Security Server is a dedicated virtual machine that de-duplicates and centralizes most of the antimalware functionality of antimalware clients, acting as a scan server.
You must install Security Server on one or more hosts so as to accommodate the number of virtual machines to be protected.
You must consider the number of protected virtual machines, resources available for Security Server on hosts, as well as network connectivity between Security Server and protected virtual machines.
The security agent installed on virtual machines connects to Security Server over TCP/IP, using details configured at installation or via a policy.
Download Security Server installation packages
To download Security Server installation packages:
Go to the Network > Packages page.
Select the Default Security Server Package.
Click the Download button at the upper side of the table and choose the package type from the menu.
Save the selected package to the desired location.
Deploy Security Server installation packages
Once you have the installation package, deploy it to the host using your preferred virtual machine deployment tool.
After deployment, set up the Security Server as follows:
Access the appliance console from your virtualization management tool (for example, vSphere Client). Alternatively, you can connect to the appliance via SSH.
Log in using the default credentials.
User name:
root
Password:
sve
Run the
sva-setup
command. You will access the appliance configuration interface.To navigate through menus and options, use the
Tab
and arrow keys. To select a specific option, pressEnter
.Configure the network settings.
The Security Server uses the TCP/IP protocol to communicate with the other GravityZone components. You can configure the appliance to automatically obtain network settings from the DHCP server or you can manually configure network settings, as described herein:
From the main menu, select Network configuration.
Select the network interface.
Select the IP configuration mode:
DHCP, if you want the Security Server to automatically obtain network settings from the DHCP server.
Static, if a DHCP server is absent or an IP reservation for the appliance has been made on the DHCP server. In this case, you must manually configure the network settings.
Enter the hostname, IP address, network mask, gateway and DNS servers in the corresponding fields.
Select OK to save the changes.
Note
If you are connected to the appliance via a SSH client, changing the network settings will immediately terminate your session.
Configure the proxy settings.
If a proxy server is used within the network, you must provide its details so that the Security Server can communicate with GravityZone Control Center.
Note
Only proxies with basic authentication are supported.
From the main menu, select Internet proxy configuration.
Enter the hostname, username, password and the domain in the corresponding fields.
Select OK to save the changes.
Configure the Communication Server address.
From the main menu, select Communication server configuration.
Enter one of the following addresses for the Communication Server:
https://cloud-ecs.gravityzone.bitdefender.com:443
https://cloudgz-ecs.gravityzone.bitdefender.com:443
Important
This address must be the same as the one that appears in Control Center policy settings. To check the link, go to the Policies page, add or open a custom policy, navigate to the General > Communication > Endpoint Communication Assignment section and enter the Communication Server name in the column header field and select or write
ECS
. The correct server will appear in search results.Select OK to save the changes.
Configure the client ID.
From the main menu, select Configure the client ID.
Enter the company ID.
The ID is a string of 32 characters, which you can find by accessing the company details page in Control Center.
Select OK to save the changes.
Page Menu
- Bitdefender – GravityZone
- Viewing notifications
- Executive Summary
- Announcements
- Viewing and managing scheduled reports
- Best practices
- Operation
- Operation
- Configuration
- Reconfigure client
- Reports
- Report types
- Create reports
- Notification types
- Notifications
- Printing reports
- Emailing reports
- Saving reports
- Taking report-based actions
- Configuring notification settings
- Deleting notifications
- Repair client
- Restart machine
- Network discovery
- Changing policy settings
- Configuring profiles
- Assigning policies
- Creating policies
- Troubleshooting
- Patch tasks
- Credentials Manager
- Best practices
- Renaming policies
- Computer policies
- Risk scan
- Update client
- Uninstall client
- Install
- Patch tasks
- Exchange scan
- Deleting policies
- Scan
- Scan for IOC
- Allow file download blocked by Bitdefender
- Features distribution
- Content Control
- Firewall
- Advanced Anti-Exploit
- HyperDetect
- Advanced Threat Control
- Antimalware
- Introduction
- Threats Xplorer
- Network Attack Defense
- Patch Management
- Device Control
- Container Protection
- Security for Storage
- eXtended Detection and Response (XDR)
- Endpoint Risk Analytics (ERA)
- Sandbox Analyzer
- Security for Exchange
- Full Disk Encryption
- Email Security
- Deleting endpoints
- Using Recovery Manager for encrypted volumes
- Assigning policies
- Whitelist Email
- Install security agents – use cases
- Bitdefender Endpoint Security Tools for Linux quick start guide
- AD Connect
- Install Security Server manually
- Install security agents – standard procedure
- Install Security Server through Control Center
- Email Security Licensing & Provisioning
- Configure Email
- Add Mailbox
- Endpoint types
- Creating quick reports
- Running tasks
- Viewing and managing tasks
- Sorting, filtering and searching for endpoints
- Organizing endpoints into Groups
- Viewing endpoint details
- Checking the endpoints status
- Network inventory
- Check my monthly subscription for Bitdefender Security for AWS