Skyone
English
English
  • Home
  • Skyone Platform
    • Overview
    • Access and Registration
      • Password recovery for the platform
    • Settings and Preferences
      • My Profile
      • User Management
        • How to invite a user to the platform?
        • Options for User Management
        • Types of User Permissions
      • Invitations
      • My Company
      • Support Case Configuration
      • Companies Management
      • Billing
      • Settings
      • Security
      • Feedback
      • Logs
      • Cancellation
      • Partner-Clients
        • My Clients
        • My Partner
    • Notification
    • Health: Platform status check
    • Support Cases
      • How to track and respond to support cases?
      • Guide for opening ABO Tickets
  • Cloud Computer
    • Overview
    • Autosky
      • Login and Password Registration
        • Password RecoveryPassword Registration
      • Profile and Preferences
      • Skyone Autosky Platform
        • Dashboard
        • Accounts
          • Servers
            • Server Options
        • Environments
          • Micro environment
            • Micro environment instance
            • Micro environment servers
          • Scaling environment
            • Scaling environment instances
            • Scaling environment servers
          • Other features of the environments
        • Clients
          • Edit and Clone
          • Users
          • Applications
          • Sessions
          • Manage Access Restrictions
          • Maintenance
            • Maintenance history
        • Users
    • Cloud Server
      • Cloud Server Options
      • Backup Audit
  • Studio
    • Overview
      • Create an account
      • Recover Password
      • Quick Platform Guide
      • How to test the platform for free
      • Workspace
        • Creating a new Workspace
        • Find a Workspace
        • Sending an invitation to a Workspace
        • Editing a Workspace
      • Organizations
        • Creating an Organization
        • Organization Overview
        • Organization Management
        • Organization Monitoring
      • Settings and Preferences
        • Profile
        • Notifications
        • Usage and Billing
        • Users and Permissions
    • Integrations
      • Integration Management
        • Create integration
        • Import Integration
        • Edit Integration
        • Integration Options
        • Flows of this integration
      • Flows
        • Flow management
          • Creating a flow
          • Flow options
          • Flow Canva: configuring and editing the flow
            • Flow Canva: overview
            • Exception Handler
              • Exception Handler - Configuration
              • Exception Handler - Cases
            • Multicontext Flows
              • Example: Multicontext with an API Gateway
              • Example: Multicontext with a Time Trigger
            • Flow Settings
        • Triggers of a flow
          • API Gateway Triggers: Adding and Setting
          • AS2 Triggers: Adding and Setting
          • Queue Triggers: Adding and Setting
          • Flow Triggers: Adding and Setting
          • Time Triggers: Adding and Setting
          • Webhook Triggers: Adding and Setting
        • Tool Modules
          • AS2 Module
          • CSV Module
          • Data Transform Module
          • Data Balancer Module
          • EDI Module
          • Flow Call Module
          • IF Module
          • JavaScript Module
          • Log Module
          • Loop Do While Module
          • Loop For Module
          • Return Module
          • XML Module
          • Other Tool Modules
        • Module Header
        • Connecting components of a flow
        • Editing triggers and modules
        • Data Operations
          • Object Handling
            • Practical example: Handling variables
          • SMOP (Small Operations)
          • Parameterization rules
    • Modules
      • Module management
        • Creating a Module
        • Importing a Module
          • IAC Files - Integration as Code
        • Editing a module
        • Module Options
      • Settings and Operations
        • Module settings
          • Connectivity: Database
          • Connectivity: Email
          • Connectivity: REST
          • Connectivity: SOAP
          • Connectivity: File
          • Connectivity: RFC
          • Connected Account Management
        • Operations
          • Importing operations into REST Modules
          • Operation Management
        • Flows Using This Module
    • API Gateway
    • Terminals & Agent
      • Agent
        • Versions supported by Agent
        • How to Update the Agent Version
        • How to back up Agent files
      • Terminals
    • Data Management
      • Engine
        • How to use the Data Engine Proxy
      • Parameters
      • File filters
      • File templates
      • File Jobs
      • JSONata Jobs
    • Data Lake
    • Data Warehouse
      • Data Jobs
      • Databases
    • Artificial Intelligence
    • How to
      • Insert JSON into databases
      • Flattening: Data transformation using JSONata
      • How to use Form Data
      • Understanding recursion in JSONata
      • REST Module Output Consolidation
      • How to configure a component timeout?
      • Isolated in execution: concept and application in variables
      • URL Parameters in API Gateway
      • Use case: API Gateway trigger parameters
      • Use case: Exception Handler in financial transactions
      • Use case: using Groups to manage access to flows
      • How to create a download endpoint and integrate with Power BI
      • Is it possible to use two triggers in a single flow?
    • FAQ
    • GIGS: The complete guide
    • Glossary
  • Cybersecurity
    • Overview
    • Threat Analysis
      • Security Panel
      • Targets
      • Schedules
      • Target Resolution
      • Threat Group
      • Report
    • How to install Bitdefender security agents
Powered by GitBook
On this page
  • Installation Prerequisites
  • Installation Steps
  1. Cybersecurity

How to install Bitdefender security agents

Installation Prerequisites

Before starting the installation of security agents, follow these steps:

System requirements:

  • Ensure the endpoints meet the minimum requirements for Bitdefender Endpoint Protection.

  • Update the operating system with the latest service pack, if applicable.

  • Free up disk space if necessary.

Uninstall existing security software:

  • Remove all other security or antivirus software from the endpoints. Running multiple security solutions simultaneously can cause serious system issues.

Many incompatible programs are automatically detected and removed during installation.

Administrative access and internet connection:

  • Use domain administrator credentials for remote installations on Active Directory networks.

  • Ensure the endpoints are connected to the GravityZone appliance.

Specific configuration for Windows, Linux, and macOS:

  • Windows: Enable "Administrative Share" and "Network Share".

  • Linux and macOS: Enable SSH and configure username and password access.

  • MacOS: Approve Bitdefender extensions after installation. To avoid user intervention, use an MDM (Mobile Device Management) tool for pre-approval.

Installation Steps

After receiving the installer from Skyone, follow these instructions to install Bitdefender locally:

  1. Run the installer to start the installation process.

  2. Choose the installation language (feature only available for Windows operating systems).

    Select the operating mode:

  • Detection and Prevention: Allows you to customize which modules to include, and activates the blocking and reporting functions.

  • EDR (Report Only): Pre-defined configuration that activates only the reporting functions.

  1. Select the modules required for your environment, such as Antimalware, Firewall, Device Control, etc.

  2. Define the role of the endpoint: If the target machine has the Relay or Cache Server function for patch management, select the corresponding option.

  3. If you are using a Security Server, configure the server's network and priority options, ensuring the best security performance.

  4. Advanced options (optional):

  • Set the custom installation folder if you want to change the default installation location.

  • Set an uninstallation password to prevent unauthorized removal of the security agent.

  1. After configuring all the options, finish the installation and wait for the process to complete.

PreviousReport

Last updated 4 months ago