Bitdefender cloud security products FAQ

This section summarizes the most frequent questions regarding the Bitdefender cloud security products.

Technical questions

On February 27th 2016, the majority of Cloud Security for Endpoints customer and partner accounts were upgraded to the new version of the management console. It is more robust and brings new features and an improved interface. The new Control Center console can be reached using the URL and can be accessed using the same credentials as for the legacy console at

Following the upgrade Cloud Security customers can benefit from:

  • Mac OS X Support - you can protect and manage all your computers from the same interface.

  • New Enhanced Dashboard - easier to monitor and control the security status of computers by configuring the metrics you want to see and how you want to see them.

  • Improved Reporting - you can generate reports for firewall, content control and other protection data, giving you even more flexibility and improved management.

  • New Advanced Filters - admins can see the live status for individual computers, setup new filters to work more efficiently and identify issues faster.

  • Optimized Bandwidth Consumption - with the new security relay mechanism, external traffic is minimized by using the local network to distribute updates or deploy new clients.

  • Configurable Roles and Privileges - It's now easier to map each individual's responsibility and role within the management console.

  • Support for Windows 8.1 and Windows Server 2012 R2.

Customer accounts that did not have the latest endpoint client installed have not been upgraded to the new Control Center console. Partners that have customer accounts in this situation under their account were not automatically redirected to the new Control Center console. They will be able to manage accounts with upgraded endpoints in the new console and accounts with legacy endpoints in the legacy console. To go to the new console either navigate to and use your existing credentials or use the link from the legacy console.

No. All accounts containing older versions of Endpoint Client can only be managed from the legacy console at The partners and customers accounts with the monthly usage option activated continue to use the legacy console. Within the new Control Center console, partners can manage only customers that have all endpoints to later version.

Partner and customer accounts can be created in the new Control Center console at Only if you want to add a new partner or customer account with the monthly licensing activated, you must use the legacy console.

You will need to upgrade the endpoints to the latest version using the corresponding task in the legacy console. The Cloud Security Team performs weekly upgrade tasks and if all Endpoints are up to date, the account will be upgraded to the new Cloud.

The upgrade date may vary but we expect accounts using monthly licensing to be upgraded in the next two months. In the meantime, partners can continue to use the legacy console.

Endpoint Security Relay is an endpoint security agent with extended features. The Endpoint Security Relay has three main functions (besides offering protection on the local computer).

  • Update Server. All the endpoints from a local network can update from the Endpoint Security Relay. This helps minimize internet traffic for all computers by keeping most of the update traffic in the internal network and it removes the internet connectivity requirement for all computers.

  • Communication Proxy. All the endpoints from a local network can communicate with the cloud only through the Endpoint Security Relay. This helps to minimize internet traffic and removes the internet connectivity requirement for all computers.

  • Discovery & Deployer. Once installed in the network, the Endpoint Security Relay will automatically discover all the computers. Once discovered, you can deploy the Endpoint Security on the other computers. The required files for installation will be copied from the Relay. This helps to minimize internet traffic and removes the internet connectivity requirement for all computers.

Endpoint Security Relay should be used:

  • If you want to remotely deploy protection

  • If Internet connection is not available to all computers from a network

  • If allowed internet traffic is limited

If high availability and disaster recovery are critical in your network, then multiple Relays can be installed, but usually there is no need for installing multiple Endpoint Security Relays in the same network.

You can create several users for your technicians inside your company. Each technician can be allocated to certain customer accounts and/or use specific administrative rights. There is no need to use multiple companies as was the case the with the legacy version.

If only your technicians will manage security on the customer computers, then there is no need to create a user for the customer. You can create just the company, and then assign administrative rights to any of your technicians in order to start managing the network. The customer will not get involved in IT services he chose to be outsourced.

If a partner created your account under his account, you can choose to let the partner manage your security or to manage protection for the company yourself. To disable any visibility and management from upstream partners, simply disable the option "Allow other companies to manage the security of this company" found in My Company menu.

In the database, the information is kept for 2 years. However the reports can be compiled for "Last year" inverval.

In Network you can use the Filters menu at the top of the table to filter displayed computers using different criteria. For example, you can choose to view only the managed computers with issues and using a specified policy. You can combine any filters in order to see only the desired information.

Most probably you didn't check the key before trying to create the company. If the key status is invalid after checking, then it may be an issue with the key itself. In this case, please contact your license provider.

Commercial questions

The new Bitdefender Small Office Security for up to 250 seats and Bitdefender Security for Endpoints that scales to protect any number of seats. Both are available in cloud and locally hosted versions.

The names are:Bitdefender Small Office Security (Cloud Console), Bitdefender Small Office Security (on-premise console), Bitdefender Security for Endpoints (Cloud Console), Bitdefender Security for Endpoint ( On-premise Console)

The product will no longer be available for purchase. However, SMBs can use an easy-to-deploy GravityZone kit.

No. The only product that was removed was GravityZone-in-a-Box.

The legacy version of Small Office Security that contains Client Security and File Server is being replaced by the new version that includes the latest Bitdefender management console and client. The new version comes with two flavors: one hosted by Bitdefender and one where the management console is hosted locally by each company.

The first URL is the location of the legacy Bitdefender console (Cloud Security Console). The second URL hosts the upgraded version of the console (Control Center).

The majority of customers that subscribed to Cloud Security for Endpoints have been upgraded to the new version of the console. It is based on the same console as the on-premise solutions that are part of the GravityZone family.

The cloud-hosted versions do not feature integration with Microsoft Active Directory. Other than that, the two versions offer the same functionality.

It is strongly recommended to provide the new versions that use the latest technologies. The product end of sales announcement is expected in 2014 but support will continue for a minimum of 2 years after.

While it is recommended to use the latest technologies, the 3.6 generation of solutions are still available.