The Network page provides several features for exploring and managing all computers and virtual machines available in the network. The Network section consists of a two-pane interface displaying the real-time status of all network objects:
All deleted endpoints are stored under the Deleted folder. To learn more, refer to Deleting endpoints from network Inventory.
Note
You can view and manage only the groups on which you have administrator rights.
This pane consists of a grid, where the rows contain network objects and the columns display specific information for each type of object.
From this pane, you can do the following:
View detailed information about each network object under your account. You can view the status of each object by checking the icon next to its name. Click the object’s name to display a window containing more specific details.
Each type of object, such as computer, virtual machine or folder is represented by a specific icon. At the same time, each network object may have a certain status, regarding the management state, security issues, connectivity and so on. For details regarding the description of each network object icon and the available statuses, refer to Network object types and statuses.
Use the Action Toolbar at the upper side of the table to carry out specific operations for each network object (such as run tasks, create reports, assign policies and delete) and refresh table data.
The views selector on the upper side of the network panes allows switching between different network inventory contents, according to the endpoint type you want to work with.
The Filters menu available at the upper side of the network panes helps you easily display only specific network objects, providing several filter criteria.
From the Network section you can also manage the installation packages and the tasks for each type of network object.
To view the endpoints under your account, go to the Network page and select the desired network group from the left-side pane.
You can view the available network structure in the left-side pane and details about each endpoint in the right-side pane.
At first, all computers and virtual machines detected in your network are displayed as unmanaged so that you can remotely install protection on them.
To customize the endpoint details displayed in the table:
Click the Columns button at the right side of the Action Toolbar.
Select the columns you want to view.
Click the Reset button to return to the default columns view.
To view the latest information in the table, click the Refresh button. This may be needed when you spend more time on the page.
- Endpoint types
- Checking the endpoints status
- Viewing endpoint details
- Organizing endpoints into Groups
- Sorting, filtering and searching for endpoints
- Viewing and managing tasks
- Running tasks
- Creating quick reports
- Assigning policies
- Using Recovery Manager for encrypted volumes
- Deleting endpoints
- Configuration
- Credentials Manager
- Best practices
- Troubleshooting
Page Menu
- Bitdefender – GravityZone
- Viewing notifications
- Executive Summary
- Announcements
- Viewing and managing scheduled reports
- Best practices
- Operation
- Operation
- Configuration
- Reconfigure client
- Reports
- Report types
- Create reports
- Notification types
- Notifications
- Printing reports
- Emailing reports
- Saving reports
- Taking report-based actions
- Configuring notification settings
- Deleting notifications
- Repair client
- Restart machine
- Network discovery
- Changing policy settings
- Configuring profiles
- Assigning policies
- Creating policies
- Troubleshooting
- Patch tasks
- Credentials Manager
- Best practices
- Renaming policies
- Computer policies
- Risk scan
- Update client
- Uninstall client
- Install
- Patch tasks
- Exchange scan
- Deleting policies
- Scan
- Scan for IOC
- Allow file download blocked by Bitdefender
- Features distribution
- Content Control
- Firewall
- Advanced Anti-Exploit
- HyperDetect
- Advanced Threat Control
- Antimalware
- Introduction
- Threats Xplorer
- Network Attack Defense
- Patch Management
- Device Control
- Container Protection
- Security for Storage
- eXtended Detection and Response (XDR)
- Endpoint Risk Analytics (ERA)
- Sandbox Analyzer
- Security for Exchange
- Full Disk Encryption
- Email Security
- Deleting endpoints
- Using Recovery Manager for encrypted volumes
- Assigning policies
- Whitelist Email
- Install security agents – use cases
- Bitdefender Endpoint Security Tools for Linux quick start guide
- AD Connect
- Install Security Server manually
- Install security agents – standard procedure
- Install Security Server through Control Center
- Email Security Licensing & Provisioning
- Configure Email
- Add Mailbox
- Endpoint types
- Creating quick reports
- Running tasks
- Viewing and managing tasks
- Sorting, filtering and searching for endpoints
- Organizing endpoints into Groups
- Viewing endpoint details
- Checking the endpoints status
- Network inventory
- Check my monthly subscription for Bitdefender Security for AWS