The Network page provides several features for exploring and managing all computers and virtual machines available in the network. The Network section consists of a two-pane interface displaying the real-time status of all network objects:

All deleted endpoints are stored under the Deleted folder. To learn more, refer to Deleting endpoints from network Inventory.
Note
You can view and manage only the groups on which you have administrator rights.
This pane consists of a grid, where the rows contain network objects and the columns display specific information for each type of object.
From this pane, you can do the following:
View detailed information about each network object under your account. You can view the status of each object by checking the icon next to its name. Click the object’s name to display a window containing more specific details.
Each type of object, such as computer, virtual machine or folder is represented by a specific icon. At the same time, each network object may have a certain status, regarding the management state, security issues, connectivity and so on. For details regarding the description of each network object icon and the available statuses, refer to Network object types and statuses.
Use the Action Toolbar at the upper side of the table to carry out specific operations for each network object (such as run tasks, create reports, assign policies and delete) and refresh table data.
The views selector on the upper side of the network panes allows switching between different network inventory contents, according to the endpoint type you want to work with.
The Filters menu available at the upper side of the network panes helps you easily display only specific network objects, providing several filter criteria.
From the Network section you can also manage the installation packages and the tasks for each type of network object.
To view the endpoints under your account, go to the Network page and select the desired network group from the left-side pane.
You can view the available network structure in the left-side pane and details about each endpoint in the right-side pane.
At first, all computers and virtual machines detected in your network are displayed as unmanaged so that you can remotely install protection on them.
To customize the endpoint details displayed in the table:
Click the Columns button at the right side of the Action Toolbar.
Select the columns you want to view.
Click the Reset button to return to the default columns view.
To view the latest information in the table, click the Refresh button. This may be needed when you spend more time on the page.
- Endpoint types
- Checking the endpoints status
- Viewing endpoint details
- Organizing endpoints into Groups
- Sorting, filtering and searching for endpoints
- Viewing and managing tasks
- Running tasks
- Creating quick reports
- Assigning policies
- Using Recovery Manager for encrypted volumes
- Deleting endpoints
- Configuration
- Credentials Manager
- Best practices
- Troubleshooting
Page Menu
- Bitdefender – GravityZone
- Threats Xplorer
- Deleting endpoints
- Using Recovery Manager for encrypted volumes
- Assigning policies
- Creating quick reports
- Running tasks
- Viewing and managing tasks
- Sorting, filtering and searching for endpoints
- Organizing endpoints into Groups
- Viewing endpoint details
- Checking the endpoints status
- Network inventory
- Endpoint types
- Add Mailbox
- Configure Email
- Whitelist Email
- Install security agents – use cases
- Bitdefender Endpoint Security Tools for Linux quick start guide
- AD Connect
- Install Security Server manually
- Install security agents – standard procedure
- Install Security Server through Control Center
- Allow file download blocked by Bitdefender
- Email Security Licensing & Provisioning
- Check my monthly subscription for Bitdefender Security for AWS
- Viewing notifications
- Notification types
- Notifications
- Printing reports
- Emailing reports
- Saving reports
- Taking report-based actions
- Configuring notification settings
- Deleting notifications
- Create reports
- Report types
- Reports
- Executive Summary
- Announcements
- Viewing and managing scheduled reports
- Best practices
- Operation
- Operation
- Configuration
- Reconfigure client
- Repair client
- Restart machine
- Features distribution
- Network discovery
- Container Protection
- Update client
- Security for Storage
- Uninstall client
- eXtended Detection and Response (XDR)
- Install
- Endpoint Risk Analytics (ERA)
- Patch tasks
- Sandbox Analyzer
- Exchange scan
- Security for Exchange
- Deleting policies
- Full Disk Encryption
- Scan
- Email Security
- Scan for IOC
- Risk scan
- Device Control
- Computer policies
- Patch Management
- Renaming policies
- Network Attack Defense
- Changing policy settings
- Content Control
- Configuring profiles
- Firewall
- Assigning policies
- Advanced Anti-Exploit
- Creating policies
- HyperDetect
- Troubleshooting
- Advanced Threat Control
- Patch tasks
- Antimalware
- Credentials Manager
- Introduction
- Best practices