Operation
Content Control on Windows servers
This topic provides information on the Content Control module installed on Windows Server machines.
Important
Content Control on Windows servers requires Bitdefender Endpoint Security Tools 7.5.1.177 or later.
Recommendations and performance impact
The Content Control module monitors on Windows Server machines, by design, only the user session traffic. That means non-user sessions such as services running on the server (“session 0”) are ignored. However, for servers with high end-user traffic, there are effects on performance. In this context, take into account the following considerations:
The actual performance level depends on usage patterns. You have to scale up the resources on virtual machines depending on the workload type and according to the Microsoft recommendations. Please estimate the usage as close to reality as possible. For details and best practices, refer to Virtual machine sizing guidelines and to Remote Desktop workloads.
Test the feature in a controlled environment to understand the effect on your specific environment. Use simulation tools to test the deployment and make sure the system is responsive and resilient. Test different workloads to avoid surprises.
In general, you should expect to see around 60% performance reduction in multi-session environments, such as servers that are used by multiple users simultaneously by remove desktop services.
Keep in mind that a Windows server has one active policy at any time. Therefore, avoid user-based assignment policies for users expected to operate the systems in multi-session environments.
Installing Content Control on Windows servers
The following procedures describe how to install the Content Control module on managed and unmanaged servers, respectively, using the options in GravityZone Control Center.
Managed Windows servers
To install Content Control on managed Windows Server machines, you need to use the Reconfigure client task to add this module to the already installed Bitdefender Endpoint Security Tools (BEST) agent.
In GravityZone Control Center, go to the Network page on the left-side menu.
Select the target Windows servers.
Select Tasks in the action toolbar, and then the Reconfigure client option.
In the configuration page, under Modules, select Add and Network Protection > Content Control.
Under Scheduler, select when the installation to take place. The task will attempt to run at the specified intervals until it completes successfully.
Click Save.
You can view the task status on the Network > Tasks page.
Unmanaged Windows servers
To install Content Control on unmanaged Windows Server machines, you need to deploy a Bitdefender Endpoint Security Tools package that has this module included.
In GravityZone Control Center, go to the Network > Packages page on the left-side menu.
In the action toolbar, click Add to create a new installation package, or select an existing package and edit it.
In the package configuration page, under Modules, select Network Protection > Content Control and any other module you want to include.
Configure the other installations settings.
Click Save.
Choose one of these ways to deploy the package:
Download the kit from the Packages page and install it on the target systems manually.
Go to the Network page and use the Install task to deploy the package remotely.
For details on configuring and deploying the package, refer to the GravityZone documentation.
Content Control on Citrix Virtual Apps and Desktops
As part of Content Control on Windows servers, GravityZone supports this module with the Citrix Virtual Apps and Desktops service. Citrix uses Windows Server machines to run virtual applications and remote desktops, therefore all Bitdefender capabilities are working as expected.
When you open a virtual app published in Citrix StoreFront, that app runs in a new dedicated session, for which Content Control scans the traffic.
Regarding Citrix virtual desktops running Windows Server, Content Control scans them the same way as physical servers, monitoring only the traffic from interactive sessions.
Due to the Virtual Apps and Desktops service architecture, you need to install Bitdefender Endpoint Security Tools (BEST) only on the master server. The instances generated from the master server will mirror BEST functionality, including Content Control, without the agent being actually deployed on them.

For details on setting up Virtual Apps and Desktops, refer to Citrix documentation.
For details on installing Bitdefender Endpoint Security Tools, refer to GravityZone documentation.
Deploying Network Attack Defense on Windows servers
On Windows servers, Network Attack Defense detects and prevents RDP brute-force attacks by scanning incoming connections on the RDP ports to identify authentication anomalies. Network Attack Defense also scans web traffic when used with Content Control.
Read more about Network Attack Defense.
To deploy Network Attack Defense, you need to do all settings in GravityZone Control Center.
Installing Network Attack Defense on managed Windows servers
These instructions address the scenario where Bitdefender Endpoint Security Tools (BEST) is already installed on Windows Server machines. You need to run a Reconfigure client task in Network to deploy the new module.
Go to the Network page on the left-side menu.
Select the target Windows servers.
Select the Tasks > Reconfigure client option in the action toolbar, at the upper side of the table.
The configuration page is displayed.
Under Modules, select Add and then the Network Attack Defense module. The Network Protection check box is also selected as Network Attack Defense is one of its components.
Under Schedule, select the time interval at which the task should run.
The tasks will attempt to run at the specified interval until it completes successfully.
Click Save.
For details on configuring and using the Reconfigure client task, refer to this topic.
Installing Network Attack Defense on unmanaged Windows servers
These instructions address the scenario where Bitdefender Endpoint Security Tools (BEST) is not installed on the target Windows Server machines. You need to create an installation package that includes the new module and deploy it on the target Windows servers.
Go to the Network > Packages page on the left-side menu.
In the action toolbar, click Add to create a new installation package, or select an existing package and edit it.
The package configuration page is displayed.
Under Modules, select Network Attack Defense and any other module you want to include.
Configure the other installations settings.
Click Save.
Next, you can choose one of these ways to deploy the package:
Download the kit file from the Network > Packages page and install it on the target systems manually.
Go to the Network page and use the Install task to deploy the package remotely.
For details on configuring and deploying an installation package in GravityZone, refer to this topic.
Blocking or allowing specific websites with Content Control
This section describes how to block or allow specific websites with Content Control in GravityZone.
To change website access permissions:
Log in to GravityZone web console.
Navigate to Policies and select your applied policy.
In Content Control section go to Web.
Enable Web Access Control by selecting the check mark.
Click Settings to open Web Control Settings.
Go to Exclusions to configure website access permissions.
Enter your URL and select Block or Allow in the neighboring field.
Click Save.
Note
Make sure that the Scan SSL option from the Traffic section in Content Control is checked, otherwise https websites will continue being blocked after excluding them from Web Access Control.
Important
In case Content Control does not block websites, make sure you clear the browser's cache on endpoints. If no traffic is made and the content is served locally, the security agent has nothing to scan.
Web Categories in GravityZone Content Control
Web Categories Filter dynamically filters access to websites based on their content. You can use the Web Categories Filter for defining exclusions to the selected Web Access Control action (Allow or Block) for entire web categories (such as Games, Mature Content or Online Networks).
You can define web rules to explicitly block or allow certain web addresses, overriding the existing Web Access Control settings. Users will be able, for example, to access a specific webpage also when the web browsing is blocked by Web Access Control.
To access and manage web categories, follow these steps:
Log in to GravityZone Control Center.
Go to Policies and click to add a new one, or edit an existing policy.
In the policy settings, go to Network Protection and choose Content Control.
Enable Web Access Control and click Settings.
Click the Categories tab and enable Web Categories Filter.
To define a custom filter, select Custom.
Click Web Rules to expand the categories section.
Find the category that you want in the list and select the desired action from the drop-down menu.
Save your changes and then save the policy.

You can find all the available web categories, along with their descriptions and examples, listed below:
Category | Description | Examples |
Web Proxy | This category covers web sites which provide web proxy service, that, through a web application, allow the user to spoof his identification data for anonymous browsing, to access prohibited content, to avoid company monitoring or to avoid certain imposed constraints (location constraints). |
|
Software Piracy | This category covers the following types of websites:
|
|
Tabloids | This category covers soft pornography and celebrity gossip sites. They are often associated with a printed publication of the same type. |
|
Hate/Violence/Racism/Illegal Drugs | This category covers the following types of websites:
|
|
Gambling | This category covers the following types of websites:
|
|
Medicine/Alcohol/Cigars | This category covers websites discussing, or selling (legal), medical drugs or paraphernalia, alcohol or tobacco products. Note that illegal drugs are covered in the Hate/Violence/Racism/Illegal/Drugs category. |
|
Online Shopping | This category covers online stores, meaning web sites which sell goods or services online, and also the webpages on the regular sites which ask for the credit card information, allowing detection of hidden, unknown or illegal online stores. |
|
Online Payment | This category covers websites that offer users online payment services. |
|
Photos/Videos | This category covers photo-sharing websites whose primary purpose is to let users upload and share photos or videos. |
|
Social Networks | This category covers the social network websites. They are focused on user communities and allow users to communicate by sharing messages and other types of digital content. |
|
Online Dating | This category covers websites offering free or paid online dating services, and also webpages containing dating ads. |
|
IM | This category covers instant messaging and chat websites, allowing users to chat in real time. It will also detect websites where instant messaging software is embedded or can be downloaded. |
|
News | This category covers websites which provide both text and video news. It includes both global and local news websites. |
|
Pornography | This category covers websites containing explicit erotic and pornographic material. It includes both paid and free web sites which provide pictures, stories and videos. It can also detect pornographic content on mixed content websites. |
|
Mature Content | This category covers web sites which contain sexually explicit information either of medical or scientific nature, such as sexually transmitted diseases, websites with nude art, intimate lingerie or swimsuit content along with websites that contain sexual education information. |
|
Religious | This category covers websites dedicated to or describing one or more religions, sects or cults. It also covers discussion forums related to one or multiple religions along with occult practices. |
|
Games | This category websites providing games and game presentations and reviews. This category does not cover official game companies' websites, game discussions websites or websites where non-online games can be downloaded. |
|
Suicide | This category covers websites that offer, detail, promote, or advocate suggestions, instructions, descriptions or methods on how to commit suicide. |
|
Health | This category covers the following types of websites:
Note that websites containing sexual health topics are categorized under Mature Content. |
|
Violent Cartoons | This category covers websites and discussion forums that refer to cartoons which may be inappropiate for mirrors due to violence, explicit language or sexual content. |
|
Blogs | This category covers personal websites as well as all types of blogs: individual, group and even company ones. A blog is a journal published on the World Wide Web consisting of entries ("posts"), typically displayed in reverse chronological order so the most recent post appears first. |
|
File Sharing | This category covers websites that allow the user to share and/or store files online. |
|
Web Mail | This category covers websites that describe or provide mail services. |
|
Weapons | This category covers websites that present guns, related to gun or ammunition purchasing, manufacturing and usage, about hunting resources along with air-soft and melee weapons. |
|
Hacking | This category covers websites that contain software/information on how to crack/hack accounts on the Internet, as well as information on exploits that help users gain control of another person's computer. This category contains - but is not limited to - Facebook, Yahoo, Twitter or Gmail account hacking. |
|
Scams | This category covers all types of fraudulent web pages involved in identity theft, credit card fraud, advance fee fraud, employment scams, conference fraud, money loan, pay per click, piracy, lottery, and so on. These types of websites impersonate hotels, banks, law firms, shops, online casinos, rental and escrow firms, and have small lifespans. | N/A |
Narcotics | This category covers websites referring to narcotics, such as recreational drugs, psychoactive drugs and dissociative drugs, as well as forums and message boards discussing their use, production and consumption. |
|
Online Photo | This category covers photo-sharing websites whose primary purpose is to let users upload and share photos. |
|
Search Engines | This category covers websites designed for searching out information within the World Wide Web. |
|
Ads | This category covers websites that promote or sell services or products. |
|
Advice | This category covers websites that allow the users to ask for advice or ask questions on various topics. |
|
Banks | This category covers banking websites and internet banking services. |
|
Business | This category covers websites that offer information about available services and products to gain profit. |
|
Computers and Software | This category covers the following types of websites: Software, Technical information, Blogs or code discussion groups. |
|
Education | This category covers websites with educational content, encyclopedias or dictionaries. |
|
Entertainment | This category covers websites offering information about: Music or music festivals, Movies, Art, Poetry. |
|
Government | This category covers websites that contain information or news for local, state, and national governments or related agencies. |
|
Hobbies | This category covers websites that contain information or discussions on recreations and hobbies. |
|
Hosting | This category covers hosting providers and services that offer users the possibility to upload files for general or limited access. |
|
Job Search | This category covers websites that provide job listings and employer reviews. |
|
Portals | This category covers websites that offer information from multiple sources and provide access to other services, such as e-mail, forums or search engines. |
|
Radio Music | This category covers websites that stream audio content. |
|
Sports | This category covers websites about sporting events or virtual sports, including news, scores, and statistics. |
|
Time Wasters | This category covers websites containing general information on which users tend to spend a lot of time. |
|
Travel | This category covers websites that allow the users to book or plan trips, holidays or flights. These types of websites can also contain travel tips, destination information, and other renting services |
|
Network Attack Defense: SSH PKI authentication on endpoint outbound connections
Network Attack Defense protection for SSH uses a modified version of libssh
to proxy client connections to the product, which then connects to the remote server. Client-product and product-remote server connections are only established at the transport layer.
Before accepting connections, the proxy initializes its server by loading the SSH keys in /opt/bitdefender-security-tools/etc/ssh
.
It tries ssh_host_rsa_key
, ssh_host_ed25518_key
and finally ssh_host_ecdsa_key
.
The first one that is found will be used. However, if none is found, a completely new pair of keys is automatically generated and the RSA one is used.
The directory layout of /opt/bitdefender-security-tools/etc/ssh
is a copy of the one found on VMware ESXi (5.0 and later). Additionally, for each user in /opt/bitdefender-security-tools/etc/ssh/keys-$user
, besides the private keys, an authorized_keys
file can be configured. This will be required if the proxy manages to authenticate to the remote host using one of the user private keys.
Check the following directory contents example:
# ls -lR etc/ssh/ etc/ssh/: total 24 drwxr-xr-x. 2 root bitdefender 58 Oct 11 15:47 keys-root drwxr-xr-x. 2 root bitdefender 58 Oct 11 15:50 keys-test -rw-------. 1 root bitdefender 241 Oct 6 02:42 ssh_host_ecdsa_key -rw-------. 1 root bitdefender 180 Oct 6 02:42 ssh_host_ecdsa_key.pub -rw-------. 1 root bitdefender 395 Oct 6 02:42 ssh_host_ed25519_key -rw-------. 1 root bitdefender 100 Oct 6 02:42 ssh_host_ed25519_key.pub -rw-------. 1 root bitdefender 3272 Oct 6 02:42 ssh_host_rsa_key -rw-------. 1 root bitdefender 744 Oct 6 02:42 ssh_host_rsa_key.pub etc/ssh/keys-root: total 12 -rw-------. 1 root bitdefender 400 Oct 11 15:47 authorized_keys -rw-------. 1 root bitdefender 1679 Oct 22 2021 id_rsa -rw-------. 1 root bitdefender 400 Oct 22 2021 id_rsa.pub etc/ssh/keys-test: total 12 -rw-------. 1 root bitdefender 400 Oct 11 15:50 authorized_keys -rw-------. 1 root bitdefender 1679 Oct 11 15:50 id_rsa -rw-------. 1 root bitdefender 400 Oct 11 15:50 id_rsa.pub
The authentication flow is as follows:
The proxy advertises the none authentication method to the client in order to capture the user name.
The proxy initializes the connection to the remote server.
The proxy loads all private keys found in
/etc/ssh/keys-$user
(if any).If none of the user’s private keys could be used to authenticate to the remote server or if the PKI authentication with the client failed, the proxy enters MITM mode in order to give the client the chance to try password authentication directly.
Configuring authentication with SSH Keys when Network Attack Defense is enabled
When installing Bitdefender Endpoint Security Tools for Linux with Network Attack Defense and SSH/SCP protocol support enabled, the following steps will be needed if PKI is used:
Move all personal keys into
/opt/bitdefender-security-tools/etc/ssh/keys-$user
, where$user
is the one with which you authenticate to the remote server (not necessarily your current user).Generate a new personal key-pair using ssh-keygen and install the public key in
/opt/bitdefender-security-tools/etc/ssh/keys-$user/authorized_keys
.