Skip to main content

PARTNERS

Install security agents - use cases

Preparing workstations for Bitdefender Endpoint Security Tools remote deployment

One of the main features that Bitdefender Endpoint Security Tools provides is the possibility to be installed remotely on endpoints, process called deployment.

For the Bitdefender Endpoint Security Tools deployment task to complete successfully on target systems, you need to comply with the following configuration prerequisites:

  1. OS requirements

    • Make sure the target endpoints meet the minimum system requirements. For some endpoints, you may need to install the latest operating system service pack available or free up disk space. Compile a list of endpoints that do not meet the necessary requirements so that you can exclude them from management.

    • When deploying the agent through a Linux relay, the following additional conditions must be met:

      • The Relay endpoint must have installed the Samba package (smbclient) version 4.1.0 or above, along with the samba-client dependencies and samba-common package, and the net binary/command to deploy Windows agents.

        Note

        The net binary/command is usually delivered with the samba-client and / or samba-common packages. On some Linux distributions (such as CentOS 7.4), the net command is only being installed when installing the full Samba suite (Common + Client + Server). Make sure that your Relay endpoint has the net command available.

      • Target Windows endpoints must have Administrative Share and Network Share enabled.

      • Target Linux and Mac endpoints must have SSH enabled and firewall disabled.

  2. Administrative privileges

    The installation requires administrative privileges. Make sure you have the necessary credentials at hand for all computers.

    You must also define the User Account Control (UAC) settings according to the target endpoint configuration:

    • For Windows 8.1 and 10 systems, you need full administrative privileges (the credentials of the built-in administrator account or a domain user account). For more information on how to successfully deploy BEST to Windows 8.1 and 10 stations, please refer to Client software deployment on Windows 8.1/10/2012 and above.

    • For target systems that are part of a Workgroup, you must disable UAC only if you are using other administrative rights credentials except the built-in domain Administrator account when configuring the deployment task. If the deployment task is configured to authenticate with the built-in domain Administrator account (and default UAC settings on the account were not changed in by group policy), it will run without having to change the UAC settings.

    • For target systems that are part of an Active Directory Domain, in addition to the previous recommendations, if the administrator wants to configure the task and provide the deployment credentials of users that are members of the Domain Admins security group, a GPO can be configured to apply this security group with the following settings:

      [Computer Configuration -> Policies -> Windows Settings -> Security Settings -> Local Policies -> Security Options]

      Policy

      Setting

      User Access Control: Behavior of the elevation prompt for administrators in Admin Approval Mode

      Elevate without prompting

      User Access Control: Detect application installations and prompt for elevation

      Disable

      User Access Control: Run all administrators in Admin Approval Mode

      Enable

    1342_1.png

    Note

    As security best practice, after the deployment cycle is finished, revert the settings to their defaults. For the UAC default configurations, refer to this Microsoft article.

    • For Windows 7, 8 and 10 systems, you will need to disable User Account Control (UAC), as follows:

      1. Go to Start > Control Panel > User Accounts

      2. Click Change User Account Control Settings

      3. Set UAC on Never Notify and then click OK

        1342_2.png
  3. Connectivity requirements

    On all workstations and servers that you want to manage, which need to have network connectivity to GravityZone console, you have to configure the firewall to allow the following communication ports, used by the security components:

    • 443: the communication port between the GravityZone console and Bitdefender Endpoint Security Tools. This port must be allowed on all network computers.

    • 7074: the communication port used for deployment and update via a Relay.

      Note

      These ports must not be used by any other application installed in the network.

    It is recommended to use a static IP address for the relay server. If you do not set a static IP, use the machine's hostname.

    Configure each workstation not to use sharing wizard as follows:

    In Windows 7:

    1. Go to Start > Computer > Organize > Layout and select Menu bar;

    2. Click Tools and go to Folder options... > View;

    3. Clear the Use Sharing Wizard check box in the advanced settings list;

    4. Click OK.

    In Windows 8 and 8.1:

    1. Go to Computer > View > Options;

    2. In the Folder options window, click the View tab;

    3. Clear the Use Sharing Wizard check box in the advanced settings list;

    4. Click OK.

    In Windows 10:

    1. Go to This PC > View > Options;

    2. Click the View tab;

    3. Clear the Use Sharing Wizard check box in the advanced settings list;

    4. Click OK.

      1342_3.png
    • Make sure that the File and Printer Sharing protocol is enabled. This service is using TCP ports 139, 445 and UDP ports 137, 138. To verify if the File and Printer Sharing protocol is enabled:

      1. Go to Start > Control Panel > Network and Sharing Center;

      2. Identify which network connection is established and click it;

      3. Click Properties;

        1342_4.png

    Note

    For the connection to be successful:

    • Disable the Windows Firewall, or configure it to allow traffic through File and Printer Sharing protocol. To disable Windows Firewall, open Control Panel > Windows Firewall and click Off.

    • Allow ICMP traffic (so you can successfully PING the workstation).

    To check that the network stations are correctly configured:

    • Ping the respective network station;

    • Try to log on to the administrative share.

  4. Third-party security software removal

Uninstall (not just disable) any existing antimalware, firewall or Internet security software from computers. Running the security agent simultaneously with other security software on an endpoint may affect their operation and cause major problems with the system.

Many of the incompatible security programs are automatically detected and removed at installation time.

To learn more and to check the list of the security software detected by Bitdefender Endpoint Security Tools for Windows operating systems (Windows 7 / Windows Server 2008 R2 and later), refer to Software incompatible with Bitdefender Endpoint Security Tools.

If you want to deploy the security agent on a computer with Bitdefender Antivirus for Mac, you first must remove the latter manually. For the guiding steps, please access Deploying Bitdefender Endpoint Security Tools on a machine with Bitdefender Antivirus for Mac.

Client software deployment on Windows 8.1/10/2012 and above

To remotely install software on Windows 8.1 / 2012 / 2012 R2 stations, you need to have full administrative privileges on them. In this case, you need the credentials of the built-in administrator account or a domain user account.

To successfully deploy the client software from Bitdefender Control Center to Windows 8.1 / 2012 / 2012 R2 stations, please consider one of the following recommendations:

  • Manually enable the built-in administrator account on target stations. When creating the client installation task for the Windows 8.1 / 2012 / 2012 R2 stations, use the credentials of the built-in administrator account.

    To learn how to enable and disable the built-in administrator account in Windows 8.1 / 2012 / 2012 R2, refer to this KB article.

  • Use the credentials of a domain administrator account, if you are managing an Active Directory network.

  • On the target Windows 8.1 / 2012 / 2012 R2 stations, change the value of the registry key HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Policies\\System\\EnableLUA from 1 to 0.

    You will be prompted to restart your machine.

Remote deployment of BEST for Linux on Oracle - SAP

This section provides steps on how to remotely deploy BEST Linux on Oracle - SAP.

On Linux Oracle remote deployment via SSH is not possible due to the SFTP service. The same issue occurs on Unbreakable Oracle systems.

Resolution:

1. Edit sshd_config

2. Search for the line starting with: Subsystem

3. Comment and add the following line: Subsystem sftp internal-sftp

Create an uninstall password for Bitdefender Endpoint Security Tools

Overview

In some situations users with administrative privileges can uninstall Bitdefender Endpoint Security Tools (BEST), leaving the system unprotected.

You can help prevent such unauthorized actions by setting up an uninstall password from the GravityZone Control Center.

Warning

BEST for Linux v7 does not support uninstall passwords at this time.

Set up a password

You can set up an uninstall password for:

New deployments

To protect future endpoints set up the uninstall password before the deployment, from the installation package.

To set the uninstall password for the installation package:

  1. Log in to GravityZone Control Center.

  2. Go to the Network page and click on the Packages section.

  3. Click the package that you want to install or create a new one

  4. Under Settings, select the Set uninstall password check box.

  5. Enter a password considering the complexity requirements.

  6. Click Save

Use this package to install BEST on endpoints. The password will prevent users from uninstalling the agent afterwards.

Existing installation

You can protect the existing endpoints in your network through policy. Edit the policy applied on the endpoints to set up the uninstall password.

To use multiple passwords for groups of endpoints sharing the same policy across your environment, use the uninstall password setting of the installation package.

To configure the uninstall password from the policy:

  1. Log in to GravityZone Control Center.

  2. Go to the Policies page.

  3. Choose the policy that you applied on your systems.

    If the applied policy is the Default one, you must create and assign a new policy.

  4. Go to the General > Settings page.

  5. Under Uninstall Password Configuration select the Set uninstall password check box.

  6. Enter a password considering the complexity requirements.

  7. Click Save.

Ensure that you apply the policy to your target endpoints.

Deploying Bitdefender Endpoint Security Tools on a machine with Bitdefender Antivirus for Mac

This topic explains how you can deploy the Bitdefender Endpoint Security Tools business product to a machine that has the Bitdefender Antivirus for Mac consumer product installed on.

If you choose to replace Bitdefender Antivirus for Mac with Bitdefender Endpoint Security Tools, you must keep in mind that you can deploy the latter only after you manually remove the consumer product.

This is because Bitdefender Antivirus for Mac has a Tamper protection module, a component that denies any external action over the integrity of the product, making impossible the uninstalling process via silent deployment or manual installation.

Thus, to deploy Bitdefender Endpoint Security Tools on a machine that has Bitdefender Antivirus for Mac, follow these steps:

  1. Remove manually Bitdefender Antivirus for Mac by using Bitdefender Uninstaller.

    Sometimes, the standard Bitdefender Uninstaller may fail or Bitdefender Antivirus for Mac does not exist at its location. In such a situation, you must use Disk Utility.

  2. Restart your Mac.

  3. Deploy Bitdefender Endpoint Security Tools as usual, following the instructions described here.

Installing Bitdefender Endpoint Security Tools through Jamf Pro

Jamf Pro (formerly Casper Suite) is a Mac and iOS management software developed exclusively for the Apple platform. It offers a breadth of functionality in package building, inventory, image management, remote imaging, remote updates, iOS mobile device management and a powerful framework for automated support.

Note

Starting with macOS 12.3 Monterey, deploying Bitdefender Endpoint Security Tools through Jamf does not work due to limitations that do not allow the exported certificate to be trusted.

Bitdefender Endpoint Security Tools installation through Jamf Pro 9.x

Bitdefender Endpoint Security Tools can be installed remotely on your endpoints via Jamf Pro 9.x through a Script or from Self Service in User Mode.

Running a Script using a Policy in Jamf Pro
  1. Open Jamf Pro and authenticate.

  2. Go to Computer Management in the left tab.

  3. Add the Bitdefender Endpoint Security Tools .DMG file as a new payload.

  4. Select the installation .PKG file to be extracted from the .DMG file.

  5. Go to Scripts and type the path as shown below (the downloaded .DMG file location may differ).

    mac-jamf-9-install.png
  6. Configure the policy settings according to your needs.

  7. Click Save.

    The Policy runs on the selected endpoints after the next sync with Jamf Pro.

Installing Bitdefender Endpoint Security Tools from Self Service
  1. Open Jamf Pro and authenticate.

  2. Go to Computer Management in the left tab.

  3. In the Computer Management – Management Framework section, click Self Service.

  4. Log in, if required.

  5. Select the package from Applications (file name subject to your Administrator’s Application Management).

    mac-install-jamf-self-service.png
  6. Select one of the following options:

    Click the Install button to deploy the Bitdefender Endpoint Security Tools installation kit.

    Click the Silent Install button for unattended Bitdefender Endpoint Security Tools deployment.

Learn more about Jamf Pro from their Administrator's Guide.

Bitdefender Endpoint Security Tools installation through Jamf Pro 10.x

This section describes how to remotely deploy Bitdefender Endpoint Security Tools through Jamf Pro 10.x.

Before you begin

Starting with macOS High Sierra (10.13), after installing Bitdefender Endpoint Security Tools manually or remotely, the user is prompted to approve the Bitdefender kernel extensions on Mac. Until the user approves the Bitdefender extensions, some Bitdefender Endpoint Security Tools features will not work. For details, refer to Bitdefender system extension blocked on macOS High Sierra (10.13) and later.

You can pre-approve the Bitdefender kernel extensions and thus eliminate user intervention by whitelisting the Bitdefender extensions using a Mobile Device Management tool such as Jamf Pro. For details, refer to Whitelisting Bitdefender Endpoint Security Tools extensions using Jamf Pro 10.x.

To install Bitdefender Endpoint Security Tools through Jamf Pro, you have the following options:

  • Use macOS Downloader, which detects the processor architecture and automatically downloads and installs the appropriate kit for either Intel or Apple M1.

    This option is recommended for mixed environments with both processors to save time and effort on your side.

  • Download and install the full macOS kit manually, paying attention to choose the right package for your processor architecture, be it Intel or Apple.

mac-downloader.png

Note

  • The steps described below follow the Jamf Pro version 10.5 interface. The Jamf Pro interface may differ in later versions.

  • Screenshots from this section are indicative and they may be different from your actual experience, based on Jamf Pro version and settings.

Installing procedure using macOS Downloader

You can use macOS Downloader to install Bitdefender Endpoint Security Tools on computers with both Intel and Apple processors. In this scenario, macOS Downloader automatically downloads the full kit during the installation process.

Note

Target computers must have access to GravityZone or to a relay to be able to download the macOS kit.

  1. Make sure you have an installation package configured in Network > Packages in GravityZoneControl Center.

  2. Click Download in the upper-side of the page.

  3. From the drop-down menu, select macOS Downloader and save the setup_downloader.dmg file locally.

  4. Double-click setup_downloader.dmg to view the content.

    img-02-setup-downloader-mac.png
  5. Drag both SetupDownloader.app and installer.xml to a folder (for example: /Users/Shared)

  6. Drag the folder containing the files into Jamf Composer and create an installation file from that folder (for example, a .dmg or a .pkg file).

  7. Log in to Jamf Pro.

  8. In the top-right corner of the console, click Settings. Make sure that the computers have the "User Approved MDM" status.

  9. Click Computer Management, then Packages. In the General tab, you can edit the Display name field.

    img-03-setup-downloader.png
  10. Upload the installation file into Jamf Pro.

  11. In the left-side menu, go to Policies and create a policy for the installation file.

    img-04-new-policy.png
  12. Go to Packages > Configure and select the package previously uploaded. Set the Action to Install.

    img-05-action-install.png
  13. Click Scripts and configure the Files and Processes payload.

  14. Type in the Script tab the following command:

    /Users/Shared/SetupDownloader.app/Contents/MacOS/SetupDownloader --silent
    img-06-script-setup.png
  15. Scope the policy to computers and click Save.

Installing procedure using the full macOS kit

When installing Bitdefender Endpoint Security Tools using the full kit, you must pay attention to the version you choose. You cannot install a macOS kit for Intel on a Mac with Apple silicon and vice versa.

  1. Make sure you have an installation package configured in Network > Packages in GravityZoneControl Center.

  2. Click Download in the upper-side of the page.

  3. From the drop-down menu, select macOS kit (Intel x86) or macOS kit (Apple M1). Downloading the corresponding file takes longer than macOS Downloader due to bigger size.

  4. Double-click the Bitdefender_for_MAC.dmg (Intel file) or Bitdefender_for_MAC_ARM.dmg (Apple M1 file) to view the content.

    13945_3.png
  5. Drag both antivirus_for_mac.pkg and installer.xml to a folder (for example: /Users/Shared)

  6. Drag the folder containing the files into Jamf Composer and create an installation file from that folder (for example, a .dmg or a .pkg file).

  7. Log in to Jamf Pro.

  8. In the top-right corner of the console, click Settings. Make sure that the computers have the "User Approved MDM" status.

  9. Click Computer Management, then Packages. In the General tab, you can edit the Display name and Filename fields.

    13945_4.png
  10. Upload the installation file into Jamf Pro.

  11. In the left-side menu, go to Policies and create a policy for the installation file.

    13945_5.png
  12. Select the installation file in Policies > Packages and set Action to Install.

    13945_6.png
  13. Click Scripts and configure the Files and Processes payload.

  14. Type in the Script tab the following command:

    installer -pkg /Users/Shared/antivirus_for_mac.pkg -target /
    13945_7.png
  15. Scope the policy to computers and click Save.

Bitdefender Endpoint Security Tools: Configuring Jamf Pro for macOS Big Sur 11.0 and later

Bitdefender Endpoint Security Tools requires a certain configuration in Jamf Pro when using this tool to deploy on machines running macOS Big Sur 11.0 and later. Specifically, you need to create a configuration profile where you pre-approve:

  • Bitdefender system extension

  • Traffic proxy

  • Full disk access

All these approvals are necessary for Bitdefender Endpoint Security Tools to work properly, without asking endpoint users for interaction.

Note

Starting with macOS 12.3 Monterey, deploying Bitdefender Endpoint Security Tools through Jamf does not work due to limitations that do not allow the exported certificate to be trusted.

Bitdefender system extension

First, you have to approve a configuration profile where you pre-approve the Bitdefender system extension.

  1. Log in to Jamf Pro.

  2. Go to Computers > Configuration Profiles and click New.

  3. In the left-side menu of the new profile, scroll down to System Extensions.

  4. Click Configure.

  5. Under Allowed Team IDs and System Extensions, make this configuration:

    • Under Display Name, enter Bitdefender.

    • From the System Extension Types drop-down list, select Allowed System Extensions.

    • Under Team Identifier, enter GUNFMW623Y.

    • Under Allowed System Extensions, enter the following string: com.bitdefender.cst.net.dci.dci-network-extension

    Once complete, the payload should look as in the image below.

    001-system-extensions.png
  6. Click Save.

Traffic proxy

Bitdefender Endpoint Security Tools uses a tunneling application (like a VPN) to filter the traffic. To pre-approve this application:

  1. In the left-side menu of the profile, go to Content Filter.

  2. Under Filter Name, enter Bitdefender.

  3. Under Identifier, enter com.bitdefender.epsecurity.BDLDaemonApp

  4. Under Network Filter, enter these strings:

    • For Network Filter Bundle Identifier: com.bitdefender.cst.net.dci.dci-network-extension

    • For Network Filter Designated Requirement: anchor apple generic and identifier "com.bitdefender.cst.net.dci.dci-network-extension" and (certificate leaf[field.1.2.840.113635.100.6.1.9] /* exists */ or certificate 1[field.1.2.840.113635.100.6.2.6] /* exists */ and certificate leaf[field.1.2.840.113635.100.6.1.13] /* exists */ and certificate leaf[subject.OU] = GUNFMW623Y)

    Once complete, the payload should look as in the image below.

    002-content-filter.png
  5. Click Save.

Full disk access

To allow full disk access for Bitdefender Endpoint Security Tools:

  1. In the left-side menu of the profile, go to Privacy Preferences Policy Control.

  2. You need to allow full access for the following application:

    • BDLDaemon.app

      To do this:

      1. Under Identifier, enter com.bitdefender.epsecurity.BDLDaemonApp

      2. Under Identifier Type, select Bundle ID.

      3. Under Code Requirement, enter anchor apple generic and identifier "com.bitdefender.epsecurity.BDLDaemonApp" and (certificate leaf[field.1.2.840.113635.100.6.1.9] /* exists */ or certificate 1[field.1.2.840.113635.100.6.2.6] /* exists */ and certificate leaf[field.1.2.840.113635.100.6.1.13] /* exists */ and certificate leaf[subject.OU] = GUNFMW623Y)

      4. Click + Add on the right side of the screen.

      5. Under App or Service, select SystemPolicyAllFiles from the drop-down list. Next to it, make sure Access is set to Allow.

      6. Click Save.

    • EndpointSecurityforMac.app

      To do this:

      1. Click the + button on the right side of the screen to add another template.

      2. Under Identifier Type, select Bundle ID.

      3. Under Identifier, enter com.bitdefender.EndpointSecurityforMac

      4. Under Code Requirement, enter identifier "com.bitdefender.EndpointSecurityforMac" and anchor apple generic and certificate 1[field.1.2.840.113635.100.6.2.6] /* exists */ and certificate leaf[field.1.2.840.113635.100.6.1.13] /* exists */ and certificate leaf[subject.OU] = GUNFMW623Y

      5. Click + Add on the right side of the screen.

      6. Under App or Service, select SystemPolicyAllFiles from the drop-down list. Next to it, make sure Access is set to Allow.

      7. Click Save.

        Once complete, the payload should look as in the image below.

        003-disk-access.png
  3. Click Save.

For details on Bitdefender Endpoint Security Tools approvals required in macOS Big Sur, refer to this topic.

For steps on Bitdefender Endpoint Security Tools installation through Jamf Pro 10.x, after creating the configuration profile, refer to this topic.

Whitelisting Bitdefender Endpoint Security Tools extensions using Jamf Pro 10.x

This section explains how to whitelist Bitdefender Endpoint Security Tools kernel extensions using Jamf Pro 10.x.

Starting with macOS High Sierra (10.13), after installing Bitdefender Endpoint Security Tools manually or remotely, the user is prompted to approve the Bitdefender extensions on his Mac. Until the user approves the Bitdefender extensions, some Bitdefender Endpoint Security Tools features will not work. For details, refer to Bitdefender system extension blocked on macOS High Sierra (10.13) and later.

You can pre-approve the Bitdefender kernel extensions and thus eliminate user intervention by whitelisting the Bitdefender extensions using a Mobile Device Management tool such as Jamf Pro. This feature is supported starting with macOS 10.13.2 and Jamf Pro version 10.3.0.

The procedure implies creating and applying an MDM configuration profile in Jamf Pro 10.x that whitelists the Bitdefender kernel extensions to the target computers.

Note

The computers must have the "User Approved MDM" status.

For details about User Approved MDM, refer to these articles:

How to create the MDM configuration profile in Jamf Pro 10.x
  1. Log in to Jamf Pro.

  2. Go to Computers > Configuration Profiles > New.

  3. Scroll down to Approved Kernel Extensions.

  4. Enter a Display name and the Team ID. The Bitdefender Team ID is GUNFMW623Y.

    15210_1.png

    Note

    Specifying individual kernel extensions to be approved is not required.

  5. Save the changes.

  6. Deploy the profile to the computers.

Bitdefender Endpoint Security Tools: SSL certificate deployment through Jamf Pro

After installation, Bitdefender Endpoint Security Tools requires an SSL certificate to properly work. For the Bitdefender agent to load and use the certificate when deploying it through Jamf Pro, this is what you need to know:

  • The installation package used for deployment must have an uninstall password set in GravityZone.

  • You need to create a PFX certificate (using PEM and KEY files) with the MD5 hash of the uninstall password.

  • You will install the PFX certificate on the machine with a Configuration Profile from Jamf.

  • You will also deploy the same PFX certificate on the machine in the path /Library/DeployCert through a Policy from Jamf. We advise that the certificate deployed to path /Library/DeployCert to only have read and write permissions for "root" user.

  • After the PFX certificate is installed, trusted in Keychain, and deployed to /Library/DeployCert, Bitdefender Endpoint Security Tools will used it for MITM and the local user will no longer be prompted to install the SSL certificate.

  • The certificate deployed to /Library/DeployCert using Jamf will have priority over the Bitdefender CA SSL certificate that has been previously installed and trusted in Keychain. Following this procedure, Bitdefender Endpoint Security Tools will stop using Bitdefender CA SSL and will load instead the new certificate.

Detailed procedure

You can do the following steps for existing Bitdefender Endpoint Security Tools installations, as well as before starting a new agent deployment.

  1. Set uninstall password in GravityZoneControl Center for the endpoints you wish to deploy the certificate to.

  2. Generate a PEM certificate with an associated private key.

    Example of command line to create the PEM certificate:

    /usr/bin/openssl req -new -days 1825 -nodes -x509 -subj '/C=RO/ST=Bucharest/L=Bucharest/O=Endpoint/CN=NewName
    CA SSL' -keyout rootCA.key -out rootCA.pem
    

    Note

    Make sure the name of the certificate that you create (the value for CN in the command line) is different from “Bitdefender CA SSL”, which is the name of the default certificate. Example: CN=MyCertificate CA SSL

  3. Generate a PFX certificate named “certificate.pfx” using the PEM and KEY files from the previous step.

    This certificate needs to be always trusted and password protected with the MD5 hash of the uninstall password set through GravityZone.

    You can calculate MD5 using the command md5 -s <password> in Terminal or with other MD5 calculator tool. For example, MD5 for string 1234 will be 81dc9bdb52d04dc20036dbd8313ed055.

    Example of command line to create the "certificate.pfx" file:

    openssl pkcs12 -inkey rootCA.key -in rootCA.pem -export -out certificate.pfx

    At this moment, you need to provide an export password, which is the MD5 hash of the uninstall password.

    certificatePFXcommand.png
  4. In Jamf, create a Configuration Profile and upload the "certificate.pfx" file previously configured.

    img-03-new-certificate-ok.png
  5. Scope the policy to the target machine. The certificate will be installed in Keychain, always trusted.

  6. Create the /Library/DeployCert folder and copy the "certificate.pfx" file to /Library/DeployCert. Use Jamf Composer to create to a PKG file with /Library/DeployCert/certificate.pfx.

  7. In Jamf, go to Computer Management > Packages and upload the PKG file from the previous step.

    img-04-upload-certificate.png
  8. Also in Jamf, go to Policies and create a new Policy.

    img-05-new-policy.png
  9. Configure the package previously uploaded. Set the Action to Install and scope the policy.

    The "certificate.pfx" file will be deployed to the target machines.

    img-06-configure-package.png

Endpoint Security for Mac: SSL certificate deployment through Kandji

After installation, Bitdefender Endpoint Security Tools requires an SSL certificate to work properly. In this situation, the Bitdefender agent prompts the local user to install the SSL certificate to enable SSL protection.

When using the Kandji platform to install the certificate, this is what you need:

  • The installation package used for deployment has an uninstall password set in GravityZone.

  • You create a PFX certificate with the MD5 hash of the uninstall password and install it on machines with a configuration profile in Kandji.

  • You deploy the same PFX certificate on the machine in the path /Library/DeployCert.

To install the SSL certificate, follow this procedure:

  1. Create an installation package for Bitdefender Endpoint Security Tools in GravityZone that has an uninstall password. For details, refer to Install security agents - standard procedure.

  2. In Terminal, create a PEM certificate with the associated private key.

    Example of command line to create the PEM certificate:

    /usr/bin/openssl req -new -days 1825 -nodes -x509 -subj
    '/C=RO/ST=Bucharest/L=Bucharest/O=Endpoint/CN=YourCertName CA SSL' -keyout
    rootCA.key -out rootCA.pem
    
    

    Note

    Make sure the name of the certificate that you create (the value for CN in the command line) is different from “Bitdefender CA SSL”, which is the name of the default certificate. Example: CN=MyCertificate CA SSL

  3. In Terminal, create the PFX certificate named “certificate.pfx” using the PEM and KEY files from the previous step.

    This certificate needs to be always trusted and password protected with the MD5 hash of the uninstall password set through GravityZone.

    Example of command line to create the “certificate.pfx” file:

    openssl pkcs12 -inkey rootCA.key -in rootCA.pem -export -out certificate.pfx
  4. At this step, you are prompted in Terminal for a password. Make sure you enter the MD5 hash of the uninstall password set in the Bitdefender Endpoint Security Tools installation package.

    You can calculate MD5 using the command md5 -s <password> in Terminal or with other MD5 calculator tool. For example, MD5 for string 1234 will be 81dc9bdb52d04dc20036dbd8313ed055.

  5. In Kandji, go to Library > Add New > Certificate > Add & Configure to create a Certificate Profile to push the PFX certificate on computers.

  6. Select the Blueprints to which the certificate is assigned.

  7. Specify the certificate details:

    • For Certificate type, select PKCS #12-formated certificate.

    • Add a certificate name.

    • Enter the certificate password, which is the same MD5 hash of the Bitdefender uninstall password.

  8. The PFX certificate must also be deployed on the local machine to the path /Library/DeployCert

    To achieve this, have this certificate put together in a ZIP archive with the Bitdefender Endpoint Security Tools installation kit.

  9. Then, you can slightly adjust the Kandji post-install script to include the steps needed to have the certificated placed in the correct location.

    Example:

    # Create the DeployCert folder
    
    mkdir -p /Library/DeployCert
    
     
    
    # Move the certificates in the DeployCert folder
    
    mv /var/tmp/certificate.pfx /Library/DeployCert/
    
     
    
    # Adjust permissions
    
    chmod -x /Library/DeployCert 
    
    chmod +w /Library/DeployCert
    

After the PFX certificate is installed, trusted in Keychain, and deployed to /Library/DeployCert, Bitdefender Endpoint Security Tools will use it for MITM, and the local user will no longer be prompted to install the SSL certificate.

The certificate deployed to /Library/DeployCert using Kandji will have priority over the Bitdefender CA SSL certificate that has been previously installed and trusted in Keychain. Following this procedure, Bitdefender Endpoint Security Tools will stop using Bitdefender CA SSL and will load instead the new certificate.

Install Bitdefender Endpoint Security Tools through MSI package

Bitdefender Endpoint Security Tools (BEST), the GravityZone security agent, uses one installation package for any environment (physical or virtual). On Windows, GravityZone delivers the installation packages as executable kits, only in EXE format. This may be inconvenient if you want to deploy the agent via Windows Group Policy or any other third-party application that supports MSI packages.

The solution implies applying an MSI wrapper over Windows Downloader, the standard lite installer for BEST. This section provides the guidelines for downloading the installer and a few methods on how to deploy the BEST using the MSI package.

Get Windows Downloader

Warning

  • Do not alter the Windows Downloader file name. Otherwise, the installation files will not download from the Bitdefender servers.

  • Because Microsoft Edge may trim long file names such as the one of Windows Downloader, we recommend using another browser.

To download BEST installer:

  1. Log in to GravityZone Control Center.

  2. Navigate to Network > Packages.

  3. Select the installation package you want to download.

    Important: This procedure currently does not support installation packages with proxy settings.

  4. Click Download at the upper side of the table and select Windows Downloader.

    The installation package is saved to your default download location as an EXE file.

Deploy BEST using Microsoft Endpoint Configuration Manager (SCCM)

Important

This procedure does not support installation packages with proxy settings.

To deploy BEST through SCCM follow these steps:

1. Get the installer hash

This can be done through one of these methods:

  1. Log in to GravityZone Control Center.

  2. Navigate to Network > Packages.

  3. Select the installation package you want to deploy.

  4. Click on the Send download links.

  5. Expand the Installation links area.

  6. Extract the installer hash from between the square brackets [ ] and save it.

    sccm2.JPG

Warning

  • Do not alter the Windows Downloader file name. Otherwise, the installation files will not download from the Bitdefender servers.

  • Because Microsoft Edge may trim long file names such as the one of Windows Downloader, we recommend using another browser.

To download BEST installer:

  1. Log in to GravityZone Control Center.

  2. Navigate to Network > Packages.

  3. Select the installation package you want to deploy.

  4. Click Download at the upper side of the table and select Windows Downloader.

  5. Extract the installer hash from between the square brackets [ ] and save it.

    sccm3.JPG
2. Create the installation MSI package
  1. Download the MSI Wrapper.

    BESTmsi.PNG
  2. Copy the MSI file to the Software Library share from your Configuration Manager.

  3. Open Configuration Manager > Software Library > Applications

    sccm1.JPG
  4. Click on the Create Application button.

  5. Locate the MSI wrapper and click Next.

    newsccm4.JPG
  6. Wait for the information to be imported and click Next.

  7. On the General Information page add the following parameters to the Installation program command line:

    msiexec /i "BEST_downloaderWrapper.msi" /qn GZ_PACKAGE_ID=installerhash REBOOT_IF_NEEDED=1

    The edited line should look like this:

    msiexec /i "BEST_downloaderWrapper.msi" /qn GZ_PACKAGE_ID=aHR0cHM6Ly9jbG91ZGd6LWVjcy5ncmF2aXR5em9ucS5iaXRkZWZlbmRlci5jb20vUGFja2FnZXMvQlNUV0lOLzAvcV9Ib0VML2luc3RhbGxlci54bWw-bGFuZz1lbi1VUw== REBOOT_IF_NEEDED=1
    
  8. Select Install for system if resource is device; otherwise install for user as Install behavior.

    newsccm5.JPG
  9. Click Next to apply the settings.

  10. Review the information and click Next to create the application.

  11. Bitdefender Endpoint Security Tools will be displayed in the Applications list.

    sccm6.JPG
3. Deploy the installation package
  1. Right-click the application and select Deploy.

    sccm7.JPG
  2. Click Browse and specify the collection as All Systems. Click Next.

    sccm8.JPG
  3. To add the Distribution Points, click in Add and choose your distribution point.

    sccm9.JPG
  4. Choose Action as Install and Purpose as Required. Click Next.

    sccm10.JPG
  5. Schedule the deployment and click Next.

    sccm11.JPG
  6. Configure User notifications and click Next.

    sccm12.JPG
  7. Specify alert options and click Next.

    sccm13.JPG
  8. Confirm the settings and click Next.

    sccm14.JPG
  9. Wait for the operation to complete and click Close.

    sccm15.JPG

Deployments incremented with the number of devices under SCCM:

sccm16.JPG

On the left-hand side of the console select Monitoring > Deployments. Here, you can see information about the application that was deployed.

sccm17.JPG
Deploy BEST via the msiexec.exe command line

This method is suitable for command-line deployment tools that accept instructions with parameters. The method uses the msiexec command, having the MSI wrapper and the installer ID as parameters. The MSI wrapper is digitally signed by Bitdefender.

  1. Download the MSI Wrapper.

  2. Open Command Prompt as Administrator.

  3. Run the following command to deploy BEST:

    msiexec /i "full_path\BEST_downloaderWrapper.msi" /qn GZ_PACKAGE_ID=string REBOOT_IF_NEEDED=1 parameter

    Where:

    • full_path is the actual path to the MSI Wrapper.

    • string this is an encrypted string from the installation package name.

    • parameter (optional) that reboots the machine when you deploy BEST over a competitor's product.

      1 = TRUE

      a notification prompts the user with a 10-minute time frame before restarting the machine.

    For example:

    msiexec /i C:\My Downloads\BEST_downloaderWrapper.msi /qn GZ_PACKAGE_ID=aHR0cH-bGFuZz1lbi1VUw== REBOOT_IF_NEEDED=1

    Where:

    • Installation package name: setupdownloader_[aHR0cH-bGFuZz1lbi1VUw==].exe

    • GZ_PACKAGE_ID value: aHR0cH-bGFuZz1lbi1VUw==.

      This is same string that is part of the downloader name.

    Note

    The string in the example is only for illustration purposes only. The actual string is different and much longer.

Deploy BEST via installer.xml

Use this method when you have a proxy configured into the installation package or when you use a proxy on a target machine.

  1. Log in to GravityZone Control Center

  2. Navigate to Network > Packages.

  3. Click Add at the upper side of the table.

  4. Configure the package and click Save.

  5. Click Download at the upper side of the table and select Windows kit (32-bit or 64-bit).

  6. Extract the installer.xml from the installation package to any location.

  7. Download the MSI Wrapper.

  8. Place the MSI wrapper in the same location with installer.xml.

  9. Rename the MSI Wrapper using the Windows Downloader to embed installer.exe

    For example:

    Installation package name: setupdownloader_[aHR0cH-bGFuZz1lbi1VUw==].exe

    MSI Wrapper name: BEST_downloaderWrapper.msi

    MSI Wrapper embedded with installer.xml: BEST_downloaderWrapper_[aHR0cH-bGFuZz1lbi1VUw==].msi

  10. Run the following command to deploy BEST:

    msiexec /i full_path\BEST_downloaderWrapper_[aHR0cH-bGFuZz1lbi1VUw==].msi

Deploy BEST via Windows Group Policy (GPO)

Follow this method if all you need is to run the MSI file. In this case, you need to customize the wrapper with Orca.exe, to link it to the Windows Downloader. To avoid security warnings when running the resulted MSI file, you need to unblock it.

Warning

This method alters the digital signature of the MSI Wrapper.

  1. Install Orca.exe

    Orca is a tool for creating and editing Windows Installer packages.

    1. Download and run Windows SDK Components for Windows Installer Developers

    2. Select the MSI Tools checkbox when asked to select the features to be installed.

      MSI Tools includes Orca.exe. For more information about Orca.exe, refer to this Microsoft topic

      10359_1.png
    3. Click Install.

  2. Customize the MSI Wrapper

    1. Download the MSI Wrapper.

    2. Right-click the MSI template and select Edit with Orca.

    3. In Orca, navigate to Tables > Property.

      MSI_Orca.PNG
    4. In the right panel, locate GZ_PACKAGE_ID under the Property column.

    5. Under the Value column, click the corresponding cell to enter a new value.

    6. Insert the string between brackets from the installation package EXE file.

      For example:

      Installation package name:

      setupdownloader_[aHR0cH-bGFuZz1lbi1VUw==].exe

      GZ_PACKAGE_ID value:

      aHR0cHbGFuZz1lbi1VUw==

      Note

      The string in the example is only for illustration purposes. The actual string is much longer.

    7. Add the following parameter (including its value) to reboot the machine when you deploy BEST over a competitor's product:

      REBOOT_IF_NEEDED=1

      A notification prompts the user with a 10-minute time frame before restarting the machine.

    8. Click OK to confirm.

    9. Save changes made to the MSI Wrapper.

  3. Unblock MSI Wrapper to avoid security warnings

    Windows may prevent you from running files downloaded from the internet and raise a security warning. To avoid this situation with MSI Wrapper, follow these steps:

    1. Right-click the MSI Wrapper template and select Properties.

    2. In the General tab, select Unblock at the bottom of the window.

      MSI_Properties.PNG
    3. Click OK or Apply.

  4. Deploy the MSI package

    Use the modified MSI Wrapper to deploy the Bitdefender security agent through Windows Group Policy or any other third-party application that supports MSI packages.

    Note

    For silent installations, use the following parameters: /qn or /quiet.

Install Bitdefender Endpoint Security Tools using Casper

In order to remotely install Bitdefender Endpoint Security Tools using Casper, follow these instructions:

Copy the pkg file on the machine and run this command:

/path/to/Installer.app/Contents/MacOS/InstallationDeployer --install installer -pkg /path/to/the_package_to_be_installed.pkg -target /

"Installer.app/Contents/MacOS/InstallationDeployer" is an application from the Casper suite used to install pkg files.

Install Bitdefender Endpoint Security Tools manually on Linux virtual machines

This section describes how to install manually the GravityZone security agent on Linux virtual machines from a GravityZone cloud environment.

Requirements and prerequisites

Before installation, check the security agent requirements on Linux.

Licensing

Linux endpoints use license seats from the pool of licenses for server operating systems.

Installation

The procedure includes how to download the appropriate installation package to the machine, unpack the archive and manually install it via a terminal session.

  1. In GravityZone Control Center, go to Network > Packages.

  2. Select the installation package you want to use. If there is no package available, create one and select it.

  3. Click the Send download links button at the upper side of the page.

    10359_5.png
  4. Type the email address you want to use for downloading the package in the appropriate field, and then press Enter. You will have to access this email account from the virtual machine where you want to install the security agent.

  5. Click Send. A predefined email containing the security agent download links will be sent to the specified address in a few minutes.

  6. Connect to the Linux virtual machine where you want to install the security agent, and access the email account previously used.

  7. Open the email from Bitdefender and click the Linux installer link, to download the Linux installation package to the virtual machine.

    Note

    The installer first downloads the full installation package from the Bitdefender cloud servers. It is small-sized and it can be run both on 32-bit and 64-bit systems.

  8. Open a terminal session on the Linux virtual machine using an account with administrative privileges.

  9. Run the following commands to unpack and run the installer:

    cd /root

    tar –xvf fullKit_unix64.tar

    chmod +x installer

    ./installer

    Note

    The cd /root command is an example for specifying the virtual machine folder where you have transferred the downloaded installation archive. The package name mentioned above is also an example. You must enter the name of the specific package you have downloaded.

  10. Bitdefender Endpoint Security Tools for Linux will be installed in a few moments. To check that the agent has been installed on the endpoint, run this command:

    /opt/bitdefender-security-tools/bin/bd status

In a few minutes after the security agent has been installed, the endpoint will show up as managed in the GravityZone network inventory.

Install Bitdefender Endpoint Security Tools using the credentials of a non-root user

In environments integrated with Control Center, you can remotely install Bitdefender Endpoint Security Tools on machines by using installation tasks. These tasks require administrative privileges on the target machines. On Linux machines, you can provide the credentials of either the root or a non-root user with administrative access.

To install BEST with a non-root user:

  1. On each target machine:

    1. Run the next command as root to open the /etc/sudoers configuration file for safe editing:

      #visudo

    2. Type I to enable editing.

    3. Ensure that your user can perform packages installations with the sudo command:

      1. Locate the following line:

        root ALL = (ALL) ALL

        A similar line with the one above but with the user name should be present in the next lines.

      2. If you cannot find the line for your user, add it as follows:

        username ALL = (ALL) ALL

        This setting grants the user the right to use sudo for all commands that require root privileges.

    4. Comment the following lines:

      Defaults requiretty

      Defaults targetpw

      Defaults runaspw

      Defaults rootpw

      Defaults !visiblepw

    5. Save the file and exit: press ESC and type :wq .

  2. From Control Center, follow the deployment steps described in Install Bitdefender Endpoint Security Tools manually on Linux virtual machines.

    When asked for credentials, provide the authentication details of the non-root user.

Configure Faronics Deep Freeze to work with Bitdefender Endpoint Security Tools

This section explains how to configure Faronics Deep Freeze Enterprise to allow installation of Bitdefender Endpoint Security Tools.

Faronics Deep Freeze helps eliminate computer damage and downtime by making computer configurations indestructible. Once Deep Freeze is installed on a computer, any changes made to the computer—regardless of whether they are accidental or malicious—are never permanent. Deep Freeze provides immediate immunity from many of the problems that plague computers today—inevitable configuration drift, accidental system misconfiguration, malicious software activity, and incidental system degradation.

Overview

Having Faronics Deep Freeze Enterprise installed on a computer will cause the signature updates installed by BEST to be deleted at every system reboot.

This section is meant to help you understand how to configure Faronics Deep Freeze Enterprise to work along with BEST without blocking:

  • Signatures updates after a system reboot

  • Policy assignment from Control Center

  • BEST product updates

Install BEST with Faronics Deep Freeze Enterprise

You have two options to install BEST: manually or using a script.

Configure manually
  1. Install Faronics Deep Freeze Enterprise version 8 or higher on a server in your network.

  2. Use the Deep Freeze Configuration Administrator utility to configure a password and a new partition (for instance, T:\) with minimum of 1.5 GB capacity as thawspace. The thawspace includes the files that will be kept after a system is rebooted with Deep Freeze active.

  3. In Deep Freeze Configuration Administrator utility tool, go to File > Create Workstation Install Program and create an installation package for the systems protected by Deep Freeze.

  4. Install the newly created package on the target machine.

  5. Open Deep Freeze Enterprise and select the Boot Thawed check box in Boot Control tab. This option will disable Deep Freeze on the next reboot, allowing you to install Faronics Data Igloo and BEST.

  6. Reboot the target machine.

  7. Install Faronics Data Igloo.

  8. Open the regedit utility on the target machine and create the registry key HKEY_LOCAL_MACHINE\Software\Bitdefender.

  9. Using Faronics Data Igloo, change the target of the HKEY_LOCAL_MACHINE\Software\Bitdefender key to a folder located on the T:\ partition.

  10. On the partition containing the operating system, create the following folders:

    • %ProgramFiles%\Bitdefender\Endpoint Security\Signatures

    • %ProgramFiles%\Bitdefender\Endpoint Security\ThreatScanner

    • %ProgramFiles%\Bitdefender\Endpoint Security\settings

    • %ProgramFiles%\Bitdefender\Endpoint Security\epagng

  11. Using the Folder Redirection tab from Faronics Data Igloo, redirect these three folders to a folder from T:\ partition.

  12. Install BEST on the target machine.

Configure using scripting functionality
  1. Install Faronics Deep Freeze Enterprise version 8 or higher on a server in your network.

  2. Use the Deep Freeze Configuration Administrator utility to configure a password and a new partition (for instance, T:\) with minimum of 1.5 GB capacity as thawspace. The thawspace includes the files that will be kept after a system is rebooted with Deep Freeze active.

  3. In Deep Freeze Configuration Administrator utility tool, go to File > Create Workstation Install Program and create an installation package for the systems protected by Deep Freeze.

  4. Install the newly created package on the target machine. The machine will automatically reboot.

  5. Open Deep Freeze Enterprise and select the Boot Thawed check box in Boot Control tab. This option will disable Deep Freeze on the next reboot, allowing you to install Faronics Data Igloo and BEST.

  6. Reboot the target machine.

  7. Install Faronics Data Igloo.

  8. Download the Bitdefender redirection script from here.

  9. Extract the VBS script file from the archive and run it.

    Note

    On operating systems with User Account Control enabled, launch Command Prompt (cmd.exe) as Administrator and run the script from the command line.

  10. Install BEST on the target machine.

Running a BEST product update

Important

During this process, the target system will reboot two times.

To successfully run a BEST product update:

  1. Switch the target machine to Boot Thawed mode. Deep Freeze will require a reboot in order to boot into Boot Thawed mode.

  2. Run the Update task from the Control Center. Additionally, you can run the update from the local console.

    Note

    In some situations, BEST may require a reboot of the target machine.

  3. Log in to Control Center to confirm the product update has been installed successfully by generating an Update Status report.

  4. Switch the target machine to Boot Frozen mode. Deep Freeze will require a reboot in order to boot into Boot Frozen mode.

Changes to Bitdefender Endpoint Security Tools in macOS Big Sur and later: network extension, proxy configurations and SSL certificate

Starting with macOS Big Sur, Apple uses technologies that affect the behavior of the Bitdefender Endpoint Security Tools agent.

Specifically, Apple has replaced the kernel extensions found in older versions of macOS with system extensions, which run in the user space. Therefore, Bitdefender has switched for Bitdefender Endpoint Security Tools from kernel extensions to system extensions too. One system extension in particular requires more attention from users: the network extension.

To work properly, some of the Bitdefender Endpoint Security Tools features or network components (Antiphising, Traffic Scan and Web Access Control in the Content Control module, and the EDR Sensor) require the following approvals from users:

  • Approval for the network extension

  • Approval for the tunneling application used to filter the internet traffic

  • Approval for the SSL certificate

If the network extension, the tunneling application and the SSL certificate are not approved, Bitdefender Endpoint Security Tools displays warning messages at every three hours.

Important

Starting with version 4.15.127.200127, Bitdefender Endpoint Security Tools provides full support for Content Control in macOS Big Sur 11.2 (see the release notes). Previously on macOS Big Sur 11.0 and 11.1, Content Control had entered the passthrough mode and stopped any connection filtering when another application with a network extension was installed on the endpoint (for example, Cisco AnyConnect VPN). This happened due to an incompatibility issue of the operating system. In such situation, the GravityZone console displayed the following error message: "Unknown issue (Product.NetworkExtensionIsDisabled.NetworkExtensionIncompatibility)".

For details about the Bitdefender Endpoint Security Tools support in macOS Big Sur, refer to Bitdefender support for macOS Big Sur.

Note

This article includes procedures and screenshots available with macOS Big Sur. The procedures are also applicable with later versions of macOS, such as Monterey and Ventura, but the user interface may differ, so please pay attention when following the steps.

The network extension
At installation

In the older macOS versions, kernel extensions required approval only at the first installation of Bitdefender Endpoint Security Tools. Starting with macOS Big Sur, the network extension requires approval every time the agent or a network component is installed or reinstalled (unless another component is already installed).

At installation, Mac users receive the following System Extension Blocked warning message for the Network extension:

"The program "SecurityNetworkInstallerApp" tried to load new system extension(s). If you want to enable these extensions, open Security & Privacy System Preferences."

big-sur-01.png

To approve the network extension in macOS Big Sur:

  1. Click Open Security Preferences.

  2. Go to Security > Privacy > General.

  3. Click the lock at the bottom of the window to make changes.

    big-sur-02.png
  4. Enter your system credentials and click Unlock.

    big-sur-03.png
  5. Click Allow for the blocked system extension.

  6. With the Network extension not approved, Bitdefender Endpoint Security Tools displays a You are at risk warning with the following message in the View Issues window:

    "Install and allow the network extension to enable full protection."

    big-sur-04.png

To fix the issue:

  1. Click Install now to open the Security > Privacy window.

  2. Click the lock at the bottom of the window to make changes.

  3. Enter your system credentials and click Unlock.

  4. Click Allow for the blocked system extension.

Note

In macOS Ventura these controls are available in the Privacy & Security page.

At uninstall

Starting with macOS Big Sur and later, the network extension requires user approval when the agent or the network components are uninstalled (no other component remains installed).

big-sur-05.png

If the user does not approve the change, the agent or the component will not be uninstalled.

The tunneling application (proxy configurations)

The system extension runs in the user space, so Bitdefender Endpoint Security Tools uses a tunneling application (like a VPN) to filter the traffic. This application also requires approval.

In the "BDLDaemon" Would Like to Add Proxy Configurations window, click Allow.

big-sur-06-ok.png

With the application not approved, Bitdefender Endpoint Security Tools displays a You are at risk warning and the following message in the View Issues window:

"Install the network component by allowing BDLDaemon.app to add Proxy Configuration."

big-sur-07.png

The proxy configuration will be added to System Preferences > Network.

big-sur-08-ok.png

Bitdefender DCI connects only if the network extension was approved.

big-sur-09.png
The SSL certificate

To filter the HTTPS traffic, Bitdefender Endpoint Security Tools requires the approval of a SSL certificate.

big-sur-10.png

If the Trust Settings are not updated, Bitdefender Endpoint Security Tools displays a You are at risk warning and the following message in the View Issues window:

"The SSL certificate is not trusted. Please trust the certificate to enable SSL protection."

big-sur-11.png

To trust the SSL certificate:

  1. Click Open Keychain Access.

  2. Double-click on Bitdefender CA SSL.

    big-sur-13.png
  3. Expand the Trust section.

    big-sur-14.png
  4. Click When using this certificate and select Always Trust.

    big-sur-16.png
  5. Close the window.

  6. Enter your system credentials and click Update Settings.

    big-sur-17.png

Important

In addition to the procedures described above, Bitdefender Endpoint Security Tools requires full disk access in macOS Big Sur. For details, refer to Allow full disk access to Bitdefender Endpoint Security for Mac in macOS Mojave (10.14) and later.

Deploy BEST for Linux V7 via Ansible

This article contains basic instructions on how to create the necessary configuration files and deploy BEST Linux using an Ansible playbook.

  1. Create a configuration file to keep track of your inventory:

    inventory.yaml

    virtualmachines:
      hosts:
        ubuntu22.04:
          ansible_host: 10.17.15.240

    Note

    For more information on how to create an Ansible configuration file refer to this this kb article.

  2. Create a configuration file to organize the BEST for Linux v7 deployment process:

    deploy.yaml

    - hosts: virtualmachines
      vars:
        - WORKDIR: /root/bitdefender
        - TESTFILE: /home/eicar.com
      tasks:
        - name: Create the working directory
          file:
            path: "{{ WORKDIR }}"
            state: directory
        - name: Download the Bitdefender installer
          get_url:
            url: https://cloudgz.gravityzone.bitdefender.com/Packages/NIX/0/3i0Aov/setup_downloader.tar
            dest: "{{ WORKDIR }}/setup_downloader.tar"
        - name: Extract the Bitdefender installer
          unarchive:
            src: "{{ WORKDIR }}/setup_downloader.tar"
            dest: "{{ WORKDIR }}"
            remote_src: yes
        - name: Adjust the Bitdefender installer permissions
          file:
            path: "{{ WORKDIR }}/installer"
            state: file
            mode: u+x
        - name: Launch the Bitdefender installer
          command:
            cmd: "{{ WORKDIR }}/installer"
            chdir: "{{ WORKDIR }}"
        - name: Wait for the product to initialize
          pause:
            seconds: 60
        - name: Test that the antimalware functionality is operational
          copy:
            dest: "{{ TESTFILE }}"
            content: |
              X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*
        - name: Check that the EICAR test file has been removed
          wait_for:
            path: "{{ TESTFILE }}"
            state: absent
            timeout: 5
        - name: Remove the working directory
          file:
            path: "{{ WORKDIR }}"
            state: absent
  3. Run the following command:

    ansible-playbook -i inventory.yaml -u root deploy.yaml

The output should be similar to the below example:

PLAY [virtualmachines] *********************************************************************************************************************************************************************************************************************

TASK [Gathering Facts] *********************************************************************************************************************************************************************************************************************
ok: [ubuntu22.04]

TASK [Create the working directory] ********************************************************************************************************************************************************************************************************
ok: [ubuntu22.04]

TASK [Download the Bitdefender installer] **************************************************************************************************************************************************************************************************
changed: [ubuntu22.04]

TASK [Extract the Bitdefender installer] ***************************************************************************************************************************************************************************************************
changed: [ubuntu22.04]

TASK [Adjust the Bitdefender installer permissions] ****************************************************************************************************************************************************************************************
changed: [ubuntu22.04]

TASK [Launch the Bitdefender installer] ****************************************************************************************************************************************************************************************************
changed: [ubuntu22.04]

TASK [Wait for the product to initialize] **************************************************************************************************************************************************************************************************
Pausing for 60 seconds
(ctrl+C then 'C' = continue early, ctrl+C then 'A' = abort)
ok: [ubuntu22.04]

TASK [Test that the antimalware functionality is operational] ******************************************************************************************************************************************************************************
changed: [ubuntu22.04]

TASK [Check that the EICAR test file has been removed] *************************************************************************************************************************************************************************************
ok: [ubuntu22.04]

TASK [Remove the working directory] ********************************************************************************************************************************************************************************************************
changed: [ubuntu22.04]

PLAY RECAP *********************************************************************************************************************************************************************************************************************************
ubuntu22.04                : ok=10   changed=6    unreachable=0    failed=0    skipped=0    rescued=0    ignored=0   

Deploying Bitdefender Endpoint Security Tools for Mac through Microsoft Intune

This topic describes how to deploy Bitdefender Endpoint Security Tools (BEST) on Mac through Microsoft Intune using a custom script. It also covers the procedure for deploying the Bitdefender SSL certificate and the MDM configuration profile needed for automatic approval of the full disk access and the Bitdefender system and DCI extensions.

Deploying BEST using a custom script

You can deploy Bitdefender Endpoint Security Tools on client machines through Microsoft Intune using a custom script. The script connects to GravityZone, downloads the installation kit, installs it and it does a quick cleanup.

Note

By using the script, BEST does not show up as an app in Microsoft Intune.

The following example is a proof-of-concept (POC) used during testing which succeeded in installing BEST after being deployed through Microsoft Intune.

#!/bin/bash

BD_TEMP="/var/tmp/temp_bd"	
mkdir -p $BD_TEMP && cd $_
curl -L -O https://cloudgz.gravityzone.bitdefender.com/Packages/MAC/0/A0c24p/setup_downloader.dmg
hdiutil attach setup_downloader.dmg
/Volumes/Endpoint\ for\ MAC/SetupDownloader.app/Contents/MacOS/SetupDownloader --silent
hdiutil detach /Volumes/Endpoint\ for\ MAC/
rm -rf $BD_TEMP

Since this script is executed with the highest privileges, it can be easily customized based on user preferences.

In the above example, the script downloads the installation kit (thin version - regular Setup Downloader) directly from GravityZone, it performs the installation and it does a cleanup.

To deploy the script through Microsoft Intune, follow these steps:

  1. In Microsoft Endpoint Manager, go to Devices > Scripts, click Add and select macOS.

    microsoft_intune_09_add_script_283723_en.png
  2. Enter a name for script and click Next.

    microsoft_intune_10_add_script_basics_283723_en.png
  3. Upload the script and click Next.

    microsoft_intune_11_upload_script_283723_en.png
  4. Select the group assignments and click Next.

    microsoft_intune_12_script_assignments_283723_en.png
  5. Review the settings and click Add.

    microsoft_intune_13_script_assignments_283723_en.png

The script is being executed based on groups and users assignments.

Bitdefender SSL certificate deployment

This section describes the deployment of the Bitdefender SSL certificate through Microsoft Intune to have it automatically approved and ready to use without user interaction.

As of March 2023, Microsoft Intune does not support the deployment of certificates in PFX format, but it does however support regular CER format.

Important

For this procedure to work, the Bitdefender installation package created in GravityZone must have an uninstall password setup.

To deploy the SSL certificate, follow these steps:

  1. Obtain the MD5 hash of the uninstall password setup in GravityZone for the installation package used.

    This can be achieved with various GUI tools or by using Terminal, where you run the following command:

    md5 -s "YourUninstallPassword"
  2. Generate a PFX certificate (using PEM and KEY files).

    Example:

    # generate the certificate
    openssl req -new -days 1825 -nodes -x509 -subj '/C=RO/ST=Bucharest/L=Bucharest/O=Endpoint/CN=NewName CA SSL' -keyout rootCA.key -out rootCA.pem
    
    # create the PFX certificate using the .key and .pem generated previously
    openssl pkcs12 -inkey rootCA.key -in rootCA.pem -export -out certificate.pfx

    Note

    After running this step, you are prompted for a password. Make sure to enter the MD5 hash of the uninstall password set on the BEST installation package obtained on step 1.

  3. Create the certificate in CER format.

    Example:

    openssl x509 -inform PEM -in rootCA.pem -outform DER -out certificate.cer

    Following this step we have both certificate.cer and certificate.pfx available.

  4. Deploy the CER certificate through Microsoft Intune. Follow these steps:

    1. Go to Devices > Configuration Profiles.

    2. Select Create Profile, followed by Platform: macOS and Profile Type: Template.

    3. Select Trusted Certificate and click Create.

    4. On the Basics tab, enter a name and click Next.

    5. In the Configuration Settings tab, select the certificate.cer file that was generated previously and click Next.

    6. In the Assignments tab and assign the appropriate groups and users, and complete the setup.

  5. Deploy the PFX certificate on the client machine.

    Note

    The PFX certificate needs to be available in the client machine in the path /Library/DeployCert

    One solution to deploy the PFX certificate would be to have the certificate hosted on a resource accessible by the client and running a script through Microsoft Intune that simply copies it on the machine.

    Below is a small example of such a script that downloads the certificate from a web server and copies it in the location needed.

    #!/bin/bash
    
    BD_TEMP="/var/tmp/temp_bd"
    mkdir -p $BD_TEMP && cd $_
    
    # assuming that the certificate is hosted on a web server at 10.25.99.228:8000
    curl -L -O http://10.25.99.228:8000/certificate.pfx
    mkdir -p /Library/DeployCert
    mv certificate.pfx /Library/DeployCert
    rm -rf $BD_TEMP

    Note

    The certificate deployed to /Library/DeployCert using using this procedure will have priority over the Bitdefender CA SSL certificate that has been initially installed and trusted in keychain. Following this, Bitdefender Endpoint Security Tools for Mac stops using Bitdefender CA SSL and loads the new certificate instead.

BEST configuration profile

This section includes the MDM configuration profile that helps you to automatically approve this elements:

  • Full disk access for BDLDaemon.app and Bitdefender Endpoint Security Tools (EndpointSecurityForMac.app in older versions)

  • Bitdefender system extension

  • Bitdefender DCI extension

This profile needs to be imported in Microsoft Endpoint Manager. To import the profile, follow these steps:

  1. Go to Devices > Configuration Profiles.

  2. Select Create Profile, followed by Platform: macOS and Profile Type: Templates.

  3. Select Custom and click Create.

  4. In the Basics tab, enter a name and click Next.

  5. In the Configuration Settings tab, enter a name in the Custom configuration profile name, set Deployment channel to Device channel and upload the configuration file available here.

    microsoft_intune_14_configuration_profile_283723_en.png
  6. Click Next.

  7. In the Assignments tab, assign the appropriate groups and users and complete the setup.

Note

Using the methods presented above, Bitdefender Endpoint Security Tools for Mac can be deployed successfully through Microsoft Intune without any user interaction with all features fully functional.