Directly contact our Support Team

Integrating GravityZone Cloud with Microsoft Windows Defender Security Center

The collaboration between Microsoft and Bitdefender resulted in the integration of Bitdefender GravityZone Cloud with Microsoft Windows Defender Security Center, which enables you to detect, view, investigate, and respond to advanced cyber-attacks and data breaches on macOS and Linux-based endpoints within the Windows Defender Security Center management console.

This integration is possible by using an access token, which is unique for each customer company.

This article aims to explain how to generate this token and bind the two platforms.


  • A valid account for Microsoft Windows Defender Security Center.

Generating the Access Token

  1. Go to Windows Defender Security Center and sign in.
  2. Click the menu icon in the upper-left corner of the console and choose Endpoint Management > Non-Windows.

    Windows Defender Security Center menu

  3. Enable Turn on server endpoint monitoring.

    Non-Windows endpoint management window

  4. Click Generate access token.

    Generate token button

  5. Click Copy.
  6. Go to the Bitdefender GravityZone page dedicated to this integration.
  7. Log in using your GravityZone account or, if you do not have one, sign up for a trial. After completing the form, you will be redirected to a new page.
  8. Paste the token in the field where asked to provide it, as in the following image.

    Token field

  9. Click Submit.
    Now the two platforms are integrated and you will be able to view GravityZone events in Microsoft Windows Defender Security Center.

Testing the Integration

To check if the integration between GravityZone and Windows Defender Security Center was successful:

  1. Install Bitdefender Endpoint Security Tools on a target endpoint. For details regarding the installation, refer to the GravityZone Installation Guide.
  2. Download an EICAR test file from here to the protected endpoint.
    The detection will be confirmed in both platforms, as follows:
    • A notification pop-up on your endpoint.

      Notification pop-up

    • Event in the security agent’s history/timeline.

      History window

    • Entry in GravityZone antimalware reports.

      Antimalware report

    • Malware detection event in Windows Defender Security Center.

      Detection in Microsoft console

Can't find a solution for your problem? Open an email ticket and we will answer the question or concern in the shortest time possible.

Rate this article: