Removing security software incompatible with GravityZone Security for Endpoints
Bitdefender GravityZone provides full visibility into organizations' overall security posture, global security threats, and control over its security services that protect virtual or physical desktops, servers and mobile devices. All Bitdefender's Enterprise Security solutions are managed within the GravityZone through a single console, Control Center, that provides control, reporting, and alerting services for various roles within the organization.
This article is meant to explain how Endpoint Security detects other installed security products. The list of security software incompatible with Endpoint Security is also provided.
Endpoint Security is incompatible with other antimalware, firewall or security software. Running Endpoint Security simultaneously with other security software on a computer may affect their operation and cause major problems with the system.
Before installation, be sure to uninstall existing antimalware and firewall software from the computers you want to protect with Endpoint Security.
Important: Windows security features (Windows Defender, Windows Firewall) will be automatically turned off before Endpoint Security installation is initiated.
To ease installation over existing security software, Endpoint Security automatically checks for and detects a large number of incompatible security programs at installation time (the list is provided below).
- When installing Endpoint Security remotely, using the Install Client task from Control Center, the installer automatically attempts to uninstall any incompatible software detected. Many of the detected programs can be removed automatically, but some can not. After removing each detected program, the computer is restarted and installation resumes automatically.
- When installing Endpoint Security locally, using the installation package from Control Center, the installer alerts you about any incompatible program detected and prompts you to uninstall it. You must follow the instructions to remove each detected program. A computer restart is required to complete the removal of detected programs. Installation will automatically resume after the computer restarts.
If a detected program cannot be removed, the installer does not continue with the Endpoint Security installation, but sends an error message to Control Center. You can find details in the task report, which you can access from the Network > Tasks page by clicking the task name.
Detected programs cannot be removed in a number of particular situations:
- If the program is protected with a password. In this case, you must first remove password protection.
When performing remote installation, in the following situations:
- If the program cannot be removed silently (that is, without user interaction).
- Some programs protected by a self-protect mechanism.
To ensure Endpoint Security installation goes smoothly and to avoid problems caused by incompatibility with other security software, follow these best practices:
- If possible, make an inventory of all existing security software running on the organization's computers.
- If your current security solution offers a convenient mass removal method (for example, remotely via a centralized management interface), it is recommended to use it.
- Check the list of security software detected automatically when installing Endpoint Security. If you use security software that is not on this list, you must remove it manually prior to installing Endpoint Security.
- If you know your current security solution is password-protected, make sure to remove password protection.
- If you only have a few computers, it is best that you install Endpoint Security manually on each computer using the installation package. When performing local installation, the installer can remove any of the detected programs.
- If you want to use remote installation, test it first on a couple of computers to make sure your existing security solution can be removed automatically. If automatic removal works, proceed to remotely install Endpoint Security on all computers.
In the table below, you can find the list of security programs incompatible with Security for Endpoints that are detected automatically when installing Endpoint Security. If you use security software that is not on this list, you must remove it manually prior to installing Endpoint Security.
Note: This list is updated regularly.
|Vendor||Product & Version*|
All Bitdefender products and version
|ACA 1.0 for Windows|
Ashampoo Anti-Malware v.1.21
avast! Internet Security
Antivir PersonalEdition Classic
Comodo Internet Security
ESET NOD32 Antivirus
F-Secure Anti-Virus 2010
|G Data Software||
G Data Antivirus 2011
Kaspersky Lab Network Agent
Kingsoft Internet Security 9
Lavasoft Anti-Virus Helix
MalwareBytes Anti-Malware version 188.8.131.520
MicroPoint Proactive Defense Software
Panda Antivirus Lite
PC Tools Internet Security 8.0
|Prevx (subsidiary of Webroot)||
Sophos Client Firewall
Symantec Endpoint Protection
(Check Point Software Technologies)
* The product names and versions displayed in the table are not necessarily the commercial ones. They are actually the names under which security programs or components thereof are listed in the Add or Remove Programs / Programs and Features utility from Windows Control Panel.