Prepare workstations for Bitdefender Endpoint Security Tools remote deployment
One of the main features that Bitdefender Endpoint Security Tools provides is the possibility to be installed remotely on endpoints, process called deployment.
For the Bitdefender Endpoint Security Tools deployment task to complete successfully on target systems, you need to comply with the following configuration prerequisites:
OS requirements
Make sure the target endpoints meet the minimum system requirements. For some endpoints, you may need to install the latest operating system service pack available or free up disk space. Compile a list of endpoints that do not meet the necessary requirements so that you can exclude them from management.
When deploying the agent through a Linux relay, the following additional conditions must be met:
The Relay endpoint must have installed the Samba package (
smbclient
) version 4.1.0 or above, along with the samba-client dependencies and samba-common package, and thenet
binary/command to deploy Windows agents.Note
The
net
binary/command is usually delivered with the samba-client and / or samba-common packages. On some Linux distributions (such as CentOS 7.4), thenet
command is only being installed when installing the full Samba suite (Common + Client + Server). Make sure that your Relay endpoint has thenet
command available.Target Windows endpoints must have Administrative Share and Network Share enabled.
Target Linux and Mac endpoints must have SSH enabled and firewall disabled.
Administrative privileges
The installation requires administrative privileges. Make sure you have the necessary credentials at hand for all computers.
You must also define the User Account Control (UAC) settings according to the target endpoint configuration:
For Windows 8.1 and 10 systems, you need full administrative privileges (the credentials of the built-in administrator account or a domain user account). For more information on how to successfully deploy BEST to Windows 8.1 and 10 stations, please refer to Client software deployment on Windows 8.1/10/2012 and above.
For target systems that are part of a Workgroup, you must disable UAC only if you are using other administrative rights credentials except the built-in domain Administrator account when configuring the deployment task. If the deployment task is configured to authenticate with the built-in domain Administrator account (and default UAC settings on the account were not changed in by group policy), it will run without having to change the UAC settings.
For target systems that are part of an Active Directory Domain, in addition to the previous recommendations, if the administrator wants to configure the task and provide the deployment credentials of users that are members of the Domain Admins security group, a GPO can be configured to apply this security group with the following settings:
[Computer Configuration -> Policies -> Windows Settings -> Security Settings -> Local Policies -> Security Options]
Policy
Setting
User Access Control: Behavior of the elevation prompt for administrators in Admin Approval Mode
Elevate without prompting
User Access Control: Detect application installations and prompt for elevation
Disable
User Access Control: Run all administrators in Admin Approval Mode
Enable
Note
As security best practice, after the deployment cycle is finished, revert the settings to their defaults. For the UAC default configurations, refer to this Microsoft article.
For Windows 7, 8 and 10 systems, you will need to disable User Account Control (UAC), as follows:
Go to Start > Control Panel > User Accounts
Click Change User Account Control Settings
Set UAC on Never Notify and then click OK
Connectivity requirements
On all workstations and servers that you want to manage, which need to have network connectivity to the GravityZone appliance, you will have to configure the firewall to allow the following communication ports, used by the security components:
8443: the communication port between the GravityZone console and Bitdefender Endpoint Security Tools. This port must be allowed on all network computers
7074: the communication port used for deployment and update via a Relay.
Note
These ports must not be used by any other application installed in the network.
It is recommended to use a static IP address for the relay server. If you do not set a static IP, use the machine’s hostname.
Configure each workstation not to use sharing wizard as follows:
In Windows 7:
Go to Start > Computer > Organize > Layout and select Menu bar;
Click Tools and go to Folder options… > View;
Clear the Use Sharing Wizard check box in the advanced settings list;
Click OK.
In Windows 8 and 8.1:
Go to Computer > View > Options;
In the Folder options window, click the View tab;
Clear the Use Sharing Wizard check box in the advanced settings list;
Click OK.
In Windows 10:
Go to This PC > View > Options;
Click the View tab;
Clear the Use Sharing Wizard check box in the advanced settings list;
Click OK.
Make sure that the File and Printer Sharing protocol is enabled. This service is using TCP ports 139, 445 and UDP ports 137, 138. To verify if the File and Printer Sharing protocol is enabled:
Go to Start > Control Panel > Network and Sharing Center;
Identify which network connection is established and click it;
Click Properties;
Note
For the connection to be successful:
Disable the Windows Firewall, or configure it to allow traffic through File and Printer Sharing protocol. To disable Windows Firewall, open Control Panel > Windows Firewall and click Off.
Allow ICMP traffic (so you can successfully PING the workstation).
To check that the network stations are correctly configured:
Ping the respective network station;
Try to log on to the administrative share.
Third-party security software removal
Uninstall (not just disable) any existing antimalware, firewall or Internet security software from computers. Running the security agent simultaneously with other security software on an endpoint may affect their operation and cause major problems with the system.
Many of the incompatible security programs are automatically detected and removed at installation time.
To learn more and to check the list of the security software detected by Bitdefender Endpoint Security Tools for Windows operating systems (Windows 7 / Windows Server 2008 R2 and later), refer to Software incompatible with Bitdefender Endpoint Security Tools.
If you want to deploy the security agent on a computer with Bitdefender Antivirus for Mac 5.X, you first must remove the latter manually. For the guiding steps, please access Deploy Endpoint Security for Mac on a machine with Bitdefender Antivirus for Mac 5.X.
Client software deployment on Windows 8.1/10/2012 and above
To remotely install software on Windows 8.1 / 2012 / 2012 R2 stations, you need to have full administrative privileges on them. In this case, you need the credentials of the built-in administrator account or a domain user account.
To successfully deploy the client software from Bitdefender Control Center to Windows 8.1 / 2012 / 2012 R2 stations, please consider one of the following recommendations:
Manually enable the built-in administrator account on target stations. When creating the client installation task for the Windows 8.1 / 2012 / 2012 R2 stations, use the credentials of the built-in administrator account.
To learn how to enable and disable the built-in administrator account in Windows 8.1 / 2012 / 2012 R2, refer to this KB article.
Use the credentials of a domain administrator account, if you are managing an Active Directory network.
On the target Windows 8.1 / 2012 / 2012 R2 stations, change the value of the registry key
HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Policies\\System\\EnableLUA
from 1 to 0.You will be prompted to restart your machine.
Remote deployment of BEST for Linux on Oracle – SAP
This section provides steps on how to remotely deploy BEST Linux on Oracle – SAP.
On Linux Oracle remote deployment via SSH is not possible due to the SFTP service. The same issue occurs on Unbreakable Oracle systems.
Resolution:
1. Edit sshd_config
2. Search for the line starting with: Subsystem
3. Comment and add the following line: Subsystem sftp internal-sftp
Create an uninstall password for Bitdefender Endpoint Security Tools
Overview
In some situations users with administrative privileges can uninstall Bitdefender Endpoint Security Tools (BEST), leaving the system unprotected.
You can help prevent such unauthorized actions by setting up an uninstall password from the GravityZone Control Center.
Set up a password
You can set up an uninstall password for:
New deployments
To protect future endpoints set up the uninstall password before the deployment, from the installation package.
To set the uninstall password for the installation package:
Log in to GravityZone Control Center.
Go to the Network page and click on the Packages section.
Click the package that you want to install or create a new one
Under Settings, select the Set uninstall password check box.
Enter a password considering the complexity requirements.
Click Save
Use this package to install BEST on endpoints. The password will prevent users from uninstalling the agent afterwards.
Existing installation
You can protect the existing endpoints in your network through policy. Edit the policy applied on the endpoints to set up the uninstall password.
To use multiple passwords for groups of endpoints sharing the same policy across your environment, use the uninstall password setting of the installation package.
To configure the uninstall password from the policy:
Log in to GravityZone Control Center.
Go to the Policies page.
Choose the policy that you applied on your systems.
If the applied policy is the Default one, you must create and assign a new policy.
Go to the General > Settings page.
Under Uninstall Password Configuration select the Set uninstall password check box.
Enter a password considering the complexity requirements.
Click Save.
Ensure that you apply the policy to your target endpoints.
Deploy Endpoint Security for Mac on a machine with Bitdefender Antivirus for Mac 5.X
This section explains how you can deploy the business product Endpoint Security for Mac on a machine that
If you choose to replace Bitdefender Antivirus for Mac 5.X with Endpoint Security for Mac, you must keep in mind that you can deploy the latter only after you manually remove the consumer product.
This is because Bitdefender Antivirus for Mac 5.X has a Tamper protection module, a component that denies any exterior action over the integrity of the product, making impossible the uninstalling process via silent deployment or manual installation.
Thus, to deploy Endpoint Security for Mac on a machine that has Bitdefender Antivirus for Mac 5.X, follow these steps:
Remove manually Bitdefender Antivirus for Mac by using Bitdefender Uninstaller.
Sometimes, the standard Bitdefender Uninstaller may fail or does not exist at its location. In such a situation, you must use Disk Utility.
Restart your Mac.
Deploy Endpoint Security for Mac as usual, following the instructions described in your GravityZone Installation Guide.
Install Endpoint Security for Mac through Jamf Pro
Jamf Pro (formerly Casper Suite) is a Mac and iOS management software developed exclusively for the Apple platform. It offers a breadth of functionality in package building, inventory, image management, remote imaging, remote updates, iOS mobile device management and a powerful framework for automated support.
Endpoint Security for Mac installation through Jamf Pro 9.x
Bitdefender Endpoint Security for Mac can be installed remotely on your endpoints via Jamf Pro 9.x through a Script or from Self Service in User Mode.
Running a Script using a Policy in Jamf Pro
Open Jamf Pro and authenticate.
Go to Computer Management in the left tab.
Add the Bitdefender Endpoint Security for Mac .DMG file as a new payload.
Select the installation .PKG file to be extracted from the .DMG file.
Go to Scripts and type the path as shown below (the downloaded .DMG file location may differ).
Configure the policy settings according to your needs.
Click Save.
The Policy runs on the selected endpoints after the next sync with Jamf Pro.
Installing Bitdefender Endpoint Security for Mac from Self Service
Open Jamf Pro and authenticate.
Go to Computer Management in the left tab.
In the Computer Management – Management Framework section, click Self Service.
Log in, if required.
Select the package from Applications (file name subject to your Administrator’s Application Management).
Select one of the following options:
Click the Install button to deploy the Bitdefender Endpoint Security for Mac installation kit.
Click the Silent Install button for unattended Bitdefender Endpoint Security for Mac deployment.
Learn more about Jamf Pro from their Administrator’s Guide.
Endpoint Security for Mac installation through Jamf Pro 10.x
This section describes how to remotely deploy Bitdefender Endpoint Security for Mac thorugh Jamf Pro 10.x.
Before you begin
Starting with macOS High Sierra (10.13), after installing Endpoint Security for Mac manually or remotely, the user is prompted to approve the Bitdefender kernel extensions on Mac. Until the user approves the Bitdefender kernel extensions, some Endpoint Security for Mac features will not work. For details, refer to Bitdefender system extension blocked on macOS High Sierra (10.13) and later.
You can pre-approve the Bitdefender kernel extensions and thus eliminate user intervention by whitelisting the Bitdefender extensions using a Mobile Device Management tool such as Jamf Pro. For details, refer to Whitelist Bitdefender Endpoint Security for Mac Kernel Extensions using Jamf Pro 10.x.
To install Endpoint Security for Mac through Jamf Pro, you have the following options:
Use macOS Downloader, which detects the processor architecture and automatically downloads and installs the appropriate kit for either Intel or Apple M1.
This option is recommended for mixed environments with both processors to save time and effort on your side.
Download and install the full macOS kit manually, paying attention to choose the right package for your processor architecture, be it Intel or Apple.
Note
The steps described below follow the Jamf Pro version 10.5 interface. The Jamf Pro interface may differ in later versions.
Screenshots from this section are indicative and they may be different from your actual experience, based on Jamf Pro version and settings.
Installing procedure using macOS Downloader
You can use macOS Downloader to install Endpoint Security for Mac on computers with both Intel and Apple processors. In this scenario, macOS Downloader automatically downloads the full kit during the installation process.
Note
Target computers must have access to GravityZone or to a relay to be able to download the macOS kit.
Make sure you have an installation package configured in Network > Packages in GravityZoneControl Center.
Click Download in the upper-side of the page.
From the drop-down menu, select macOS Downloader and save the setup_downloader.dmg file locally.
Double-click setup_downloader.dmg to view the content.
Drag both SetupDownloader.app and installer.xml to a folder (for example: /Users/Shared)
Drag the folder containing the files into Jamf Composer and create an installation file from that folder (for example, a .dmg or a .pkg file).
Log in to Jamf Pro.
In the top-right corner of the console, click Settings. Make sure that the computers have the “User Approved MDM” status.
Click Computer Management, then Packages. In the General tab, you can edit the Display name field.
Upload the installation file into Jamf Pro.
In the left-side menu, go to Policies and create a policy for the installation file.
Go to Packages > Configure and select the package previously uploaded. Set the Action to Install.
Click Scripts and configure the Files and Processes payload.
Type in the Script tab the following command:
/Users/Shared/SetupDownloader.app/Contents/MacOS/SetupDownloader --silent
Scope the policy to computers and click Save.
Installing procedure using the full macOS kit
When installing Endpoint Security for Mac using the full kit, you must pay attention to the version you choose. You cannot install a macOS kit for Intel on a Mac with Apple silicon and vice versa.
Make sure you have an installation package configured in Network > Packages in GravityZoneControl Center.
Click Download in the upper-side of the page.
From the drop-down menu, select macOS kit (Intel x86) or macOS kit (Apple M1). Downloading the corresponding file takes longer than macOS Downloader due to bigger size.
Double-click the Bitdefender_for_MAC.dmg (Intel file) or Bitdefender_for_MAC_ARM.dmg (Apple M1 file) to view the content.
Drag both antivirus_for_mac.pkg and installer.xml to a folder (for example: /Users/Shared)
Drag the folder containing the files into Jamf Composer and create an installation file from that folder (for example, a .dmg or a .pkg file).
Log in to Jamf Pro.
In the top-right corner of the console, click Settings. Make sure that the computers have the “User Approved MDM” status.
Click Computer Management, then Packages. In the General tab, you can edit the Display name and Filename fields.
Upload the installation file into Jamf Pro.
In the left-side menu, go to Policies and create a policy for the installation file.
Select the installation file in Policies > Packages and set Action to Install.
Click Scripts and configure the Files and Processes payload.
Type in the Script tab the following command:
installer -pkg /Users/Shared/antivirus_for_mac.pkg -target /
Scope the policy to computers and click Save.
Endpoint Security for Mac: Configure Jamf Pro for macOS Big Sur 11.0 and later
Bitdefender Endpoint Security for Mac requires a certain configuration in Jamf Pro when using this tool to deploy on machines running macOS Big Sur 11.0 and later. Specifically, you need to create a configuration profile where you pre-approve:
Bitdefender system extension
Traffic proxy
Full disk access
All these approvals are necessary for Endpoint Security for Mac to work properly, without asking endpoint users for interaction.
Bitdefender system extension
First, you have to approve a configuration profile where you pre-approve the Bitdefender system extension.
Log in to Jamf Pro.
Go to Computers > Configuration Profiles and click New.
In the left-side menu of the new profile, scroll down to System Extensions.
Click Configure.
Under Allowed Team IDs and System Extensions, make this configuration:
Under Display Name, enter Bitdefender.
From the System Extension Types drop-down list, select Allowed System Extensions.
Under Team Identifier, enter GUNFMW623Y.
Under Allowed System Extensions, enter the following string:
com.bitdefender.cst.net.dci.dci-network-extension
Once complete, the payload should look as in the image below.
Click Save.
Traffic proxy
Endpoint Security for Mac uses a tunneling application (like a VPN) to filter the traffic. To pre-approve this application:
In the left-side menu of the profile, go to Content Filter.
Under Filter Name, enter Bitdefender.
Under Identifier, enter
com.bitdefender.epsecurity.BDLDaemonApp
Under Network Filter, enter these strings:
For Network Filter Bundle Identifier:
com.bitdefender.cst.net.dci.dci-network-extension
For Network Filter Designated Requirement:
anchor apple generic and identifier "com.bitdefender.cst.net.dci.dci-network-extension" and (certificate leaf[field.1.2.840.113635.100.6.1.9] /* exists */ or certificate 1[field.1.2.840.113635.100.6.2.6] /* exists */ and certificate leaf[field.1.2.840.113635.100.6.1.13] /* exists */ and certificate leaf[subject.OU] = GUNFMW623Y)
Once complete, the payload should look as in the image below.
Click Save.
Full disk access
To allow full disk access for Endpoint Security for Mac:
In the left-side menu of the profile, go to Privacy Preferences Policy Control.
You need to allow full access for the following application:
BDLDaemon.app
To do this:
Under Identifier, enter com.bitdefender.epsecurity.BDLDaemonApp
Under Identifier Type, select Bundle ID.
Under Code Requirement, enter anchor apple generic and identifier “com.bitdefender.epsecurity.BDLDaemonApp” and (certificate leaf[field.1.2.840.113635.100.6.1.9] /* exists */ or certificate 1[field.1.2.840.113635.100.6.2.6] /* exists */ and certificate leaf[field.1.2.840.113635.100.6.1.13] /* exists */ and certificate leaf[subject.OU] = GUNFMW623Y)
Click + Add on the right side of the screen.
Under App or Service, select SystemPolicyAllFiles from the drop-down list. Next to it, make sure Access is set to Allow.
Click Save.
EndpointSecurityforMac.app
To do this:
Click the + button on the right side of the screen to add another template.
Under Identifier Type, select Bundle ID.
Under Identifier, enter com.bitdefender.EndpointSecurityforMac
Under Code Requirement, enter identifier “com.bitdefender.EndpointSecurityforMac” and anchor apple generic and certificate 1[field.1.2.840.113635.100.6.2.6] /* exists */ and certificate leaf[field.1.2.840.113635.100.6.1.13] /* exists */ and certificate leaf[subject.OU] = GUNFMW623Y
Click + Add on the right side of the screen.
Under App or Service, select SystemPolicyAllFiles from the drop-down list. Next to it, make sure Access is set to Allow.
Click Save.
Once complete, the payload should look as in the image below.
Click Save.
For details on Endpoint Security for Mac approvals required in macOS Big Sur, refer to this topic.
For steps on Endpoint Security for Mac installation through Jamf Pro 10.x, after creating the configuration profile, refer to this topic.
Whitelist Bitdefender Endpoint Security for Mac Kernel Extensions using Jamf Pro 10.x
This section explains how to whitelist Bitdefender Endpoint Security for Mac kernel extensions using Jamf Pro 10.x.
Starting with macOS High Sierra (10.13), after installing Endpoint Security for Mac manually or remotely, the user is prompted to approve the Bitdefender kernel extensions on his Mac. Until the user approves the Bitdefender kernel extensions, some Endpoint Security for Mac features will not work. For details, refer to Bitdefender system extension blocked on macOS High Sierra (10.13) and later.
You can pre-approve the Bitdefender kernel extensions and thus eliminate user intervention by whitelisting the Bitdefender extensions using a Mobile Device Management tool such as Jamf Pro. This feature is supported starting with macOS 10.13.2 and Jamf Pro version 10.3.0.
The procedure implies creating and applying an MDM configuration profile in Jamf Pro 10.x that whitelists the Bitdefender kernel extensions to the target computers.
Note
The computers must have the “User Approved MDM” status.
For details about User Approved MDM, refer to these articles:
How to create the MDM configuration profile in Jamf Pro 10.x
Log in to Jamf Pro.
Go to Computers > Configuration Profiles > New.
Scroll down to Approved Kernel Extensions.
Enter a Display name and the Team ID. The Bitdefender Team ID is GUNFMW623Y.
Note
Specifying individual kernel extensions to be approved is not required.
Save the changes.
Deploy the profile to the computers.
SSL certificate deployment through Jamf Pro
After installation, Endpoint Security for Mac requires an SSL certificate to properly work. For the Bitdefender agent to load and use the certificate when deploying it through Jamf Pro, this is what you need to know:
The installation package used for deployment must have an uninstall password set in GravityZone.
You need to create a certificate.pfx file with the MD5 hash of the uninstall password.
You will install the certificate.pfx file on the machine with a Configuration Profile from Jamf.
You will also deploy the same certificate.pfx file on the machine in the path /Library/DeployCert through a Policy from Jamf. We advise that the certificate deployed to path
/Library/DeployCert
to only have read and write permissions for root user.After the certificate.pfx is installed, trusted in Keychain, and deployed to
/Library/DeployCert
, Endpoint Security for Mac will used it for MITM and the local user will no longer be prompted to install the SSL certificate.The certificate deployed to
/Library/DeployCert
using Jamf will have priority over the Bitdefender CA SSL certificate that has been previously installed and trusted in Keychain. Following this procedure, Endpoint Security for Mac will stop using Bitdefender CA SSL and will load instead the new certificate.
You can do the following steps for existing Endpoint Security for Mac installations, as well as before starting a new agent deployment.
Set uninstall password in GravityZone Control Center for the endpoints you wish to deploy the certificate to.
Create a .pfx certificate named certificate.pfx. This certificate needs to be always trusted and password protected with the MD5 hash of the uninstall password set through GravityZone.
You can calculate MD5 using the command
md5 -s <password>
in Terminal or with other MD5 calculator tool.Example: MD5 for string
1234
will be81dc9bdb52d04dc20036dbd8313ed055
In Jamf, create a Configuration Profile and upload the certificate.pfx file previously configured.
Scope the policy to the target machine. The certificate will be installed in Keychain, always trusted.
Create the /Library/DeployCert folder and copy certificate.pfx to
/Library/DeployCert
. Use Jamf Composer to create to a .pkg file with/Library/DeployCert/certificate.pfx
.In Jamf, go to Computer Management > Packages and upload the .pkg file at the previous step.
Also in Jamf, go to Policies and create a new Policy.
Configure the package previously uploaded. Set the Action to Install and scope the policy.
The certificate.pfx will be deployed on the target machines.
Install Bitdefender Endpoint Security Tools through MSI package
Bitdefender Endpoint Security Tools (BEST), the GravityZone security agent, uses one installation package for any environment (physical or virtual). On Windows, GravityZone delivers the installation packages as executable kits, only in EXE format. This may be inconvenient if you want to deploy the agent via Windows Group Policy or any other third-party application that supports MSI packages.
The solution implies applying an MSI wrapper over Windows Downloader, the standard lite installer for BEST. This section provides the guidelines for downloading the installer and a few methods on how to deploy the BEST using the MSI package.
Get Windows Downloader
Warning
Do not alter the Windows Downloader file name. Otherwise, the installation files will not download from the Bitdefender servers.
Because Microsoft Edge may trim long file names such as the one of Windows Downloader, we recommend using another browser.
To download BEST installer:
Log in to GravityZone Control Center.
Navigate to Network > Packages.
Select the installation package you want to download.
Important: This procedure currently does not support installation packages with proxy settings.
Click Download at the upper side of the table and select Windows Downloader.
The installation package is saved to your default download location as an EXE file.
Deploy BEST using Microsoft Endpoint Configuration Manager (SCCM)
Important
This procedure does not support installation packages with proxy settings.
To deploy BEST through SCCM follow these steps:
1. Get the installer hash
This can be done through one of these methods:
2. Create the installation MSI package
Download the MSI Wrapper.
Copy the MSI file to the Software Library share from your Configuration Manager.
Open Configuration Manager > Software Library > Applications
Click on the Create Application button.
Locate the MSI wrapper and click Next.
Wait for the information to be imported and click Next.
On the General Information page add the following parameters to the Installation program command line:
msiexec /i "BEST_downloaderWrapper.msi" /qn GZ_PACKAGE_ID=installerhash REBOOT_IF_NEEDED=1
The edited line should look like this:
msiexec /i "BEST_downloaderWrapper.msi" /qn GZ_PACKAGE_ID=aHR0cHM6Ly9jbG91ZGd6LWVjcy5ncmF2aXR5em9ucS5iaXRkZWZlbmRlci5jb20vUGFja2FnZXMvQlNUV0lOLzAvcV9Ib0VML2luc3RhbGxlci54bWw-bGFuZz1lbi1VUw== REBOOT_IF_NEEDED=1
Select Install for system if resource is device; otherwise install for user as Install behavior.
Click Next to apply the settings.
Review the information and click Next to create the application.
Bitdefender Endpoint Security Tools will be displayed in the Applications list.
3. Deploy the installation package
Right-click the application and select Deploy.
Click Browse and specify the collection as All Systems. Click Next.
To add the Distribution Points, click in Add and choose your distribution point.
Choose Action as Install and Purpose as Required. Click Next.
Schedule the deployment and click Next.
Configure User notifications and click Next.
Specify alert options and click Next.
Confirm the settings and click Next.
Wait for the operation to complete and click Close.
Deployments incremented with the number of devices under SCCM:
On the left-hand side of the console select Monitoring > Deployments. Here, you can see information about the application that was deployed.
Deploy BEST via msiexec.exe command line
This method is suitable for command-line deployment tools that accept instructions with parameters. The method uses the msiexec
command, having the MSI wrapper and the installer ID as parameters. The MSI wrapper is digitally signed by Bitdefender.
Download the MSI Wrapper.
Open Command Prompt as Administrator.
Run the following command to deploy BEST:
msiexec /i full_path\BEST_downloaderWrapper.msi /qn GZ_PACKAGE_ID=[string]
REBOOT_IF_NEEDED=1
[parameter]
Where:
full_path
is the actual path to the MSI Wrapperstring
is the actual string between brackets, from the installation package nameparameter
(optional) that reboots the machine when you deploy BEST over a competitor’s product;1 = TRUE
a notification prompts the user with a 10-minute time frame before restarting the machine.
For example:
Installation package name:
setupdownloader_[aHR0cH-bGFuZz1lbi1VUw==].exe
GZ_PACKAGE_ID value:
aHR0cH-bGFuZz1lbi1VUw==
Note
The string in the example is only for illustration purposes only. The actual string is different and much longer.
Deploy BEST via installer.xml
Use this method when you have a proxy configured into the installation package or when you use a proxy on a target machine.
Log in to GravityZone Control Center
Navigate to Network > Packages.
Click Add at the upper side of the table.
Configure the package and click Save.
Click Download at the upper side of the table and select Windows kit (32-bit or 64-bit).
Extract the installer.xml from the installation package to any location.
Download the MSI Wrapper.
Place the MSI wrapper in the same location with installer.xml.
Rename the MSI Wrapper using the Windows Downloader to embed installer.exe
For example:
Installation package name: setupdownloader_[aHR0cH-bGFuZz1lbi1VUw==].exe
MSI Wrapper name: BEST_downloaderWrapper.msi
MSI Wrapper embedded with installer.xml: BEST_downloaderWrapper_[aHR0cH-bGFuZz1lbi1VUw==].msi
Run the following command to deploy BEST:
msiexec /i full_path\
BEST_downloaderWrapper_[aHR0cH-bGFuZz1lbi1VUw==].msi
Deploy BEST via Windows Group Policy (GPO)
Follow this method if all you need is to run the MSI file. In this case, you need to customize the wrapper with Orca.exe, to link it to the Windows Downloader. To avoid security warnings when running the resulted MSI file, you need to unblock it.
Warning
This method alters the digital signature of the MSI Wrapper.
Install Orca.exe
Orca is a tool for creating and editing Windows Installer packages.
Download and run Windows SDK Components for Windows Installer Developers
Select the MSI Tools checkbox when asked to select the features to be installed.
MSI Tools includes Orca.exe. For more information about Orca.exe, refer to this Microsoft topic
Click Install.
Customize the MSI Wrapper
Download the MSI Wrapper.
Right-click the MSI template and select Edit with Orca.
In Orca, navigate to Tables > Property.
In the right panel, locate GZ_PACKAGE_ID under the Property column.
Under the Value column, click the corresponding cell to enter a new value.
Insert the string between brackets from the installation package EXE file.
For example:
Installation package name:
setupdownloader_[aHR0cH-bGFuZz1lbi1VUw==].exe
GZ_PACKAGE_ID value:
aHR0cHbGFuZz1lbi1VUw==
Note
The string in the example is only for illustration purposes. The actual string is much longer.
Add the following parameter (including its value) to reboot the machine when you deploy BEST over a competitor’s product:
REBOOT_IF_NEEDED=1
A notification prompts the user with a 10-minute time frame before restarting the machine.
Click OK to confirm.
Save changes made to the MSI Wrapper.
Unblock MSI Wrapper to avoid security warnings
Windows may prevent you from running files downloaded from the internet and raise a security warning. To avoid this situation with MSI Wrapper, follow these steps:
Right-click the MSI Wrapper template and select Properties.
In the General tab, select Unblock at the bottom of the window.
Click OK or Apply.
Deploy the MSI package
Use the modified MSI Wrapper to deploy the Bitdefender security agent through Windows Group Policy or any other third-party application that supports MSI packages.
Note
For silent installations, use the following parameters:
/qn
or/quiet
.
Install Bitdefender Endpoint Security Tools using Casper
In order to remotely install Bitdefender Endpoint Security Tools using Casper, follow these instructions:
Copy the pkg file on the machine and run this command:
/path/to/Installer.app/Contents/MacOS/InstallationDeployer --install installer -pkg /path/to/the_package_to_be_installed.pkg -target /
“Installer.app/Contents/MacOS/InstallationDeployer
” is an application from the Casper suite used to install pkg files.
Install Bitdefender Endpoint Security Tools manually on Linux virtual machines
This section describes how to install manually the GravityZone security agent on Linux virtual machines from a GravityZone cloud environment.
Requirements and prerequisites
Before installation, check the security agent requirements on Linux.
Licensing
Linux endpoints use license seats from the pool of licenses for server operating systems.
Installation
The procedure includes how to download the appropriate installation package to the machine, unpack the archive and manually install it via a terminal session.
In GravityZone Control Center, go to Network > Packages.
Select the installation package you want to use. If there is no package available, create one and select it.
Click the Send download links button at the upper side of the page.
Type the email address you want to use for downloading the package in the appropriate field, and then press
Enter
. You will have to access this email account from the virtual machine where you want to install the security agent.Click Send. A predefined email containing the security agent download links will be sent to the specified address in a few minutes.
Connect to the Linux virtual machine where you want to install the security agent, and access the email account previously used.
Open the email from Bitdefender and click the Linux installer link, to download the Linux installation package to the virtual machine.
Note
The installer first downloads the full installation package from the Bitdefender cloud servers. It is small-sized and it can be run both on 32-bit and 64-bit systems.
Open a terminal session on the Linux virtual machine using an account with administrative privileges.
Run the following commands to unpack and run the installer:
cd /root
tar –xvf fullKit_unix64.tar
chmod +x installer
./installer
Note
The
cd /root
command is an example for specifying the virtual machine folder where you have transferred the downloaded installation archive. The package name mentioned above is also an example. You must enter the name of the specific package you have downloaded.Bitdefender Endpoint Security Tools for Linux will be installed in a few moments. To check that the agent has been installed on the endpoint, run this command:
$ service bd status
In a few minutes after the security agent has been installed, the endpoint will show up as managed in the GravityZone network inventory.
Install Bitdefender Endpoint Security Tools using the credentials of a non-root user
In environments integrated with Control Center, you can remotely install Bitdefender Endpoint Security Tools on machines by using installation tasks. These tasks require administrative privileges on the target machines. On Linux machines, you can provide the credentials of either the root or a non-root user with administrative access.
To install BEST with a non-root user:
On each target machine:
Run the next command as root to open the /etc/sudoers configuration file for safe editing:
#visudo
Type I to enable editing.
Ensure that your user can perform packages installations with the sudo command:
Locate the following line:
root ALL = (ALL) ALL
A similar line with the one above but with the user name should be present in the next lines.
If you cannot find the line for your user, add it as follows:
username ALL = (ALL) ALL
This setting grants the user the right to use sudo for all commands that require root privileges.
Comment the following lines:
Defaults requiretty
Defaults targetpw
Defaults runaspw
Defaults rootpw
Defaults !visiblepw
Save the file and exit: press ESC and type :wq .
From Control Center, follow the deployment steps described in ???.
When asked for credentials, provide the authentication details of the non-root user.
Configure Faronics Deep Freeze to work with Bitdefender Endpoint Security Tools
This section explains how to configure Faronics Deep Freeze Enterprise to allow installation of Bitdefender Endpoint Security Tools.
Bitdefender Endpoint Security Tools (BEST) is a fully-automated computer security program, managed remotely by your network administrator. Once installed, it protects you against all kinds of malware (such as viruses, spyware and trojans), network attacks, phishing and data theft. It can also be used to enforce your organization’s computer and Internet usage policies.
Faronics Deep Freeze helps eliminate computer damage and downtime by making computer configurations indestructible. Once Deep Freeze is installed on a computer, any changes made to the computer—regardless of whether they are accidental or malicious—are never permanent. Deep Freeze provides immediate immunity from many of the problems that plague computers today—inevitable configuration drift, accidental system misconfiguration, malicious software activity, and incidental system degradation.
Overview
Having Faronics Deep Freeze Enterprise installed on a computer will cause the signature updates installed by BEST to be deleted at every system reboot.
This section is meant to help you understand how to configure Faronics Deep Freeze Enterprise to work along with BEST without blocking:
Signatures updates after a system reboot
Policy assignment from Control Center
BEST product updates
Install BEST with Faronics Deep Freeze Enterprise
You have two options to install BEST: manually or using a script.
Configure manually
Install Faronics Deep Freeze Enterprise version 8 or higher on a server in your network.
Use the Deep Freeze Configuration Administrator utility to configure a password and a new partition (for instance, T:\) with minimum of 1.5 GB capacity as thawspace. The thawspace includes the files that will be kept after a system is rebooted with Deep Freeze active.
In Deep Freeze Configuration Administrator utility tool, go to File > Create Workstation Install Program and create an installation package for the systems protected by Deep Freeze.
Install the newly created package on the target machine.
Open Deep Freeze Enterprise and select the Boot Thawed check box in Boot Control tab. This option will disable Deep Freeze on the next reboot, allowing you to install Faronics Data Igloo and BEST.
Reboot the target machine.
Install Faronics Data Igloo.
Open the regedit utility on the target machine and create the registry key
HKEY_LOCAL_MACHINE\Software\Bitdefender
.Using Faronics Data Igloo, change the target of the
HKEY_LOCAL_MACHINE\Software\Bitdefender
key to a folder located on the T:\ partition.On the partition containing the operating system, create the following folders:
%ProgramFiles%\Bitdefender\Endpoint Security\Signatures
%ProgramFiles%\Bitdefender\Endpoint Security\ThreatScanner
%ProgramFiles%\Bitdefender\Endpoint Security\settings
%ProgramFiles%\Bitdefender\Endpoint Security\epagng
Using the Folder Redirection tab from Faronics Data Igloo, redirect these three folders to a folder from T:\ partition.
Install BEST on the target machine.
Configure using scripting functionality
Install Faronics Deep Freeze Enterprise version 8 or higher on a server in your network.
Use the Deep Freeze Configuration Administrator utility to configure a password and a new partition (for instance, T:\) with minimum of 1.5 GB capacity as thawspace. The thawspace includes the files that will be kept after a system is rebooted with Deep Freeze active.
In Deep Freeze Configuration Administrator utility tool, go to File > Create Workstation Install Program and create an installation package for the systems protected by Deep Freeze.
Install the newly created package on the target machine. The machine will automatically reboot.
Open Deep Freeze Enterprise and select the Boot Thawed check box in Boot Control tab. This option will disable Deep Freeze on the next reboot, allowing you to install Faronics Data Igloo and BEST.
Reboot the target machine.
Install Faronics Data Igloo.
Download the Bitdefender redirection script from here.
Extract the VBS script file from the archive and run it.
Note
On operating systems with User Account Control enabled, launch Command Prompt (cmd.exe) as Administrator and run the script from the command line.
Install BEST on the target machine.
Running a BEST product update
Important
During this process, the target system will reboot two times.
To successfully run a BEST product update:
Switch the target machine to Boot Thawed mode. Deep Freeze will require a reboot in order to boot into Boot Thawed mode.
Run the Update task from the Control Center. Additionally, you can run the update from the local console.
Note
In some situations, BEST may require a reboot of the target machine.
Log in to Control Center to confirm the product update has been installed successfully by generating an Update Status report.
Switch the target machine to Boot Frozen mode. Deep Freeze will require a reboot in order to boot into Boot Frozen mode.
Changes to Bitdefender Endpoint Security for Mac in macOS Big Sur
macOS Big Sur, the most recent version of Apple’s operating system for desktops and laptops, uses technologies that affect the behavior of the Endpoint Security for Mac agent.
Specifically, Apple has replaced the previous kernel extensions with system extensions, which run in the user space. Therefore, Bitdefender has switched for Endpoint Security for Mac from kernel extensions to system extensions too. One system extension in particular requires more attention from users: the network extension.
To work properly, some of the Endpoint Security for Mac features or network components (Antiphising, Traffic Scan and Web Access Control in the Content Control module, and the EDR Sensor) require the following approvals from users:
Approval for the Network extension
Approval for the tunneling application used to filter the internet traffic
Approval for the SSL certificate
If the network extension, the tunneling application and the SSL certificate are not approved, Endpoint Security for Mac displays warning messages at every three hours.
Important
Starting with version 4.15.127.200127, Endpoint Security for Mac provides full support for Content Control in macOS Big Sur 11.2 (see the release notes). Previously on macOS Big Sur 11.0 and 11.1, Content Control had entered the passthrough mode and stopped any connection filtering when another application with a network extension was installed on the endpoint (for example, Cisco AnyConnect VPN). This happened due to an incompatibility issue of the operating system. In such situation, the GravityZone console displayed the following error message: “Unknown issue (Product.NetworkExtensionIsDisabled.NetworkExtensionIncompatibility)”.
For details about the Endpoint Security for Mac support in macOS Big Sur, refer to this topic.
The Network extension
In the previous versions of macOS, kernel extensions required approval only at the first installation of Endpoint Security for Mac. In macOS Big Sur, the Network extension requires approval every time the agent or a network component is installed or reinstalled (unless another component is already installed).
At installation, Mac users receive the following System Extension Blocked warning message for the Network extension:
“The program “SecurityNetworkInstallerApp” tried to load new system extension(s). If you want to enable these extensions, open Security & Privacy System Preferences.”
To approve the network extension:
Click Open Security Preferences.
Go to Security > Privacy > General.
Click the lock at the bottom of the window to make changes.
Enter your system credentials and click Unlock.
Click Allow for the blocked system extension.
With the Network extension not approved, Endpoint Security for Mac displays a You are at risk warning with the following message in the View Issues window:
“Install and allow the network extension to enable full protection.”
To fix the issue:
Click Install now to open the Security > Privacy window.
Click the lock at the bottom of the window to make changes.
Enter your system credentials and click Unlock.
Click Allow for the blocked system extension.
In macOS Big Sur, the Network extension requires user approval when the agent or the Network components are uninstalled (no other component remains installed).
If the user does not approve the change, the agent or the component will not be uninstalled.
The tunneling application (Proxy configurations)
The system extension runs in the user space, so Endpoint Security for Mac uses a tunneling application (like a VPN) to filter the traffic. This application also requires approval.
In the “BDLDaemon” Would Like to Add Proxy Configurations window, click Allow.
With the application not approved, Endpoint Security for Mac displays a You are at risk warning and the following message in the View Issues window:
“Install the network component by allowing BDLDaemon.app to add Proxy Configuration.”
The Proxy Configuration will be added to System Preferences > Network.
Bitdefender DCI connects only if the network extension was approved.
The SSL certificate
To filter the HTTPS traffic, Endpoint Security for Mac requires the approval of a SSL certificate.
If the Trust Settings are not updated, Endpoint Security for Mac displays a You are at risk warning and the following message in the View Issues window:
“The SSL certificate is not trusted. Please trust the certificate to enable SSL protection.”
To trust the SSL certificate:
Click Open Keychain Access.
Double-click on Bitdefender CA SSL.
Expand the Trust section.
Click When using this certificate and select Always Trust.
Close the window.
Enter your system credentials and click Update Settings.
Important
In addition to the procedures described above, Endpoint Security for Mac requires full disk access in macOS Big Sur. For details, refer to this topic.
Page Menu
- Bitdefender – GravityZone
- Viewing notifications
- Executive Summary
- Announcements
- Viewing and managing scheduled reports
- Best practices
- Operation
- Operation
- Configuration
- Reconfigure client
- Reports
- Report types
- Create reports
- Notification types
- Notifications
- Printing reports
- Emailing reports
- Saving reports
- Taking report-based actions
- Configuring notification settings
- Deleting notifications
- Repair client
- Restart machine
- Network discovery
- Changing policy settings
- Configuring profiles
- Assigning policies
- Creating policies
- Troubleshooting
- Patch tasks
- Credentials Manager
- Best practices
- Renaming policies
- Computer policies
- Risk scan
- Update client
- Uninstall client
- Install
- Patch tasks
- Exchange scan
- Deleting policies
- Scan
- Scan for IOC
- Allow file download blocked by Bitdefender
- Features distribution
- Content Control
- Firewall
- Advanced Anti-Exploit
- HyperDetect
- Advanced Threat Control
- Antimalware
- Introduction
- Threats Xplorer
- Network Attack Defense
- Patch Management
- Device Control
- Container Protection
- Security for Storage
- eXtended Detection and Response (XDR)
- Endpoint Risk Analytics (ERA)
- Sandbox Analyzer
- Security for Exchange
- Full Disk Encryption
- Email Security
- Deleting endpoints
- Using Recovery Manager for encrypted volumes
- Assigning policies
- Whitelist Email
- Install security agents – use cases
- Bitdefender Endpoint Security Tools for Linux quick start guide
- AD Connect
- Install Security Server manually
- Install security agents – standard procedure
- Install Security Server through Control Center
- Email Security Licensing & Provisioning
- Configure Email
- Add Mailbox
- Endpoint types
- Creating quick reports
- Running tasks
- Viewing and managing tasks
- Sorting, filtering and searching for endpoints
- Organizing endpoints into Groups
- Viewing endpoint details
- Checking the endpoints status
- Network inventory
- Check my monthly subscription for Bitdefender Security for AWS