The Network page provides several features for exploring and managing all computers and virtual machines available in the network. The Network section consists of a two-pane interface displaying the real-time status of all network objects:

All deleted endpoints are stored under the Deleted folder. To learn more, refer to Deleting endpoints from network Inventory.
Note
You can view and manage only the groups on which you have administrator rights.
This pane consists of a grid, where the rows contain network objects and the columns display specific information for each type of object.
From this pane, you can do the following:
View detailed information about each network object under your account. You can view the status of each object by checking the icon next to its name. Click the object’s name to display a window containing more specific details.
Each type of object, such as computer, virtual machine or folder is represented by a specific icon. At the same time, each network object may have a certain status, regarding the management state, security issues, connectivity and so on. For details regarding the description of each network object icon and the available statuses, refer to Network object types and statuses.
Use the Action Toolbar at the upper side of the table to carry out specific operations for each network object (such as run tasks, create reports, assign policies and delete) and refresh table data.
The views selector on the upper side of the network panes allows switching between different network inventory contents, according to the endpoint type you want to work with.
The Filters menu available at the upper side of the network panes helps you easily display only specific network objects, providing several filter criteria.
From the Network section you can also manage the installation packages and the tasks for each type of network object.
To view the endpoints under your account, go to the Network page and select the desired network group from the left-side pane.
You can view the available network structure in the left-side pane and details about each endpoint in the right-side pane.
At first, all computers and virtual machines detected in your network are displayed as unmanaged so that you can remotely install protection on them.
To customize the endpoint details displayed in the table:
Click the Columns button at the right side of the Action Toolbar.
Select the columns you want to view.
Click the Reset button to return to the default columns view.
To view the latest information in the table, click the Refresh button. This may be needed when you spend more time on the page.
- Endpoint types
- Checking the endpoints status
- Viewing endpoint details
- Organizing endpoints into Groups
- Sorting, filtering and searching for endpoints
- Viewing and managing tasks
- Running tasks
- Creating quick reports
- Assigning policies
- Using Recovery Manager for encrypted volumes
- Deleting endpoints
- Configuration
- Credentials Manager
- Best practices
- Troubleshooting
Page Menu
- Bitdefender – GravityZone
- Report types
- Repair client
- Reconfigure client
- Configuration
- Operation
- Operation
- Best practices
- Viewing and managing scheduled reports
- Announcements
- Executive Summary
- Reports
- Restart machine
- Create reports
- Deleting notifications
- Configuring notification settings
- Taking report-based actions
- Saving reports
- Emailing reports
- Printing reports
- Notifications
- Notification types
- Viewing notifications
- Risk scan
- Best practices
- Credentials Manager
- Patch tasks
- Troubleshooting
- Creating policies
- Assigning policies
- Configuring profiles
- Changing policy settings
- Renaming policies
- Computer policies
- Check my monthly subscription for Bitdefender Security for AWS
- Scan for IOC
- Scan
- Deleting policies
- Exchange scan
- Patch tasks
- Install
- Uninstall client
- Update client
- Network discovery
- Patch Management
- Deleting endpoints
- Threats Xplorer
- Introduction
- Antimalware
- Advanced Threat Control
- HyperDetect
- Advanced Anti-Exploit
- Firewall
- Content Control
- Network Attack Defense
- Using Recovery Manager for encrypted volumes
- Device Control
- Email Security
- Full Disk Encryption
- Security for Exchange
- Sandbox Analyzer
- Endpoint Risk Analytics (ERA)
- eXtended Detection and Response (XDR)
- Security for Storage
- Container Protection
- Endpoint types
- Email Security Licensing & Provisioning
- Install Security Server through Control Center
- Install security agents – standard procedure
- Install Security Server manually
- AD Connect
- Bitdefender Endpoint Security Tools for Linux quick start guide
- Install security agents – use cases
- Whitelist Email
- Configure Email
- Add Mailbox
- Features distribution
- Network inventory
- Checking the endpoints status
- Viewing endpoint details
- Organizing endpoints into Groups
- Sorting, filtering and searching for endpoints
- Viewing and managing tasks
- Running tasks
- Creating quick reports
- Assigning policies