Microsoft Windows Defender ATP integration FAQ
The integration allows you to detect, view, investigate, and respond to advanced cyber-attacks and data breaches on macOS and Linux-based endpoints right from within the Windows Defender Security Center console. You will be able to view comprehensive threat intelligence information, which includes the following:
Detected file (path, size, hash)
Detected threat (type, name, action taken on threat)
Target machine (OS, IP, logged-in user)
Mac:
macOS Mojave (10.14.x)
macOS High Sierra (10.13.x)
macOS Sierra (10.12.x)
OS X El Capitan (10.11.x)
OS X Yosemite (10.10.5)
OS X Mavericks (10.9.5)
OS X Mountain Lion (10.8.5)
Linux:
Red Hat Enterprise 6.0 or higher
CentOS 6.0 or higher
Ubuntu 12.04 or higher
OpenSUSE 11 or higher
Fedora 16 or higher
Oracle Linux 6.3 or higher
Go to the Bitdefender GravityZone Security for Endpoints web page and click the Free Trial button in the right side of the page.
Go to the Bitdefender GravityZone Ultra Security for Linux and Mac web page and click the Login button in the right side of the page. You will have to provide your GravityZone account credentials and then configure the integration.
Only GravityZone Business Security Enterprise (cloud-based) is supported. Nevertheless, you can sign up here for a trial to evaluate the integration.
The procedure implies generating an API key from GravityZone and transferring to WDATP via the Bitdefender onboarding interface. For more information, refer to Integrate GravityZone Business Security Enterprise with Microsoft Windows Defender ATP.
You can contact Bitdefender Enterprise Support team using this form.
On a Bitdefender-protected endpoint, trigger a malware detection using an industry standard test file like EICAR. You should be able to view the threat detection event in the Windows Defender Security Center console.