Computers and virtual machines
To view the endpoints under your account, go to the Network page and select the desired network group from the left side pane.
You can view the available network structure in the left-side pane and details about each endpoint in the right-side pane.
At first, all computers and virtual machines detected in your network are displayed as unmanaged so that you can remotely install protection on them.
To customize the endpoint details displayed in the table:
Click the
Columns button at the right side of the action toolbar.
Select the columns you want to view.
Click the Reset button to return to the default columns view.
From the Network page, you can manage endpoints as follows:
To view the latest information in the table, click the Refresh button in the bottom-left corner of the table. This may be needed when you spend more time on the page.
Containers
To view the containers infrastructure under your account, go to the Network page and choose Cloud Workloads from the views selector.

You can view the available container hosts in the left-side pane and details about each container in the right-side pane.
To customize the container details displayed in the table:
Click the
Columns button at the upper-right side of the right pane.
Select the columns you want to view.
Click the Reset button to return to the default columns view.
The left-side pane displays a tree-like view of the virtual infrastructure. The root of the tree is called Containers and the containers are grouped beneath the root, under the following categories based on the virtualization technology provider:
From the Network section, you can manage containers as follows:
Page Menu
- Bitdefender – GravityZone
- Report types
- Repair client
- Reconfigure client
- Configuration
- Operation
- Operation
- Best practices
- Viewing and managing scheduled reports
- Announcements
- Executive Summary
- Reports
- Restart machine
- Create reports
- Deleting notifications
- Configuring notification settings
- Taking report-based actions
- Saving reports
- Emailing reports
- Printing reports
- Notifications
- Notification types
- Viewing notifications
- Risk scan
- Best practices
- Credentials Manager
- Patch tasks
- Troubleshooting
- Creating policies
- Assigning policies
- Configuring profiles
- Changing policy settings
- Renaming policies
- Computer policies
- Check my monthly subscription for Bitdefender Security for AWS
- Scan for IOC
- Scan
- Deleting policies
- Exchange scan
- Patch tasks
- Install
- Uninstall client
- Update client
- Network discovery
- Patch Management
- Deleting endpoints
- Threats Xplorer
- Introduction
- Antimalware
- Advanced Threat Control
- HyperDetect
- Advanced Anti-Exploit
- Firewall
- Content Control
- Network Attack Defense
- Using Recovery Manager for encrypted volumes
- Device Control
- Email Security
- Full Disk Encryption
- Security for Exchange
- Sandbox Analyzer
- Endpoint Risk Analytics (ERA)
- eXtended Detection and Response (XDR)
- Security for Storage
- Container Protection
- Endpoint types
- Email Security Licensing & Provisioning
- Install Security Server through Control Center
- Install security agents – standard procedure
- Install Security Server manually
- AD Connect
- Bitdefender Endpoint Security Tools for Linux quick start guide
- Install security agents – use cases
- Whitelist Email
- Configure Email
- Add Mailbox
- Features distribution
- Network inventory
- Checking the endpoints status
- Viewing endpoint details
- Organizing endpoints into Groups
- Sorting, filtering and searching for endpoints
- Viewing and managing tasks
- Running tasks
- Creating quick reports
- Assigning policies