Skip to main content

Getting started

Bitdefender Endpoint Security Tools is a fully automated computer security program, managed remotely by your network administrator. After installation, it protects you against malware (such as viruses, spyware and Trojans), network attacks, phishing and data theft. It can also be used to enforce your organization's computer and internet use policies. Bitdefender Endpoint Security Tools makes most security-related decisions for you and displays pop-up alerts. Details of actions taken and information about program operation are available in the Events window.

Important

As of version 7.9.29.589, the new BEST UI is only supported on endpoints running Windows 10 version 1809 or later, or Windows Server 2019 version 1809 or later.

The System Tray icon

During the installation process, Bitdefender Endpoint Security Tools places an icon best_tray_icon.png in the system tray. If you double-click this icon, the main window is displayed. If you right-click the icon, a contextual menu provides the following options:

best_system_tray.png
  • Show - opens the main window of Bitdefender Endpoint Security Tools.

  • Language - sets the language for the user interface.

  • Theme – allows you to switch between dark, light, and the system theme.

  • Switch to legacy interface – provides access to the legacy interface.

  • Power User - provides access to security settings, after you log in. Control Center is notified whenever an endpoint is in Power User mode and the Control Center administrator can always overwrite local security settings.

    Important

    This option is available only when a network administrator enables it through policy settings, and it is not available for Bitdefender Endpoint Security Tools for Windows Legacy.

The Bitdefender Endpoint Security Tools icon in the system tray informs you when issues affect your computer, by changing its design:

  • best_icon_critical.png Critical issues affect the security of the system.

  • best_icon_noncritical.png Non-critical issues affect the security of the system.

Note

  • The network administrator can choose to hide the system tray icon.

  • The system tray icon is not available when using the EDR standalone protection model.

The Overview window

The Overview window of Bitdefender Endpoint Security Tools is where you check the protection status and perform scan tasks. Everything is just a few clicks away. Protection configuration and management are performed remotely by your network administrator.

To access the main interface of Bitdefender Endpoint Security Tools, navigate from the Windows Start menu, through Start > All Programs > Bitdefender Endpoint Security Tools or double-click the Bitdefender Endpoint Security Tools best_tray_icon.png icon in the system tray.

best_overview_window.png

The window is organized into the following areas:

  • Actions

  • Status 

  • Issues

  • Tasks 

  • Policy name (if enabled by your system administrator)

  • Modules

Actions area

This area allows you to run a scan task or check for product updates. 

best_actions_area.png

The following scan tasks are available:

  • Quick scan - checks the %windir%\system32 and %TEMP% folders to detect malware threatening the endpoint. A Quick scan is usually completed faster and uses fewer local system resources than a Full scan.

  • Full scan - checks the entire endpoint for all types of malware threatening its security, such as viruses, spyware, adware, rootkits and others.

For more information on scan tasks, refer to Scanning for malware.

For more information about product updates, refer to Updating the security agent.

Status area

The Status area offers useful information regarding the security of the system.

best_system_risk.png

You can easily identify the current security status based on the status symbol displayed to the left of the status area:

  • Blue check mark. There are no issues to fix. Your computer and data are protected.

  • Orange exclamation mark. Non-critical issues that are affecting the security of your system.

  • Red X mark. Critical issues are affecting the security of your system.

In addition to the status symbol, a detailed security status message is displayed to the right of the status area. You can see the detected security issues by clicking inside the status area. Existing issues are fixed by your network administrator.

Issues area

The Issues area displays all the current issues found on your endpoint. If any critical issue is listed, the entire status set for the BEST agent is going to be critical, regardless of the number of additional non-critical issues. 

best_issues_status.png

You can also hide the items in the Issues area, click Hide issues. The items remain hidden until you reopen the security agent.

Some actions taken on your endpoint by the BEST agent will require a system restart. The restarts can be scheduled by administrators in Policies > Configuration profiles > Maintenance windows > Reboot preferences

Based on the settings configured by the administrator, users can choose to restart now, set a reminder, or schedule the restart for a later time.

best_issues_restart_required.png

Tasks area

The Tasks area displays currently running tasks. When a task is completed, the Tasks area is no longer displayed in the Overview window. 

Note

Tasks that have been generated by users are still going to be displayed in this area.

Policy name area

This area displays the policy that has been applied to your endpoint. This option is available only if granted by the network administrator through policy settings in GravityZone.

Modules area

The Modules area displays useful information about the status and activity of the installed protection modules.

best_modules.png

Antimalware   

Antimalware protection is the foundation of your security. Bitdefender Endpoint Security Tools protects you in real time and on demand against malware, such as viruses, trojans, ransomware, exploits, etc.

  • On-access scanning prevents new malware threats from entering the system by scanning local and network files when they are accessed (opened, moved, copied or executed), boot sectors and potentially unwanted applications (PUA).

  • HyperDetect exposes advanced attacks and suspicious activities in the pre-execution stage. This layer of security contains machine learning models and stealth attack detection technology.

  • Advanced Threat Control continuously monitors applications running on the endpoint for malware-like actions. Advanced Threat Control automatically tries to clean detected files.

  • Fileless Attack Protection protects devices by detecting and blocking fileless malware before it can run. By default, it stops threats by analyzing memory, terminating malicious PowerShell activity, blocking harmful network traffic, and preventing code injection.

  • Ransomware Mitigation uses detection and remediation technologies to protect your data from both known and unknown ransomware. It blocks suspicious encryption activity and automatically restores affected files from a backup.

  • Advanced Anti-Exploit uses real-time, machine learning–based detection to block known and unknown exploits, including memory-based and fileless attacks.

  • Anti-tampering allows users to view when vulnerable drivers are detected on endpoints, and when advanced attack attempts are made to disable the security agent, leading to compromised product integrity.

Network Protection   

Network Protection helps safeguard you on the internet against phishing attacks, fraud attempts, private data leaks, and inappropriate web content. It also includes a comprehensive set of user controls that help the network administrator enforce computer and internet use policies.

  • Traffic Scan prevents malware from being downloaded on the endpoint by scanning incoming emails and web traffic in real time. Outgoing emails are scanned to prevent malware from infecting other endpoints.

  • Application Blacklisting prevents access to unauthorized applications in your company. The administrator is responsible for creating rules for the allowed applications in the organization.

  • Web Access Control protects you from accessing dangerous websites based on administrator-defined rules.

  • Data Protection prevents unauthorized disclosure of sensitive data based on administrator-defined rules.

  • Antiphishing automatically blocks known phishing web pages to prevent users from inadvertently disclosing private or confidential information to online fraudsters.

  • Network Attack Defense detects network attack techniques used to gain access to specific endpoints, such as brute force attacks, network exploits, and password stealers.

Firewall   

The Firewall protects you while you are connected to networks and the internet by filtering connection attempts and blocking suspicious or risky connections.

If the Protection level in the policy is set to Ruleset and ask or Ruleset, known files and ask, you can choose to either Allow or Deny  the connection when Firewall notifications are displayed. Selecting the notification opens the BEST UI, where you can view more details, such as the file path, command line, and IP address.

best_firewall_notification.png

Note

If your operating system has notifications disabled, the connection is denied.

If you want to revert any connections that users have previously allowed or denied, click Reset user rules under Overview > Modules > Firewall. This action restores the Firewall to its default state.

best_firewall_reset_rules.png

Device Control   

Device Control prevents sensitive data leakage and malware infections via external devices attached to endpoints. This is achieved through policy settings where you can configure blocking rules and exclusions, and then apply them to a vast range of device types. The administrator is responsible for managing permissions for the following types of devices:

  • Bluetooth Devices

  • CDROM Devices

  • Floppy Disk Drives

  • IEEE 1284.4

  • IEEE 1394

  • Imaging devices

  • Modems

  • Tape Drives

  • Windows Portable

  • COM/LPT Ports

  • SCSI Raid

  • Printers

  • Network Adapters

  • Wireless Network Adapters

  • Internal and External Storage

Sandbox Analyzer   

The Sandbox Analyzer module provides a powerful layer of protection against advanced threats by performing automatic, in-depth analysis of suspicious files which are not yet identified by Bitdefender antimalware engines. Sandbox Analyzer employs an extensive set of proprietary technologies that executes payloads in a contained virtual environment hosted by Bitdefender, analyzes their behavior and reports any subtle system changes that are indicative of malicious intent.

Encryption 

The Encryption module provides full disk encryption, by managing BitLocker on Windows endpoints. You can encrypt and decrypt boot and non-boot volumes with minimal intervention from users, as GravityZone handles the entire process. Additionally, GravityZone stores the recovery keys needed to unlock volumes when the users forget their passwords.

EDR Sensor 

The EDR (Endpoint Detection and Response) Sensor collects, handles, and reports endpoint and application behavior data. Part of the information is processed locally, while a more complex set of data is reported to a back-end component of GravityZone.

PHASR 

PHASR provides a comprehensive view of your internal attack surface, helping reduce exposure by identifying and mitigating exploitable attack vectors within your environment.

Integrity Monitoring   

Integrity Monitoring reviews and validates changes made on Windows and Linux endpoints to assess the integrity of multiple entities. It operates based on default rules, which are provided by Bitdefender, and custom rules. Based on these rules, Integrity Monitoring takes action when events are generated for files, folders, registry entries, users, services, and installed software.

Patch Management   

Patch Management keeps the operating system and software applications up to date. This module includes several features, such as on-demand or scheduled patch scanning, automatic or manual patching, and reporting on missing patches.

Risk Management 

Risk Management helps you assess and harden your endpoints security configurations against industry best practices, to minimize the attack surface.

Live Search 

Live Search uses Osquery to retrieve event data and system statistics in real time from online endpoints using SQL-based queries.

Remote Shell 

This module provides interactive shell access, allowing you to remotely connect to an endpoint involved in an incident. You can run shell commands directly to mitigate threats or collect forensic data for analysis.

The Events window

Bitdefender Endpoint Security Tools keeps a detailed log of events on all the action made by the agent and all the security modules.

best_events_window.png

The Events window is an important tool in monitoring your Bitdefender protection. For instance, you can easily check if an update was successfully performed or if malware was found on your computer. 

You can also sort the events by severity, modules, and date.

For more information, refer to Events.

The Quarantine window

best_quarantine_window.png

The Quarantine window lists all the infected or suspicious files that have been placed in isolation. Use the Restore, Restore to…, Save as archive, Delete and Empty buttons at the top of the page to restore files, restore them in a specific location, save the selected file as an archive, to delete selections of files, or to empty the entire list.

When you save a file as an archive, the following window is displayed and works as follows:

best_save_as_archive.png
  • Save in folder: this field is set to the current user’s desktop by default. To change the location, click Browse

  • If the name of the file already exists, you must choose a different one. You cannot overwrite an existing file or create new folders from this window.

  • Archive name: this field is pre-filled based on the quarantined file’s path. You can rename it, but the security agent always creates a ZIP archive regardless of the name or extension you choose. 

  • The archive contains the original file with its original name, protected by the password you have selected.

The About window

This section displays the product version and the security content version of Bitdefender Endpoint Security Tools for Windows, Technical Support details, and Privacy Policy information.

The information displayed in the Technical Support section can be customized by the system administrator in the policy.

best_about_window.png

Changing the display language of Bitdefender Endpoint Security Tools

To change the language displayed and used by your locally installed BEST client, follow these steps:

  1. Right-click the BEST icon in the system tray.

  2. Go to Language.

  3. Select your desired language.

    Available languages:

    • English

    • Spanish

    • German

    • French

    • Romanian

    • Polish

    • Portuguese

    • Italian

    • Russian

    • Czech

    • Chinese

    • Vietnamese

    • Turkish

    • Korean

    • Japanese

    best_language_select.png

    Note

    Changing the language will restart the BEST client interface.