PHASR Standalone
PHASR Standalone is the independent deployment of Bitdefender’s PHASR technology, designed for integration into existing multi-vendor security environments. PHASR delivers targeted hardening recommendations to mitigate risks such as Living off the Land Binaries, Crypto miners, Piracy tools, Tampering tools, and Remote admin utilities based on observed behavior per user-device pair, without requiring organizations to replace their current endpoint agent or full protection suite.
PHASR Standalone is also available for customers that have a base license and PHASR-add on. This means that you will be able to install PHASR Standalone on any endpoint that has a different vendor security solution.
Components
For the PHASR Standalone feature to operate on an endpoint, the following prerequisites need to be met:
PHASR Standalone licence
Installation package with PHASR Standalone
The PHASR Standalone feature enabled in the policy
Bitdefender Endpoint Security Tools installed on Windows endpoints
Feature compatibility
PHASR Standalone can be deployed only on Windows 10 and later versions.
Install and configure PHASR Standalone
There are three possible scenarios for installing this feature on your endpoints:
An endpoint does not have the BEST agent installed. In this case, use the Create an installation package procedure.
An endpoint has the BEST agent installed, but PHASR Standalone is not included in the modules list. In this case, use the Add PHASR using a Reconfigure agent task procedure.
An endpoint has the BEST agent installed, and the PHASR Standalone module is included, but the policy containing the PHASR module is not enabled go directly to the Configure and enable PHASR Standalone section.
Managing PHASR recommendations
Recommendations in PHASR are security actions suggested based on observed user and device behavior. They indicate whether access to certain tool categories should be restricted or allowed, helping reduce attack surface while adapting dynamically if user behavior changes.
After PHASR is activated and the module is installed on endpoints, the learning phase begins. This phase lasts a minimum of 30 days and can extend up to 60 days, depending on rule severity. During this period, PHASR builds behavioral profiles by analyzing user and device activity, and gradually starts generating recommendations. When no usage is detected for certain tools, PHASR generates Restrict access recommendations to limit the attack surface.
Important
Behavioral profiles are unique pairs that are being created by combining user and device.
Examples of Behavioral profiles:
John Doe - Desktop
John Doe - Laptop
Kelly Doe - Laptop 1
Kelly Doe - Laptop 2
After the initial learning phase is completed and recommendations are generated, PHASR continues learning in the background, continually adapting to changes in user behavior.
Note
PHASR has the capability to leverage historical EDR data to reduce the duration of the learning phase, depending on the volume of the historical data at its disposal, meaning that the learning phase can be reduced to several days or get recommendations immediately.
When PHASR detects that user behavior has changed for a user which currently has access to certain assets, it will generate a Restrict access recommendation. Once this recommendation is generated you can review the behavioral profiles for which it was generated and allow the recommendation to be applied.
To view the generated recommendations and reduce the attack surface by applying them, go to the PHASR recommendations page.
Managing monitored rules
Monitored rules are mechanisms used by PHASR to identify possible attack vectors and allows the user to reduce the attack surface exposure. Each rule can produce multiple recommendations.
To view the rules that form the basis of recommendations, or to manually apply or remove restrictions, go to the PHASR monitored rules page.
Test out PHASR
To test out PHASR follow these steps:
In the GravityZone console go to the PHASR monitored rules.
Select a process that is available in one of the targeted activity type by PHASR, e.g.
teamviewer.exe
.Click the process name under the Rule name column. The Rule details side panel is displayed.
Select Edit access.
In the Edit access window, under the Behavioral profiles section, select the device for which you wish to restrict access.
Select Edit access to apply your changes.
On the selected device try to the access the earlier restricted process, e.g. teamviewer.exe.
When PHASR blocks a process on a specific endpoint, the restriction is visible in the Bitdefender Endpoint Security Tools interface. This information appears only if the process actually attempts to run or access resources, and it may take several seconds or even minutes for the change to synchronize.