My Bitdefender
  • 0 Shopping Cart

Removing security software incompatible with GravityZone Security for Endpoints

Bitdefender GravityZone provides full visibility into organizations' overall security posture, global security threats, and control over its security services that protect virtual or physical desktops, servers and mobile devices. All Bitdefender's Enterprise Security solutions are managed within the GravityZone through a single console, Control Center, that provides control, reporting, and alerting services for various roles within the organization.

This article is meant to explain how Endpoint Security detects other installed security products. The list of security software incompatible with Endpoint Security is also provided.

Overview

Endpoint Security is incompatible with other antimalware, firewall or security software. Running Endpoint Security simultaneously with other security software on a computer may affect their operation and cause major problems with the system.

Before installation, be sure to uninstall existing antimalware and firewall software from the computers you want to protect with Endpoint Security.

Important: Windows security features (Windows Defender, Windows Firewall) will be automatically turned off before Endpoint Security installation is initiated.

To ease installation over existing security software, Endpoint Security automatically checks for and detects a large number of incompatible security programs at installation time (the list is provided below).

  • When installing Endpoint Security remotely, using the Install Client task from Control Center, the installer automatically attempts to uninstall any incompatible software detected. Many of the detected programs can be removed automatically, but some can not. After removing each detected program, the computer is restarted and installation resumes automatically.
  • When installing Endpoint Security locally, using the installation package from Control Center, the installer alerts you about any incompatible program detected and prompts you to uninstall it. You must follow the instructions to remove each detected program. A computer restart is required to complete the removal of detected programs. Installation will automatically resume after the computer restarts.

If a detected program cannot be removed, the installer does not continue with the Endpoint Security installation, but sends an error message to Control Center. You can find details in the task report, which you can access from the Network > Tasks page by clicking the task name.

Detected programs cannot be removed in a number of particular situations:

  • If the program is protected with a password. In this case, you must first remove password protection.
  • When performing remote installation, in the following situations:
    • If the program cannot be removed silently (that is, without user interaction).
    • Some programs protected by a self-protect mechanism.

Best Practices

To ensure Endpoint Security installation goes smoothly and to avoid problems caused by incompatibility with other security software, follow these best practices:

  1. If possible, make an inventory of all existing security software running on the organization's computers.
  2. If your current security solution offers a convenient mass removal method (for example, remotely via a centralized management interface), it is recommended to use it.
  3. Check the list of security software detected automatically when installing Endpoint Security. If you use security software that is not on this list, you must remove it manually prior to installing Endpoint Security.
  4. If you know your current security solution is password-protected, make sure to remove password protection.
  5. If you only have a few computers, it is best that you install Endpoint Security manually on each computer using the installation package. When performing local installation, the installer can remove any of the detected programs.
  6. If you want to use remote installation, test it first on a couple of computers to make sure your existing security solution can be removed automatically. If automatic removal works, proceed to remotely install Endpoint Security on all computers.

List of Detected Security Software

In the table below, you can find the list of security programs incompatible with Security for Endpoints that are detected automatically when installing Endpoint Security. If you use security software that is not on this list, you must remove it manually prior to installing Endpoint Security.

Note: This list is updated regularly.

Vendor Product & Version*
Bitdefender

All Bitdefender products and version

AhnLab

ACA 1.0 for Windows
Ashampoo

Ashampoo Anti-Malware v.1.21

AVAST Software

avast! Internet Security
avast! Pro Antivirus
avast! Email Server Security
avast! File Server Security

AVG Technologies

AVG 7
AVG 8
AVG 9
AVG 10
AVG 2012
AVG Internet Security Business Edition 2013
AVG Internet Security 2014
AVG Antivirus 2014
AVG Antivirus Free 2014

Avira

Antivir PersonalEdition Classic
Antivir PersonalEdition Premium
Avira Antivirus Premium 2012
Avira Free Antivirus
Avira Internet Security 2012
Avira Antivir Desktop
Avira Antivir Proffesional
Avira Professional Security 2013
Avira Server Security

BullGuard

BullGuard

CA Technologies

eTrust Antivirus
eTrust Suite Personal
VETWIN32Vp5

Comodo

Comodo Internet Security
Comodo Dragon
Comodo GeekBuddy

DRWEB

DRWEB

ESET

ESET NOD32 Antivirus
ESET Smart Security
ESET Smart Security 4
ESET Smart Security 4.2
ESET NOD32 Antivirus v5
ESET NOD32 Antivirus Business Edition

F-Secure

F-Secure Anti-Virus 2010
F-Secure Internet-Security 2010
F-Secure Client Security - Web Traffic Scanning
F-Secure Browsing Protection
F-Secure Client Security - DeepGuard
F-Secure Client Security - E-mail Scanning
F-Secure Client Security - Internet Shield
F-Secure Client Security - Virus & Spy Protection
F-Secure Anti-Virus Client Security - Cisco NAC Plugin
F-Secure Product 440
F-Secure PSB Workstation Security

G Data Software

G Data Antivirus 2011
G Data Antivirus 2012
G Data Antivirus 2013
G Data InternetSecurity 2011
G Data InternetSecurity 2012
G Data InternetSecurity 2013
G Data TotalProtection 2013
G Data TotalCare 2011
G Data TotalCare 2012

GFI Software

VIPRE Antivirus
VIPRE Internet Security

Jiangmin

Jiangmin
KV Antivirus 2007
KV Antivirus 2008

Kaspersky Lab

Kaspersky Lab Network Agent
Kaspersky Anti-Virus 6.0 for Windows Workstations
Kaspersky Anti-Virus 6.0 for Windows Servers
Administration Tool of Kaspersky Anti-Virus 8.0 for Windows Servers Enterprise Edition
Kaspersky Anti-Virus 8.0 for Windows Servers Enterprise Edition
Kaspersky Small Office Security
Kaspersky Anti-Virus 2008
Kaspersky Anti-Virus 2009
Kaspersky Anti-Virus 2010
Kaspersky Anti-Virus 2011
Kaspersky Anti-Virus 2012
Kaspersky Internet Security 2008
Kaspersky Internet Security 2009
Kaspersky Internet Security 2010
Kaspersky Internet Security 2011
Kaspersky Internet Security 2012
Kaspersky Endpoint Security 8 for Windows
Kaspersky PURE 2.0

Kingsoft

Kingsoft Internet Security 9
Kingsoft Internet Security 9 Plus

Lavasoft

Lavasoft Anti-Virus Helix
Ad-Aware SE Enterprise
Ad-Aware SE Personal
Ad-Aware SE Plus
Ad-Aware SE Professional
Ad-Aware

Malwarebytes Corporation

MalwareBytes Anti-Malware version 1.61.0.1400

McAfee

McAfee Antispyware
McAfee Personal Firewall Plus
McAfee SpamKiller
McAfee SecurityCenter
McAfee Total Protection
McAfee Rogue System Detection Sensor
McAfee Agent
McAfee Firewall Protection Service
McAfee Browser Protection Service
McAfee Virus and Spyware Protection Service
McAfee SiteAdvisor Enterprise Plus
McAfee Security Service for Exchange
McAfee VirusScan Enterprise

MicroPoint

MicroPoint Proactive Defense Software

Microsoft

Microsoft Intune
Microsoft Forefront
Microsoft Security Essentials

Norman

Norman Ad-Aware
Norman Security Suite
Norman Virus Control

Panda Security

Panda Antivirus Lite
Panda Antivirus Pro 2011
Panda Global Protection 2011
Panda Internet Security 2009
Panda Cloud Antivirus
Panda Client Shield
Panda Endpoint Agent 5.50
Panda Endpoint Agent 5.05
Panda Endpoint Protection 5.50
Panda Endpoint Protection 5.05
Panda Security Toolbar
Panda Security URL Filtering

PC Tools

PC Tools Internet Security 8.0
PC Tools Internet Security 9.0
PC Tools Firewall Plus 5.0
PC Tools Firewall Plus 6.0
PC Tools Firewall Plus 7.0

Prevx (subsidiary of Webroot)

Prevx

Qihoo

360 Safeguard

Sophos

Sophos Client Firewall
Sophos Anti-Virus
Sophos AutoUpdate
Sophos Remote Management System

Symantec Corporation

Symantec Endpoint Protection
Symantec Hosted Services
Symantec Shared
Symantec Hosted Services - Product Service Management
Symantec Hosted Services - Tray
Symantec Hosted Services - Platform Agent
Symantec Hosted Services - Endpoint Protection
Norton Antivirus Corporate Edition
Norton 360
Norton Antivirus
Norton Internet Security

Trend Micro

OfficeScan95
OfficeScanNT
ServerProtect
ServerProtect for NT
ServerProtect IS
Trend Micro Worry-Free Business Security Agent
Trend Micro Worry-Free Business Security Standard
Trend Micro Worry-Free Business Security Advanced
Trend Micro Client/Server Security Agent
Trend Micro Security Server
Trend Micro Internet Security Pro 2009
Trend Micro Titanium
Trend Micro Titanium 2011
Trend Micro Titanium 2012
Trend Micro Titanium Antivirus Plus 2011
Trend Micro Titanium Antivirus Plus 2012
Trend Micro Titanium Maximum Security 2011
Trend Micro Titanium Maximum Security 2012
Trend Micro Titanium Internet Security 2011
Trend Micro Titanium Internet Security 2012
Trend PC-cillin 7
Trend Micro OfficeScan Client

Webroot

Webroot Software
Webroot SecureAnywhere

ZoneAlarm
(Check Point Software Technologies)

ZoneAlarm Anti-virus
ZoneAlarm Extreme Security
ZoneAlarm Security Suite
ZoneAlarm Pro
ZoneAlarm

* The product names and versions displayed in the table are not necessarily the commercial ones. They are actually the names under which security programs or components thereof are listed in the Add or Remove Programs / Programs and Features utility from Windows Control Panel.