitDefender Management Agent will not be automatically deployed only by enabling
Automatic Deployment. You will have to follow the next configuration steps in order for
Automatic Deployment to work properly.
If you also want BitDefender Business Client to be automatically deployed along with
BitDefender Management Agent, check Install BitDefender Business Client.
Note
If you have specific IP addresses assigned to router interfaces, management switches
or some computers that you do not want to be managed by BitDefender Management
Server, choose Deploy on all computers except and provide the excepted IP
addresses.
If you have a range of IP addresses assigned to computers that you want to be
managed by BitDefender Management Server, choose Deploy on these computers
only and provide these IP addresses.
Add IP addresses
If you want to add one or several IP addresses, type them in the upper edit field.
Tools 122
BitDefender Management Server
Note
If you provide more than one IP address, separate them by a semicolon ";".
If you want to add a range of IP addresses, type the lower and upper range limit in
the corresponding fields.
Click OK to save the changes and close the window.
Note
For more information, please refer to Credentials Manager (p. 98).
Tools 123
BitDefender Management Server
Important
In order to perform automatic deployment on the specified VPN computers, their IP
addresses must be either explicitly allowed or not restricted in the Automatic
Deployment configuration window.
To add IP addresses to the list, click Add. A new window will appear.
Type the IP addresses in the upper edit field,
separating them by semicolons (";"). If you want
to add a range of IP addresses, type the lower
and upper range limit in the corresponding
fields.
Click OK to add the specified IP addresses to
the list.
Add IP addresses
Tools 124
BitDefender Management Server
Tools 125
BitDefender Management Server
The first time you open the configuration window you can see that no settings are
configured. You will have to click Change Settings and follow the configuration wizard
steps.
If BitDefender Update Server has already been configured, the window will display
the following:
The local update address that must be configured on the BitDefender products is:
Tools 126
BitDefender Management Server
Configure and assign update policies using such an update location to set the
BitDefender client products to update from the local mirror.
Important
You must publish the folder where updates are downloaded in order to make them
available to the network clients.
If you want to immediately download updates from the Internet update location, just
click Update Now.
To close the configuration window, click Exit.
Welcome Window
Tools 127
BitDefender Management Server
By default, BitDefender Update Server will download updates on the local computer
from http://upgrade.bitdefender.com. This is a generic address that is automatically
resolved to the closest server that stores BitDefender malware signatures in your
region.
Click Next. A new window will appear.
Tools 128
BitDefender Management Server
1. Type the path to the local folder into which to download and store the BitDefender
updates or click Browse and select it.
2. Publish the folder where updates are downloaded in order to make them available
to the network clients.
If you want to use BitDefender's own HTTP server to publish the local update
location, select Use BitDefender HTTP Server. By default, port 80 will be used,
but you can specify another port.
You can also publish the downloads folder by using another HTTP server like IIS
or Apache.
Important
The local update address that must be configured on the BitDefender products is:
Configure and assign update policies using such an update location to set the
BitDefender client products to update from the local mirror.
Tools 129
BitDefender Management Server
Proxy Settings
In case your company connects to the Internet through a proxy, select Use a proxy
server for access to the Internet and provide the proxy settings. You must fill in the
following fields:
Tools 130
BitDefender Management Server
You can see the entire list of BitDefender products that can be updated using
BitDefender Update Server.
Select the products that interest you (those installed on computers managed by
BitDefender Management Server) and click Next. A new window will appear.
Tools 131
BitDefender Management Server
Update Interval
Type the update interval in hours and click Next. A new window will appear.
Finish
The last window of the configuration wizard displays all the settings you have
configured. You can make any changes you want by returning to the previous steps
(click Back).
Tools 132
BitDefender Management Server
Click Finish to save changes. The settings will appear in the BitDefender Update
Server configuration window.
Tools 133
BitDefender Management Server
16.1. Overview
In a master-slave architecture, a specific instance of BitDefender Management Server
(the master server) manages other instances of BitDefender Management Server (the
slave servers).
A slave server acts as a single (standalone) instance of BitDefender Management
Server, managing network computers. Furthermore, the slave server receives policies
and WMI scripts assigned by and reports to its master server.
If you want a slave server not to be managed by its master anymore, right-click its
name in the tree menu and select Unregister from server. If you want a single
(standalone) instance of BitDefender Management Server to be managed by a master,
follow these steps:
1. Right-click the instance name in the tree menu and select Register to server. A
new window will appear.
2. In the edit field, type the name or the IP address of the master instance.
3. Click OK.
The master server does not have its own managed computers, but it indirectly manages
those of its slave servers by assigning policies and WMI scripts to them. Another main
purpose of the master server is to provide you with information on the network security
status, by centralizing data from all managed servers. In this way, you can get
centralized results from all the clients of the slave servers in a single report.
Note
For more information on registering BitDefender Management Server, please refer to
Registration (p. 36).
Network View
Virtual View
The tree menu will change depending on the chosen viewing mode.
To switch from one view to the other, right-click the BitDefender Management Server
instance in the tree menu and select the appropriate option.
Note
In Virtual View, you cannot see the detected network
computers that are not managed by the slave instances
Tree Menu in Virtual View
of BitDefender Management Server.
Note
Master Activity Log does not provide information regarding the activity of the slave
servers.
You can examine the activity of BitDefender Management Server (errors, warnings
and successful actions that occurred during its operation) in the Server Activity pane.
Policy Templates
138
BitDefender Management Server
The following table lists the default BitDefender Management Server policy templates:
Template Description
BitDefender Management Allows creating policies through which you can configure
Agent Settings the settings of BitDefender Management Agent.
Here you can configure the BitDefender Management Agent settings that will be applied
on the assigned clients. The settings are organized into a single section:
Agent Settings
Click to expand a section and see all configurable settings. To collapse a section
and hide all settings, click .
Option Description
Default Sets the minimum connection interval to one hour.
Custom Allows customizing the minimum connection interval.
Select the desired connection interval from the menu.
The following table lists the default BitDefender Business Client policy templates:
Template Description
Update Request Allows creating policies through which you can configure
and trigger an immediate update of BitDefender
Business Client.
Update Scheduled Allows creating update policies for BitDefender Business
Client.
Scan Policy Allows creating on-demand antimalware scan policies
for BitDefender Business Client.
Antivirus Settings Allows creating antivirus policies for BitDefender
Business Client.
Firewall Settings Allows creating firewall policies for BitDefender Business
Client.
Privacy Control Allows creating policies for the Privacy Control module
of BitDefender Business Client.
Antispam Settings Allows creating antispam policies for BitDefender
Business Client.
Template Description
User Control Allows creating policies for the User Control module of
BitDefender Business Client.
Exceptions Allows creating scan exception policies for BitDefender
Business Client.
Advanced Settings Allows creating policies concerning the advanced
settings of BitDefender Business Client.
Here you can configure the update settings that will be used to immediately update
BitDefender Business Client on the assigned clients. The settings are organized into
3 sections:
Update Locations
Proxy Settings
Advanced Settings
Click to expand a section and see all configurable settings. To collapse a section
and hide all settings, click .
For more reliable and faster updates, you can configure two update locations: a
Primary update location and an Alternate update location. By default, these
locations are the same: http://upgrade.bitdefender.com.
To modify one of the update locations, provide the URL of the local mirror in the URL
field corresponding to the location you want to change.
Note
We recommend you to set as primary update location the local mirror and to leave the
alternate update location unchanged, as a fail-safe plan in case the local mirror becomes
unavailable.
If the company uses a proxy server to connect to the Internet, select Use proxy and
specify the proxy settings.
Port - type in the port BitDefender uses to connect to the proxy server.
Username - type in a user name recognized by the proxy.
Password - type in the valid password of the previously specified user.
Wait for reboot, instead of prompting - If an update requires a reboot, the product
will keep working with the old files until the system is rebooting. The user will not
be prompted for rebooting, therefore the BitDefender update process will not interfere
with the users work.
Don't update if scan is in progress - BitDefender will not update if a scan process
is running. This way, the BitDefender update process will not interfere with the scan
tasks.
Note
If BitDefender is updated while a scan is in progress, the scan process will be aborted.
Here you can configure the update settings that will be applied on the assigned clients.
The settings are organized into 3 sections:
Update Locations
Proxy Settings
Advanced Settings
Click to expand a section and see all configurable settings. To collapse a section
and hide all settings, click .
For more reliable and faster updates, you can configure two update locations: a
Primary update location and an Alternate update location. By default, these
locations are the same: http://upgrade.bitdefender.com.
To modify one of the update locations, provide the URL of the local mirror in the URL
field corresponding to the location you want to change.
Note
We recommend you to set as primary update location the local mirror and to leave the
alternate update location unchanged, as a fail-safe plan in case the local mirror becomes
unavailable.
If the company uses a proxy server to connect to the Internet, select Use proxy and
specify the proxy settings.
Wait for reboot, instead of prompting - If an update requires a reboot, the product
will keep working with the old files until the system is rebooting. The user will not
be prompted for rebooting, therefore the BitDefender update process will not interfere
with the users work.
Don't update if scan is in progress - BitDefender will not update if a scan process
is running. This way, the BitDefender update process will not interfere with the scan
tasks.
Note
If BitDefender is updated while a scan is in progress, the scan process will be aborted.
Here you can configure the antimalware scan settings that will be used to scan the
assigned clients. The settings are organized into 4 sections:
Scan Level
Options
Actions
Other Options
Click to expand a section and see all configurable settings. To collapse a section
and hide all settings, click .
Note
If BitDefender is set to perform Deep system scan or Full system scan, the scanning
may take a while. Therefore, you should run such scan policies on low priority or, better,
when the assigned clients are idle.
18.3.2. Options
In this section you can configure the scanning options and the locations to be scanned.
Note
These settings can be configured only if you have set the scan level to Custom scan.
The scan settings BitDefender offers may help you adapt the scanning process to
your needs. The scanner can be set to scan only specific file extensions, to search
for specific malware threats or to skip archives. This may greatly reduce scanning
times and improve the system's responsiveness during a scan.
To configure the scan settings, follow these general steps:
1. Specify the type of malware you want BitDefender to scan for. You can do that by
selecting the appropriate options from the Scan level settings category.
The following options are available:
Option Description
Scan for viruses Scans for known viruses. BitDefender detects
incomplete virus bodies, too, thus removing any
possible threat to the system's security.
Scan for adware Scans for adware threats. Detected files will be
treated as infected. The software that includes adware
components might stop working if this option is
enabled.
Scan for spyware Scans for known spyware threats. Detected files will
be treated as infected.
Scan for application Scans for programs that can be used for spying
purposes.
Scan for dialers Scans for applications dialing high-cost numbers.
Detected files will be treated as infected. The software
that includes dialer components might stop working
if this option is enabled.
Scan for rootkits Scans for hidden objects (files and processes),
generally known as rootkits.
Note
These options affect only the signature-based scanning. The heuristic analysis will
report any suspicious file no matter the options you choose to be disabled.
2. Specify the type of objects to be scanned (all or specific file types, archives, e-mail
messages and so on). You can do that by selecting specific options from the Virus
scanning options category.
The following options are available:
Option Description
Scan files Scan all files All files are scanned, regardless of their type.
Scan program files Only the program files are scanned. This
only category is limited to files with the following
extensions: exe; bat; com; dll; ocx; scr;
bin; dat; 386; vxd; sys; wdm; cla; class;
ovl; ole; exe; hlp; doc; dot; xls; ppt;
wbk; wiz; pot; ppa; xla; xlt; vbs; vbe;
mdb; rtf; htm; hta; html; xml; xtp; php;
asp; js; shs; chm; lnk; pif; prc; url; smm;
pdf; msi; ini; csc; cmd; bas; eml; nws.
Scan user defined Only the files with the extensions specified by
extensions the user will be scanned. These extensions
must be separated by ";".
Open packed programs Scans packed files.
Open archives Scans inside archives.
Password-protected archives cannot be
scanned. If such archives are detected, extract
the files they contain in order to scan them.
Open e-mail archives Scans inside mail archives.
BitDefender may not have the legal rights or
may not be able to disinfect certain e-mails
from e-mail archives. In such cases, please
contact us for support at
www.bitdefender.com.
Scan boot sectors Scans the systems boot sector.
Scan memory Scans the memory for viruses and other
malware.
Scan registry Scans registry entries.
Option Description
Scan cookies Scans cookie files.
3. Specify the locations to be scanned. You can set BitDefender to scan My Computer,
My Documents or you can select Paths and type the locations to be scanned in
the edit field, separated by a semi-colon ";".
18.3.3. Actions
In this section you can specify the actions to be taken on the files detected by
BitDefender as infected, suspicious or hidden.
Note
These settings can be configured only if you have set the scan level to Custom scan.
You can specify a second action to be taken if the first one fails and different actions
for each category. Choose from the corresponding menus the first and the second
action to be taken on each type of detected file.
Action Description
None (log objects) No action will be taken on infected files. These files
will appear in the report file.
Abort scan The scanning process is aborted when an infected
file is detected.
Disinfect infected files Disinfects infected files. This option is available only
as a first action.
Rename infected files Changes the extension of infected files. The new
extension of the infected files will be .vir. By
renaming the infected files, the possibility of executing
them and thus of spreading the infection is eliminated.
At the same time they can be saved for further
examination and analysis.
Delete files Deletes infected files immediately, without any
warning.
Action Description
Copy infected file to Copies the infected files into the quarantine. They will
Quarantine not be moved from the initial location.
Move files to Quarantine Moves infected files into the quarantine.
Action Description
None (log objects) No action will be taken on suspicious files. These files
will appear in the report file.
Abort scan The scanning process is aborted when a suspicious
file is detected.
Delete files Deletes suspicious files immediately, without any
warning.
Move files to Quarantine Moves suspicious files into the quarantine.
Note
Files are detected as suspicious by the heuristic analysis. We recommend you to
send these files to the BitDefender Lab.
Action Description
None (log objects) No action will be taken on hidden files. These files will
appear in the report file.
Abort scan The scanning process is aborted when a hidden file
is detected.
Move files to Quarantine Moves hidden files into the quarantine.
Make visible Reveals hidden files so that you can see them.
Option Description
Submit suspect files to Automatically submits all suspicious files to the
BitDefender Lab BitDefender lab after the scan process has finished.
Run task with low priority Decreases the priority of the scan process. You will allow
other programs to run faster and increase the time
needed for the scan process to finish.
On-access scanning (or real-time protection): prevents new malware threats from
entering the system by scanning all accessed files, e-mail messages and the
messages sent through Instant Messaging Software applications (ICQ, NetMeeting,
Yahoo Messenger, MSN Messenger).
On-demand scanning: allows detecting and removing malware already residing in
the system. You can manage this component using the Scan Policy template.
BitDefender allows isolating the infected or suspicious files in a secure area, named
quarantine. By isolating these files in the quarantine, the risk of getting infected
disappears and, at the same time, you have the possibility to send these files for further
analysis to the BitDefender lab.
Note
When a virus is in quarantine it cannot do any harm because it cannot be executed or
read.
When you select to edit or to create a new policy based on this template, the following
pane will be displayed:
Here you can configure the real-time protection and quarantine settings that will be
applied on the assigned clients. The settings are organized into 4 sections:
Real-time Protection
Protection Level
Settings
Quarantine Settings
Click to expand a section and see all configurable settings. To collapse a section
and hide all settings, click .
Choose the protection level that best suits your security needs. There are 4 protection
levels:
18.4.3. Settings
In this section you can configure the real-time protection settings individually.
Note
These settings can be configured only if you have selected the Custom protection level.
The scan settings BitDefender offers may help you fully adapt real-time protection to
your company's regulations regarding workstation security. The scanner can be set
to scan only specific file extensions, to search for specific malware threats or to skip
archives. This may greatly reduce scanning times and improve the system's
responsiveness during a scan.
Scan accessed files and P2P transfers options - scans the accessed files and
the communications through Instant Messaging Software applications (ICQ,
NetMeeting, Yahoo Messenger, MSN Messenger). Further on, select the type of
the files you want to be scanned.
Option Description
S c a n Scan all files All the accessed files will be scanned,
accessed regardless their type.
files Scan program files Only the program files will be scanned. This
only means only the files with the following
extensions: .exe; .bat; .com; .dll; .ocx;
.scr; .bin; .dat; .386; .vxd; .sys; .wdm;
.cla; .class; .ovl; .ole; .exe; .hlp;
.doc; .dot; .xls; .ppt; .wbk; .wiz; .pot;
.ppa; .xla; .xlt; .vbs; .vbe; .mdb; .rtf;
.htm; .hta; .html; .xml; .xtp; .php;
.asp; .js; .shs; .chm; .lnk; .pif; .prc;
.url; .smm; .pdf; .msi; .ini; .csc; .cmd;
.bas; .eml and .nws.
Scan user defined Only the files with the extensions specified by
extensions the user will be scanned. These extensions
must be separated by ";".
Scan for riskware Scans for riskware. Detected files will be
treated as infected. The software that includes
adware components might stop working if this
option is enabled.
Select Skip dialers and applications from
scan if you want to exclude these kind of files
from scanning.
Scan boot Scans the systems boot sector.
Scan inside archives The accessed archives will be scanned. With
this option on, the computer will slow down.
Scan packed files All packed files will be scanned.
Option Description
First action Select from the drop-down menu the first
action to take on infected and suspicious files.
Deny access and In case an infected file is detected, the access
continue to this will be denied.
Clean file Disinfects infected files.
Delete file Deletes infected files immediately, without any
warning.
Move file t o Moves infected files into the quarantine.
quarantine
Second Select from the drop-down menu the second
action action to take on infected files, in case the first
action fails.
Deny access and In case an infected file is detected, the access
continue to this will be denied.
Delete file Deletes infected files immediately, without any
warning.
Move file t o Moves infected files into the quarantine.
quarantine
Do not scan files greater than [x] Type in the maximum size of the files to be
Kb scanned. If the size is 0 Kb, all files will be
scanned, regardless their size.
Do not scan network shares If this option is enabled, BitDefender will not
scan the network shares, allowing for a faster
network access.
We recommend you to enable this option only
if the network you are part of is protected by
an antivirus solution.
Option Description
Scan incoming mails Scans all incoming e-mail messages.
Scan outgoing mails Scans all outgoing e-mail messages.
Note
By default, BitDefender will check for old files every day and delete files older than 10
days.
Note
By default, BitDefender will check for duplicate quarantined files every day.
Note
By default, BitDefender will automatically submit quarantined files every 60 minutes.
Important
When you assign a new firewall policy to a client, all of the existing firewall rules (created
through the previously assigned policy, through the firewall alerts or by the local users)
are overwritten. If you do not want the rules created through the previously assigned
policy to be lost, you must edit the respective policy as needed (by adding, modifying
or removing rules) and assign it, if not scheduled.
When you select to edit or to create a new policy based on this template, the following
pane will be displayed:
Here you can configure the firewall settings that will be applied on the assigned clients.
The settings are organized into 3 sections:
General Settings
Profile Settings
Other Settings
Click to expand a section and see all configurable settings. To collapse a section
and hide all settings, click .
1. Specify whether the settings are to be applied to the current profile, the generic
profile or to both.
2. Specify whether or not to check applications for changes.
Note
Usually, applications are changed by updates. But there is a risk that they might be
changed by malware applications, with the purpose of infecting the local computer
and other computers in the network.
Select Check process integrity if you want each application attempting to connect
to the Internet to be checked whether it has been changed since the addition of the
rule controlling its Internet access. If the application has been changed, an alert
will prompt the user to allow or to block the access of the application to the Internet.
Signed applications are supposed to be trusted and have a higher degree of security.
You can select Ignore changes for signed processes to automatically allow
changed signed applications to connect to the Internet.
3. Configure the firewall rules that should be applied. You can select to apply the
following default groups of rules:
To see the configured rules, to create additional rules or to manage the rules you
have created, click Manage Rules. A new pane will be displayed.
Firewall Rules
The configured firewall rules are grouped into two separate sections: Rules for
incoming packets and Rules for outgoing packets. For each rule listed in the
table, you can see:
the group the rule belongs to. This can be a default group or the Administrator
rules group, which contains the custom firewall rules that you have created.
the generic path to the application the rule applies to.
the protocol the rule applies to.
the rule action (allow or deny packets).
the packet source (IP address, subnet mask, port) the rule applies to.
the packet destination (IP address, subnet mask, port) the rule applies to.
the network events the rule applies to.
To edit an administrator rule, select it and click Modify. To change the priority of
an administrator rule by one level, use the Move up and Move down buttons.
To delete an administrator rule, select it and click Delete. You can select Delete
complementary rule to automatically delete the complementary rule for the other
type of packets.
Note
You can neither delete/modify the default firewall rules, nor change their priority.
Add Rule
Note
If you select Both, two complementary rules will be created: one for incoming
packets and the other for outgoing packets.
d. From the Action menu, select the rule action (allow or deny packets).
e. Specify the packet source the rule applies to.
Type the source IP address and subnet mask in the corresponding fields.
If you want the rule to apply to all ports, select Any Port from the menu.
Otherwise, select Specific Port or Port Range and type in the desired port(s).
f. Specify the packet destination the rule applies to.
Type the destination IP address and subnet mask in the corresponding fields.
If you want the rule to apply to all ports, select Any Port from the menu.
Otherwise, select Specific Port or Port Range and type in the desired port(s).
g. If you have selected TCP or UDP as protocol, choose the network events the
rule applies to.
h. Click Add to add the rule.
Web Antiphishing: ensures safe web navigation by alerting the user about potential
phishing web pages.
Privacy Control: prevents data theft, monitors applications that try to load at system
startup, and protects against two two types of potential Internet threats, cookies and
scripts.
When you select to edit or to create a new policy based on this template, the following
pane will be displayed:
Here you can configure the Privacy Control settings that will be applied on the assigned
clients. The settings are organized into 7 sections:
Protection
Protection Level
Settings
Identity Control
Cookie Control
Script Control
Alerts
Click to expand a section and see all configurable settings. To collapse a section
and hide all settings, click .
18.6.1. Protection
In this section you can enable or disable Privacy Control.
If you want Privacy Control to be enabled, select Enable Privacy Control. Otherwise,
clear this check box.
Privacy Control has the following components:
Identity Control - prevents data theft by filtering all outgoing HTTP and SMTP traffic
according to the rules you create in the Identity Control section.
Registry Control - asks for permission whenever a new program, which does not
match any of the current rules, tries to modify a registry entry in order to be executed
at Windows start-up. Rules are automatically created for the local client product
based on the user's response or on the automatic response configured in the Alerts
section.
Cookie Control - asks for permission whenever a new web page, which does not
match any of the current rules, tries to set a cookie. Rules are automatically created
for the local client product based on the user's response or on the automatic response
configured in the Alerts section. You can also configure global rules manually in the
Cookie Control section.
Script Control - asks for permission whenever a new web page, that does not match
any of the current rules, tries to run a script or other active content. Rules are
automatically created for the local client product based on the user's response or
on the automatic response configured in the Alerts section. You can also configure
global rules manually in the Script Control section.
Note
You can also enable or disable each component of Privacy Control separately, without
configuring the protection level.
18.6.3. Settings
In this section you can enable or disable Registry Control and Web Antiphishing.
Registry Control prompts the user for permission whenever a program tries to modify
a registry entry in order to be executed at Windows start-up. Web Antiphishing alerts
the user about potentially phished web pages.
If you want Registry Control to be enabled, select Enable Registry Control. Otherwise,
clear this check box.
If you want Web Antiphishing to be enabled, select Enable Antiphishing. Otherwise,
clear this check box.
3. In the Rule data field, type the string you want to prevent being sent.
Note
We recommend you to enter at least three characters in order to avoid the mistaken
blocking of messages and web pages.
4. Select Scan HTTP to scan the outgoing web traffic and block the outgoing data
that matches the rule data.
5. Select Scan SMTP to scan the outgoing mail traffic and block the outgoing e-mail
messages that contain the rule data.
6. To block web pages and e-mail messages only if the rule data matches whole
words, select Match whole words.
7. To block web pages and e-mail messages only if the rule data and the detected
string case match, select Match case.
8. In the Rule description field, type a description of the specified rule.
9. Click Add. The new rule will be added to the table.
1. From the Exception type menu, choose the type of exception you want to create.
2. In the Allowed web/e-mail address field, type the web address or the mail address
that you want to add as exception.
3. Click Add to add the new exception in the table.
You can see a table where the configured rules are displayed. If you want only these
rules to be applied and to overwrite those of the local client product, clear the Append
rules check box.
To configure a rule, follow these steps:
1. Specify the domain to which the rule applies. Do one of the following:
To apply the rule to all domains, select Any.
To apply the rule to a specific domain, select Enter domain and type the domain
name in the edit field.
2. Select the action of the rule. The following options are available:
Action Description
Permit The cookies on that domain will execute.
Deny The cookies on that domain will not execute.
Type Description
Outgoing The rule applies only for the cookies that are sent out back
to the connected site.
Incoming The rule applies only for the cookies that are received from
the connected site.
Both The rule applies in both directions.
Note
You can accept cookies but never return them by setting the action to Deny and the
direction to Outgoing.
Note
Some web pages may not be properly displayed if you block active content.
If you want Script Control to be enabled, select Enable Script Control. Otherwise,
clear this check box.
You can see a table where the configured rules are displayed. If you want only these
rules to be applied and to overwrite those of the local client product, clear the Append
rules check box.
To configure a rule, follow these steps:
1. In the Domain field, type the domain to which the rule applies.
2. Select the action of the rule. The following options are available:
Action Description
Permit The scripts on that domain will execute.
Deny The scripts on that domain will not execute.
18.6.7. Alerts
In this section you can configure the automatic response to the registry, cookie, script
and antiphishing alerts.
Choose from the corresponding menus an automatic response for each type of alert.
Note
You cannot choose an automatic response if the respective component is disabled.
Registry Alerts. You can choose one of the following automatic responses:
Cookie Alerts. You can choose one of the following automatic responses:
Script Alerts. You can choose one of the following automatic responses:
Antiphishing Alerts. You can choose one of the following automatic responses:
Here you can configure the antispam settings that will be applied on the assigned
clients. The settings are organized into 3 sections:
Protection
Protection Level
Settings
Click to expand a section and see all configurable settings. To collapse a section
and hide all settings, click .
18.7.1. Protection
In this section you can enable or disable Antispam protection.
If you want the Antispam protection to be enabled, select Enable Antispam. Otherwise,
clear this check box.
18.7.3. Settings
In this section you can configure the antispam filters and settings. The BitDefender
Antispam engine incorporates seven different filters that ensure protection against the
various types of spam: White list, Black list, Charset filter, Image filter, URL filter,
NeuNet (Heuristic) filter and Bayesian filter.
The antispam settings are grouped into three categories:
Antispam Settings
Basic Antispam Filters
Advanced Antispam Filters
Antispam Settings
These settings allow you to specify whether or not to tag the e-mail messages detected
by the Antispam module. If you select:
Note
You should recommend the users to add the e-mail addresses of their contacts to
the Friends list.
Note
The Antispam toolbar is integrated into the most common mail clients and allows
configuring the Friends/Spammers lists and training the Learning Engine. The
Not Spam and the Is Spam buttons are used to train the Learning Engine.
Note
If certain users receive legitimate e-mails written in Asian or Cyrillic charsets, create
special policies that disable the detection of such e-mails.
Enable the Learning Engine (bayesian) - to check e-mail messages using the
Learning Engine (bayesian). The Learning Engine classifies messages according
to statistical information regarding the rate at which specific words appear in
messages classified as SPAM compared to those declared NON-SPAM (by the
user or by the heuristic filter).
This means, for example, if a certain four-letter word is seen to appear more often
in SPAM, it is natural to assume there is an increased probability that the next
incoming message that includes it actually IS SPAM. All relevant words within a
message are taken into account. By synthesizing the statistical information, the
overall probability for the whole message to be SPAM is computed.
This module presents another interesting characteristic: it is trainable. It adapts
quickly to the type of messages received by a certain user, and stores information
about all. To function effectively, the filter must be trained, meaning, to be presented
with samples of SPAM and legitimate messages, much like a hound is primed to
trace a certain scent. Sometimes the filter must be corrected too - prompted to adjust
when it makes a wrong decision.
You can configure the following options:
Limit the dictionary size to 200000 words - sets the size of the Bayesian
dictionary - smaller is faster, bigger is more accurate. The recommended size is:
200.000 words.
Train the Learning Engine (bayesian) on outgoing e-mails - trains the Learning
Engine (bayesian) on outgoing e-mails. Outgoing e-mails are considered to be
legitimate messages.
Enable URL filter - to filter e-mail messages using the URL filter. The URL filter
checks every URL link in a message against its database. If a match is made, the
message is tagged as SPAM.
Enable NeuNet (Heuristic) filter - to check e-mail messages using the NeuNet
(Heuristic) filter. The NeuNet (Heuristic) filter performs a set of tests on all the
message components (i.e. not only the header but also the message body in either
HTML or text format), looking for words, phrases, links or other characteristics of
SPAM. Based on the results of the analysis, it adds a SPAM score to the message.
You can select Block explicit content to activate the detection of messages
marked as SEXUALLY EXPLICIT in the subject line.
Note
Starting May 19, 2004, spam that contains sexually oriented material must include
the warning SEXUALLY-EXPLICIT: in the subject line or face fines for violations
of federal law.
Enable Image filter - to filter e-mail messages using the Image filter. The Image
filter deals with image spam. It compares the image from a message with those
from the BitDefender database. In case of a match, the message is tagged as SPAM.
When you select to edit or to create a new policy based on this template, the following
pane will be displayed:
Here you can configure the User Control settings that will be applied on the assigned
clients. The settings are organized into 6 sections:
User Control
Settings
Web Control
Applications Control
Keyword Control
Webtime Control
Click to expand a section and see all configurable settings. To collapse a section
and hide all settings, click .
Web Control - filters web navigation according to the rules you set in the Web Control
section. It also blocks access to the inappropriate content web pages included in
the list provided and updated by BitDefender.
Applications Control - blocks access to applications you specified in the Applications
Control section.
Keyword Control - filters web and mail access according to the rules you set in the
Keyword Control section.
Webtime Control - allows web access according to the timetable set by you in the
Webtime Control section.
Heuristic web filter - filters web access according to pre-established content-based
rules.
You must enable the components you want to use and configure them accordingly.
If you do not want to filter web access using the heuristic web filter, either clear the
Enable heuristic web filter check box or set the tolerance level to Low.
The web pages blocked by Web Control are not displayed in the browser. Instead, a
default web page is displayed informing the user that the requested web page has
been blocked by Web Control.
If you want Web Control to be enabled, select Enable Web Control. Otherwise, clear
this check box.
In order to use Web Control, you must select one of the following options:
Two tables are displayed: one for the blocked/allowed web pages and the other for
the allowed exceptions. If you want only these web pages to be filtered and the pages
indicated in the local client product to be overwritten, clear the Append pages and
exceptions check box.
Specify the web pages to be blocked/allowed and the allowed exceptions to these
pages, if any.
Note
Exceptions may be needed when defining web pages using wildcards.
Important
You can use wildcards instead of entire names of web pages. For example, if you
type:
*.xxx.com - the action of the rule will apply on all web sites finished with
.xxx.com;
*porn* - the action of the rule will apply on all web sites containing porn in the
web site address;
www.*.com - the action of the rule will apply on all web sites having the domain
suffix com;
www.xxx.* - the action of the rule will apply on all web sites starting with
www.xxx. no matter the domain suffix.
2. Click Add. The new web page will be added in the table.
1. Type the keyword (word or phrase) you want to be blocked in the edit field.
2. Choose from the menu the protocol BitDefender should scan for the specified
keyword. The following options are available:
Option Description
POP3 E-mail messages that contain the keyword are blocked.
HTTP Web pages that contain the keyword are blocked.
Both Both e-mail messages and web pages that contain the keyword are
blocked.
3. To block web pages and e-mail messages only if the keyword matches whole words,
select Match whole words.
4. Click Add. The new rule will be added to the table.
Note
BitDefender will update itself as configured no matter the settings of Webtime Control.
If you want Webtime Control to be enabled, select Enable Web Control. Otherwise,
clear this check box.
You can see the timetable according to which web access is allowed. Click individual
cells to select the time intervals when all internet connections will be blocked.
Important
The boxes coloured in grey represent the time intervals when all internet connections
are blocked.
18.9. Exceptions
This policy template allows you to create scan exception policies for BitDefender
Business Client. You can exclude specific paths or application types (extensions) from
both real-time and on-demand scanning.
Note
If you have an EICAR test file that you use periodically to test BitDefender, you should
exclude it from on-access scanning.
When you select to edit or to create a new policy based on this template, the following
pane will be displayed:
Exceptions Template
Here you can configure the scan exceptions that will be applied on the assigned clients.
The settings are organized into 3 sections:
Exceptions
Paths
Extensions
Click to expand a section and see all configurable settings. To collapse a section
and hide all settings, click .
18.9.1. Exceptions
In this section you can enable or disable the use of scan exceptions.
If you want to apply scan exceptions, select Enable exceptions. Otherwise, clear this
check box.
18.9.2. Paths
In this section you can configure specific paths to be excluded from scanning. Paths
can be excluded from both real-time and on-demand scanning.
Note
The exceptions specified here will NOT apply for contextual scanning. Contextual
scanning is initiated by right-clicking a file or folder and selecting BitDefender Antivirus.
You can see a table containing the paths to be excluded from scanning and the type
of scanning they are excluded from. If you want only these paths to be excluded from
scanning, clear the Append paths check box. To also exclude the paths configured
through previously assigned policies, keep this check box selected.
To configure paths to be excluded from scanning, follow these steps:
18.9.3. Extensions
In this section you can configure specific extensions to be excluded from scanning.
Extensions can be excluded from both real-time and on-demand scanning.
Note
The exceptions specified here will NOT apply for contextual scanning. Contextual
scanning is initiated by right-clicking a file or folder and selecting BitDefender Antivirus.
You can see a table containing the extensions to be excluded from scanning and the
type of scanning they are excluded from. If you want only these extensions to be
excluded from scanning, clear the Append extensions check box. To also exclude
the extensions configured through previously assigned policies, keep this check box
selected.
To configure extensions to be excluded from scanning, follow these steps:
Type in the edit field the extension to be excluded from scanning. To provide
several extensions, separate them by a semi-colon ";".
Choose an extension from the corresponding menu. The menu contains a list of
all the extensions registered on your system.
2. From the menu, choose to exclude the extension from the on-demand or on-access
scanning, or from both.
3. Click Add. The new extension will appear in the table.
Here you can configure the advanced settings that will be applied on the assigned
clients. The settings are organized into 2 sections:
General Settings
Virus Report Settings
Click to expand a section and see all configurable settings. To collapse a section
and hide all settings, click .
You may find this small window useful for two reasons:
The Scan Activity bar will notify the user when real-time protection or the
BitDefender firewall is disabled by displaying a red cross over the corresponding
area (File Zone or Net Zone).
The user can drag&drop files or folders over the Scan Activity bar in order to scan
them.
Send virus reports - sends to the BitDefender Labs reports regarding viruses
identified on the company's computers.
The reports will contain no confidential data, such as your name, IP address or
others, and will not be used for commercial purposes. The information supplied will
contain only the virus name and will be used solely to create statistic reports.
Enable BitDefender Outbreak Detection - sends to the BitDefender Labs reports
regarding potential virus-outbreaks.
The reports will contain no confidential data, such as your name, IP address or
others, and will not be used for commercial purposes. The information supplied will
contain only the potential virus and will be used solely to detect new viruses.
Getting Help
190
BitDefender Management Server
19. Support
As a valued provider, BitDefender strives to provide its customers with an unparalleled
level of fast and accurate support. The Support Center (which you can contact at the
address provided below) continually keeps up with the latest threats. This is where all
of your questions are answered in a timely manner.
With BitDefender, dedication to saving customers time and money by providing the
most advanced products at the fairest prices has always been a top priority. Moreover,
we believe that a successful business is based on good communication and
commitment to excellence in customer support.
You are welcome to ask for support at support@bitdefender.com at any time. For a
prompt response, please include in your email as many details as you can about your
BitDefender, your system and describe the problem you have encountered as
accurately as possible.
Support 191
BitDefender Management Server
U.S.A
BitDefender, LLC
6301 NW 5th Way, Suite 3500
Fort Lauderdale, Florida 33309
Web: http://www.bitdefender.com
Technical support:
E-mail: support@bitdefender.com
Phone:
1-888-868-1873 (Registered Users Only; accessible in United States only)
1-954-776-6262 (Registered Users Only)
Customer Service:
E-mail: customerservice@bitdefender.com
Phone:
1-888-868-1873 (Registered Users Only; accessible in United States only)
Support 192
BitDefender Management Server
Germany
BitDefender GmbH
Headquarter Western Europe
Karlsdorferstrasse 56
88069 Tettnang
Germany
Tel: +49 7542 9444 60
Fax: +49 7542 9444 99
Email: info@bitdefender.com
Sales: sales@bitdefender.com
Web: http://www.bitdefender.com
Technical Support: support@bitdefender.com
UK and Ireland
One Victoria Square
Birmingham
B1 1BD
Tel: +44 207 153 9959
Fax: +44 845 130 5069
Email: info@bitdefender.com
Sales: sales@bitdefender.com
Web: http://www.bitdefender.co.uk
Technical support: support@bitdefender.com
Spain
Constelacin Negocial, S.L
C/ Balmes 195, 2a planta, 08006
Barcelona
Soporte tcnico: soporte@bitdefender-es.com
Ventas: comercial@bitdefender-es.com
Phone: +34 932189615
Fax: +34 932179128
Sitio web del producto: http://www.bitdefender-es.com
Support 193
BitDefender Management Server
Romania
BITDEFENDER
5th Fabrica de Glucoza St.
Bucharest
Technical support: support@bitdefender.com
Sales: sales@bitdefender.com
Phone: +40 21 4085600
Fax: +40 21 2330763
Product web site: http://www.bitdefender.com
Support 194