Frequently Asked Questions about Bitdefender Cloud Security Products

This article summarizes the most frequent questions regarding the Bitdefender Cloud Security Products.


Technical questions

I use Cloud Security for Endpoints and I noticed the management console URL changed and the console looks different. What is the reason for the changes?

On February 27th, the majority of Cloud Security for Endpoints customer and partner accounts were upgraded to the new version of the management console. It is more robust and brings new features and an improved interface. The new Control Center console can be reached using the URL https://gravityzone.bitdefender.com and can be accessed using the same credentials as for the legacy console at https://cloud.bitdefender.net


What were some of the new features and enhancements introduced?

Following the upgrade Cloud Security customers can benefit from:

  • Mac OS X Support - you can protect and manage all your computers from the same interface.
  • New Enhanced Dashboard - easier to monitor and control the security status of computers by configuring the metrics you want to see and how you want to see them.
  • Improved Reporting - you can generate reports for firewall, content control and other protection data, giving you even more flexibility and improved management.
  • New Advanced Filters - admins can see the live status for individual computers, setup new filters to work more efficiently and identify issues faster.
  • Optimized Bandwidth Consumption - with the new security relay mechanism, external traffic is minimized by using the local network to distribute updates or deploy new clients.
  • Configurable Roles and Privileges - It's now easier to map each individual's responsibility and role within the management console.
  • Support for Windows 8.1 and Windows Server 2012 R2.


I am using the Cloud Security Console and some of my partner or customer companies disappeared from the console

Customer accounts that did not have the latest endpoint client installed have not been upgraded to the new Control Center console. Partners that have customer accounts in this situation under their account were not automatically redirected to the new Control Center console. They will be able to manage accounts with upgraded endpoints in the new console and accounts with legacy endpoints in the legacy console. To go to the new console either navigate to https://gravityzone.bitdefender.com and use your existing credentials or use the link from the legacy console.


Were all accounts upgraded to the latest version?

No. All accounts containing older versions of Endpoint Client can only be managed from the legacy console at https://cloud.bitdefender.net. The partners and customers accounts with the monthly usage option activated continue to use the legacy console. Within the new Control Center console, partners can manage only customers that have all endpoints to later version.


Where do I add a new customer or partner account?

Partner and customer accounts can be created in the new Control Center console at https://gravityzone.bitdefender.com. Only if you want to add a new partner or customer account with the monthly licensing activated, you must use the legacy console.


How do I upgrade all my accounts to the new Control Center console?

You will need to upgrade the endpoints to the latest version using the corresponding task in the legacy console. The Cloud Security Team performs weekly upgrade tasks and if all Endpoints are up to date, the account will be upgraded to the new Cloud. To upgrade endpoints, you can refer to the following knowledge base article.


Are monthly accounts going to be upgraded to the new Control Center console?

The upgrade date may vary but we expect accounts using monthly licensing to be upgraded in the next two months. In the meantime, partners can continue to use the legacy console.


What is Endpoint Security Relay?

Endpoint Security Relay is an endpoint security agent with extended features. The Endpoint Security Relay has three main functions (besides offering protection on the local computer).

  • Update Server. All the endpoints from a local network can update from the Endpoint Security Relay. This helps minimize internet traffic for all computers by keeping most of the update traffic in the internal network and it removes the internet connectivity requirement for all computers.
  • Communication Proxy. All the endpoints from a local network can communicate with the cloud only through the Endpoint Security Relay. This helps to minimize internet traffic and removes the internet connectivity requirement for all computers.
  • Discovery & Deployer. Once installed in the network, the Endpoint Security Relay will automatically discover all the computers. Once discovered, you can deploy the Endpoint Security on the other computers. The required files for installation will be copied from the Relay. This helps to minimize internet traffic and removes the internet connectivity requirement for all computers.


When should I use an Endpoint Security Relay?

Endpoint Security Relay should be used:

  • If you want to remotely deploy protection
  • If Internet connection is not available to all computers from a network
  • If allowed internet traffic is limited

If high availability and disaster recovery are critical in your network, then multiple Relays can be installed, but usually there is no need for installing multiple Endpoint Security Relays in the same network.


I am a managed service provider and I have several technicians in charge with security management for my customers. Do I need to create a company for each one?

You can create several users for your technicians inside your company. Each technician can be allocated to certain customer accounts and/or use specific administrative rights. There is no need to use multiple companies as was the case the with the legacy version.


I am a managed service provider and I need to manage a new customer. Does this require any action from the customer?

If only your technicians will manage security on the customer computers, then there is no need to create a user for the customer. You can create just the company, and then assign administrative rights to any of your technicians in order to start managing the network. The customer will not get involved in IT services he chose to be outsourced.


I don't want to have my protection managed by another company and don't want anybody outside my company to view (customers, computers, policies, reports).

If a partner created your account under his account, you can choose to let the partner manage your security or to manage protection for the company yourself. To disable any visibility and management from upstream partners, simply disable the option "Allow other companies to manage the security of this company" found in My Company menu.


How can I see on which computers the policy is applied?

In Network you can use the Filters menu at the top of the table to filter displayed computers using different criteria. For example, you can choose to view only the managed computers with issues and using a specified policy. You can combine any filters in order to see only the desired information.


I try to create a company but I keep receiving the message that I'm using an invalid key. What should I do?

Most probably you didn't check the key before trying to create the company. If the key status is invalid after checking, then it may be an issue with the key itself. In this case, please contact your license provider.


Commercial questions


Which are the Bitdefender solutions for physical endpoint security?

The new Bitdefender Small Office Security for up to 250 seats and Bitdefender Security for Endpoints that scales to protect any number of seats. Both are available in cloud and locally hosted versions.


Which are the names of the products in Bitdefender ordering platforms?

The names are:Bitdefender Small Office Security (Cloud Console), Bitdefender Small Office Security (on-premise console), Bitdefender Security for Endpoints (Cloud Console), Bitdefender Security for Endpoint ( On-premise Console)


Will GravityZone-in-a-Box remain available for new purchases?

The product will no longer be available for purchase. However, SMBs can use an easy-to-deploy GravityZone kit.


Did Bitdefender remove or modify any of the main GravityZone products?

No. The only product that was removed was GravityZone-in-a-Box.


Small Office Security was the name of a bundle that included Client Security + File Server Security. Is Small Office Security now a different product?

The legacy version of Small Office Security that contains Client Security and File Server is being replaced by the new version that includes the latest Bitdefender management console and client. The new version comes with two flavors: one hosted by Bitdefender and one where the management console is hosted locally by each company.


Is cloud.bitdefender.net and gravityzone.bitdefender.com the same platform?

The first URL is the location of the legacy Bitdefender console (Cloud Security Console). The second URL hosts the upgraded version of the console (Control Center).


Is Cloud Security for Endpoints now part of the GravityZone family?

The majority of customers that subscribed to Cloud Security for Endpoints have been upgraded to the new version of the console. It is based on the same console as the on-premise solutions that are part of the GravityZone family.


Which are the differences between the cloud-hosted and on-premise versions of the new Bitdefender endpoints security management consoles?

The cloud-hosted versions do not feature integration with Microsoft Active Directory. Other than that, the two versions offer the same functionality.


Can partners continue to sell the legacy versions of Small Office Security?

It is strongly recommended to provide the new versions that use the latest technologies. The product end of sales announcement is expected in 2014 but support will continue for a minimum of 2 years after.


Can we still sell Client Security, Security for File Servers or packs composed of 3.6 solutions such as Corporate Security?

While it is recommended to use the latest technologies, the 3.6 generation of solutions are still available.



Rate this article:

Submit