Endpoints are initially assigned with the default policy. Once you have defined the necessary policies in the Policies page, you can assign them to endpoints.
Assign policies
You can assign policies in two ways:
Device-based assignment, meaning that you manually select the target endpoints to which you assign the policies. These policies are also known as device policies.
Rule-based assignment, meaning that a policy is assigned to a managed endpoint if the network settings on the endpoint match the given conditions of an existing assignment rule.
Note
You can assign only policies created by you. To assign a policy created by another user, you have to clone it first in the Policies page.
Assigning device policies
In GravityZone, you can assign policies in multiple ways:
Assign the policy directly to the target.
Assign the policy of the parent group through inheritance.
Force policy inheritance to the target.
By default, each endpoint or group of endpoints inherits the policy of the parent group. If you change the policy of the parent group, all descendants will be affected, excepting those with an enforced policy.
To assign a device policy:
Go to the Network page.
Select the target endpoints. You can select one or several endpoints or groups of endpoints.
Click the
Assign Policy button at the upper side of the table, or select the Assign Policy option from the contextual menu.
The Policy Assignment page is displayed:
Check the table with target endpoints. For each endpoint, you can view:
The assigned policy.
The parent group from which the target inherits the policy, if the case.
If the group is enforcing the policy, you can click its name to view the Policy Assignment page with this group as target.
The enforcement status.
This status shows whether the target is forcing policy inheritance or is forced to inherit the policy.
Notice the targets with enforced policy (Is forced status). Their policies cannot be replaced. In such case, a warning message is displayed.
In case of warning, click the Exclude these targets link to continue.
Choose one of the available options to assign the policy:
Assign the following policy template – to appoint a specific policy directly to the target endpoints.
Inherit from above – to use the policy of the parent group.
If you chose to assign a policy template:
Select the policy from the drop-down list.
Select Force policy inheritance to child groups to achieve the following:
Assign the policy to all descendants of the target groups, with no exception.
Prevent changing it from elsewhere lower in the hierarchy.
A new table displays recursively all affected endpoints and groups of endpoints, together with the policies that will be replaced.
Click Finish to save and apply changes. Otherwise, click Back or Cancel to return to the previous page.
When finished, policies are pushed to target endpoints immediately. Settings should be applied on endpoints in less than a minute (provided they are online). If an endpoint is not online, settings will be applied as soon as it gets back online.
To check if the policy was successfully assigned:
In the Network page, click the name of the endpoint you are interested in. Control Center will display the Information window.
Check the Policy section to view the status of the current policy. It must show Applied
Another method to check the assignment status is from the policy details:
Go to the Policies page.
Find the policy you assigned.
In the Active/Applied/Pending column, you can view the number of endpoints for each of the three statuses.
Click any number to view the list of endpoints with the respective status in the Network page.
Assigning rule-based policies
The Policies > Assignment Rules page enables you to define assignment rules for policies, for a specific location. For example, you can apply more restrictive firewall rules if the user connects to the internet from outside the company or you can define different frequencies for on-demand tasks when outside the company.
This is what you need to know about assignment rules:
Endpoints can have only one active policy at a time.
A policy applied through a rule will overwrite the device policy set on the endpoint.
If none of the assignment rules is applicable, then the device policy is applied.
Rules are ordered and processed by priority, with
1
being the highest one. You may have several rules for the same target.In such case, the first rule that matches the active connection settings on the target endpoint will apply.
Important
Make sure you consider sensitive settings such as exclusions, communication or proxy details when creating rules.
As best practice, it is recommended to use policy inheritance to keep the critical settings from the device policy also in the policy used by assignment rules.
To create a new rule:
Go to the Assignment Rules page.
Click the
Add button at the upper side of the table.
Select Location Rule.
Configure the rule settings as needed.
Click Save to save the changes and apply the rule to target endpoints of the policy.
To change the settings of an existing rule:
In the Assignment Rules page, find the rule you are looking for and click its name to edit it.
Configure the rule settings as needed.
Click Save to apply the changes and close the window. To leave the window without saving changes, click Cancel.
If you no longer want to use a rule, select the rule and click the Delete button at the upper side of the table. Click Yes to confirm your action.
To make sure the latest information is being displayed, click the Refresh button at the upper side of the table.
Configuring location rules
A location is a network segment identified by one or several network settings, such as a specific gateway, a specific DNS used to resolve URLs, or a subset of IPs. For example, you can define locations such as the company’s LAN, the servers farm or a department.
In the rule configuration window, follow these steps:
Enter a suggestive name and a description for the rule you want to create.
Set the priority of the rule. The rules are ordered by priority, with the first rule having the highest priority. The same priority cannot be set twice or more.
Select the policy for which you create the assignment rule.
Define the locations to which the rule applies.
Select the type of the network settings from the menu at the upper side of the Locations table. These are the available types:
Type
Value
IP/network prefix
Specific IP addresses in a network or sub-networks. For sub-networks use the CIDR format.
For example:
10.10.0.12
or10.10.0.0/16
WINS server address
IP address of the WINS server
Important
This option does not apply on Linux and Mac systems.
DNS server address
IP address of the DNS server
DHCP connection DNS suffix
DNS name without the hostname for a specific DHCP connection
For example:
hq.company.biz
DHCP connection DNS suffix
DNS name without the hostname for a specific DHCP connection
For example:
hq.company.biz
Endpoint can resolve host
Hostname.
For example:
fileserv.company.biz
Network type
Wireless/Ethernet
When choosing Wireless, you can also add the network SSID.
Important
This option does not apply on Linux and Mac systems.
Hostname
Hostname
For example:
cmp.bitdefender.com
Important
You can also use wildcards. Asterisk (*) substitutes for zero or more characters and the question mark (?) substitutes exactly one character. Examples:
*.bitdefender.com
cmp.bitdefend??.com
Enter the value for the selected type. Where applicable, you can enter multiple values in the dedicated field, separated by semicolon (;) and without additional spaces. For example, when you enter
10.10.0.0/16;192.168.0.0/24
, the rule applies to target endpoints with the IPs matching ANY of these sub-networks.Warning
You can use only one network setting type per location rule. For example, if you added a location using the IP/network prefix, you cannot use this setting again in the same rule.
Click the
Add button at the right side of the table.
The network settings on endpoints must match ALL provided locations, for the rule to apply to them. For example, to identify the office LAN network you can enter the gateway, network type and DNS; furthermore, if you add a sub-network, you identify a department within the company’s LAN.
Click the Value field to edit the existing criteria and then press
Enter
to save changes.To remove a location, select it and click the
Delete button.
You may want to exclude certain locations from the rule. To create an exclusion, define the locations to be excepted from the rule:
Select the Exclusions check box under the Locations table.
Select the type of the network settings from the menu at the upper side of the Exclusions table. You have the same options as in the Location table.
Enter the value for the selected type. You can enter multiple values in the dedicated field, separated by semicolon (;) and without additional spaces.
Click the
Add button at the right side of the table.
The network settings on endpoints must match ALL conditions provided in the Exclusions table, for the exclusion to apply.
Click the Value field to edit the existing criteria and then press
Enter
to save changes.To remove an exclusion, click the
Delete button at the right side of the table.
Click Save to save the assignment rule and apply it.
Once created, the location rule automatically applies to all target endpoints that are managed.
Configuring user rules
Important
You can create user rules only if an Active Directory integration is available.
You can define user rules only for Active Directory users and groups. Rules based on Active Directory groups are not supported on Linux systems.
In the rule configuration window, follow these steps:
Enter a suggestive name and a description for the rule you want to create.
Set the priority. The rules are ordered by priority, with the first rule having the highest priority. The same priority cannot be set twice or more.
Select the policy for which you create the assignment rule.
In the Targets section, select the users and security groups you want the policy rule to apply to. You can view your selection in the table on the right.
Click Save.
Once created, the user-aware rule applies to managed target endpoints at user login.
Page Menu
- Bitdefender – GravityZone
- Viewing notifications
- Executive Summary
- Announcements
- Viewing and managing scheduled reports
- Best practices
- Operation
- Operation
- Configuration
- Reconfigure client
- Reports
- Report types
- Create reports
- Notification types
- Notifications
- Printing reports
- Emailing reports
- Saving reports
- Taking report-based actions
- Configuring notification settings
- Deleting notifications
- Repair client
- Restart machine
- Network discovery
- Changing policy settings
- Configuring profiles
- Assigning policies
- Creating policies
- Troubleshooting
- Patch tasks
- Credentials Manager
- Best practices
- Renaming policies
- Computer policies
- Risk scan
- Update client
- Uninstall client
- Install
- Patch tasks
- Exchange scan
- Deleting policies
- Scan
- Scan for IOC
- Allow file download blocked by Bitdefender
- Features distribution
- Content Control
- Firewall
- Advanced Anti-Exploit
- HyperDetect
- Advanced Threat Control
- Antimalware
- Introduction
- Threats Xplorer
- Network Attack Defense
- Patch Management
- Device Control
- Container Protection
- Security for Storage
- eXtended Detection and Response (XDR)
- Endpoint Risk Analytics (ERA)
- Sandbox Analyzer
- Security for Exchange
- Full Disk Encryption
- Email Security
- Deleting endpoints
- Using Recovery Manager for encrypted volumes
- Assigning policies
- Whitelist Email
- Install security agents – use cases
- Bitdefender Endpoint Security Tools for Linux quick start guide
- AD Connect
- Install Security Server manually
- Install security agents – standard procedure
- Install Security Server through Control Center
- Email Security Licensing & Provisioning
- Configure Email
- Add Mailbox
- Endpoint types
- Creating quick reports
- Running tasks
- Viewing and managing tasks
- Sorting, filtering and searching for endpoints
- Organizing endpoints into Groups
- Viewing endpoint details
- Checking the endpoints status
- Network inventory
- Check my monthly subscription for Bitdefender Security for AWS