Skip to main content

Network Protection

The Network Protection section allows you to set your preferences for content filtering, safeguard user activity across web browsing, email, and software applications, as well as identify network attack techniques aimed at gaining access to specific endpoints. It is possible to manage web access and application usage by implementing restrictions or allowances, as well as configuring traffic scanning, antiphishing measures, and data protection protocols.

Note

Availability and functioning of this feature may differ depending on the license included in your current plan.

Component

Network Protection is dependent on the following components:

  • GravityZoneControl Center

  • Security agent (Bitdefender Endpoint Security Tools installed on Windows, Linux, & Mac endpoints)

Install and configure Network Protection

To start using this feature, follow the steps below:

Test out the Network Protection features

Test out the Content Control feature

Content control has three main components:

  • Web Access Control - This feature allows you to block access to specific types of websites on your devices either between certain hours or permanently.

  • Application Blacklisting - You can use this feature to completely block or restrict users' access to applications on all endpoints where the policy is assigned. You can block games, media and messaging software, as well as other categories of software and malware.

  • Data Protection - Data Protection allows you to set up filters for web pages and outgoing emails that search for specific sensitive information: names, card numbers, addresses, and more.

Test out the Web Protection feature

For this scenario we will configure the Network Protection feature to exclude specific traffic from malware scanning.

We recommend duplicating your main policy, making these modifications, and applying it to a single endpoint for the purpose of testing the feature:

  1. Go to the Policies page from the left side menu.

  2. Select the policy you want to use to test, duplicate it, and start editing it.

  3. Go to the Network Protection > Web Protection page.

  4. Enable the Web Traffic Scan option.

  5. Apply the policy to one of your endpoints where you want to test the feature

    Note

    If you created a new policy, apply it on the endpoints where the feature is deployed.

    1. Go to the Network page from the left side menu.

    2. Select the endpoints you want to apply the policy to.

    3. Click the policy.pngAssign Policy button at the upper side of the table.

    4. Select the policy you want to apply.

    5. Click Finish.

  6. Open the browser on one of the selected endpoints and type in the following: https://secure.eicar.org/eicar.com.txt.

The selected URL's will be scanned and a error message will appear on the screen.

network_protection_onboarding_test_out_scenario.png

View Network Attack Defense activity

You can use this feature to protect your network against specific network attack techniques, such as Initial Access, Block Credential Access, Block Discovery, Block Lateral Movement, or Block Crimeware.

You can configure the feature to take one of two actions once such an attack is detected:

  • Block - Network Attack Defense stops the attack attempt once detected.

  • Report Only - Network Attack Defense informs you about the detected attack attempt, but it will not try to stop it.