Skip to main content

Notification types

This is the list of available notification types:

  • Malware Outbreak

    This notification is sent to the users that have at least 5% of all their managed network objects infected by the same malware.

    You can configure the malware outbreak threshold according to your needs in the Notifications Settings window. For more information, refer to Configuring Notification Settings.

    Syslog format availability: JSON, CEF

  • License Expires

    A notification is sent 90, 30, 7 days, and also one day before the license expires. The notifications will include company information, product name, the expired license keys and useful URLs.

    Note

    You must have Manage Company right to view this notification.

    Syslog format availability: JSON, CEF

  • License Usage Limit Has Been Reached

    This notification is sent when all of the available licenses have been used.

    Syslog format availability: JSON, CEF

  • License Limit Is About To Be Reached

    This notification is sent when 90% of the available licenses have been used.

    Note

    You must have Manage Company right to view this notification.

    Syslog format availability: JSON, CEF

  • Servers License Usage Limit Has Been Reached

    This notification is sent when the number of protected servers reaches the limit specified on your license key.

    Note

    You must have Manage Company right to view this notification.

    Syslog format availability: JSON, CEF

  • Servers License Limit is About to Be Reached

    This notification is sent when 90% of the available license seats for servers have been used.

    Note

    You must have Manage Company right to view this notification.

    Syslog format availability: JSON, CEF

  • Exchange License Usage Limit Has Been Reached

    This notification is triggered each time the number of protected mailboxes from your Exchange servers reaches the limit specified on your license key.

    Note

    You must have Manage Company right to view this notification.

    Syslog format availability: JSON, CEF

  • Invalid Exchange user credentials

    This notification is sent when an on-demand scan task could not start on the target Exchange server due to invalid Exchange user credentials.

    Syslog format availability: JSON, CEF

  • Centralized Quarantine Issues

    This notification is sent when an endpoint cannot submit quarantined files to the centralized quarantine network folder. The notification contains details about the endpoint, configured network share, and encountered error.

  • Update Available

    This notification informs you about the availability of a new GravityZone, new package or new product update.

    Syslog format availability: JSON, CEF

  • Internet Connection

    This notification is triggered when Internet connectivity changes are detected by the following processes:

    • License validation

    • Obtaining an Apple Certificate Signing Request

    • Communication with Apple and Android mobile devices

    • Accessing MyBitdefender account

    Syslog format availability: JSON, CEF

  • SMTP Connection

    This notification is sent each time BitdefenderGravityZone detects changes regarding the mail server connectivity.

    Syslog format availability: JSON, CEF

  • Mobile device users without email address

    This notification is sent after adding mobile devices to multiple users and one or several selected users have no email address specified for their account. This notification is intended to warn you that users with no specified email address cannot enroll the mobile devices assigned to them, since the activation details are automatically sent by email.

    For details about adding mobile devices to multiple users, refer to the Mobile devices section.

    Syslog format availability: JSON, CEF

  • Database Backup

    This notification informs you about the status of a scheduled database backup, whether successful or unsuccessful. If the database backup has failed, the notification message will display also the failure reason.

    Syslog format availability: JSON, CEF

  • Exchange Malware Detected

    This notification informs you when malware is detected on an Exchange Server in your network.

  • XenServer integration auto-update

    This notification is sent when the integration settings automatically update after the XenServer master host gets a new IP address.

  • Advanced Anti-Exploit

    This notification informs you when Advanced Anti-Exploit has detected exploit attempts in your network.

    Syslog format availability: JSON, CEF

  • Antimalware event

    This notification informs you when malware is detected on an endpoint in your network. This notification is created for each malware detection,providing details about the infected endpoint (name,IP, installed agent) the type of scan, detected malware, signature version,detection time and the scan engine type.

    Syslog format availability: JSON, CEF

  • Integration out of sync

    This notification is sent when an existing virtual platform integration could not synchronize with GravityZone. This may happen due to various reasons such as integration details that have changed, or temporary unavailability of the server. In the notification settings, you can select the integrations for which you want to be notified when a synchronization error occurs. You can check more information about the synchronization status in the notification details.

    Syslog format availability: JSON, CEF

  • Antiphishing event

    This notification informs you each time the endpoint agent blocks a known phishing web page from being accessed. This notification also provides details such as the endpoint that attempted to access the unsafe website (name and IP), installed agent or blocked URL.

    Syslog format availability: JSON, CEF

  • Firewall event

    With this notification you are informed each time the firewall module of an installed agent has blocked a port scan or an application from accessing the network, according to applied policy.

    Syslog format availability: JSON, CEF

  • ATC/IDS event

    This notification is sent each time a potentially dangerous application is detected on an endpoint in your network. You will find details about the application type, name, and path as well as the parent process ID and path and the command line that started the process if the case.

    Syslog format availability: JSON, CEF

  • Content Control event

    This notification is triggered each time a user activity such as web browsing or software application is blocked by the endpoint client according to applied policy.

    Syslog format availability: JSON, CEF

    Note

    Content Control event notifications cannot be sent through email. Due to performance reasons, these notifications can only be sent via API to a SIEM platform.

  • Data Protection event

    This notification is sent each time data traffic is blocked on an endpoint according to data protection rules.

  • Product Modules event

    This notification is sent each time a security module of an installed agent gets enabled or disabled.

    Syslog format availability: JSON, CEF

  • Security Server Status event

    This type of notification provides information about the status changes of a certain Security Server installed in your network. The Security Server status changes refer to the following events: powered off / powered on, product update, security content update and reboot required.

    Syslog format availability: JSON, CEF

  • Overloaded Security Server event

    This notification is sent when the scan load on a Security Server in your network exceeds the defined threshold.

    Syslog format availability: JSON, CEF

  • Product Registration event

    This notification informs you when the registration status of an agent installed in your network has changed.

    Syslog format availability: JSON, CEF

  • Authentication Audit

    This notification informs you when another GravityZone account, except your own, was used to log in to Control Center from an unrecognized device.

    Syslog format availability: JSON, CEF

  • Login from New Device

    This notification informs you that your GravityZone account was used to log in to Control Center from a device you have not used for this purpose before. The notification is automatically configured to be visible both in Control Center and on email and you can only view it. This notification also includes the email address of the account used.

    Syslog format availability: JSON, CEF

  • Certificate Expires

    This notification informs you that a security certificate expires. The notification is sent 30, seven and one day prior to expiration date.

    Syslog format availability: JSON, CEF

  • GravityZone Update

    The notification is sent when a GravityZone update is completed. If failed, the update will run again in 24 hours.

    Syslog format availability: JSON, CEF

  • Task Status

    This notification informs you either each time a task status changes, or only when a task finishes, according to your preferences.

    Syslog format availability: JSON, CEF

  • Outdated Update Server

    This notification is sent when an Update Serverr in your network has outdated security content.

    Syslog format availability: JSON, CEF

  • Network Attack Defense event

    This notification is sent each time the Network Attack Defense module detects an attack attempt on your network. This notification also informs you if the attack attempt was conducted either from outside the network or from a compromised endpoint inside the network. Other details include data about the endpoint, attack technique, attacker’s IP, and the action taken by Network Attack Defense.

    Syslog format availability: JSON, CEF

  • Custom Report Has Been Generated

    This notification informs you when a query-based report has been generated.

    Syslog format availability: N/A

  • New Application in Application Inventory

    This notification informs you when Application Control detects a new application installed on monitored endpoints.

    Syslog format availability: JSON, CEF

  • Blocked Application

    This notification informs you when Application Control blocked or would have blocked a process of an unauthorized application, depending on the module configuration (Production or Test Mode).

    Syslog format availability: JSON, CEF

  • Sensor integration status

    This notification informs you when the status of a sensor integration changes. You can configure this notification to alert you in the GravityZoneControl Center, via email, or both.

    By default, the notification is sent out every 2 hours if a sensor integration issue persists. But you can customize this time interval.

  • Sandbox Analyzer Detection

    This notification alerts you every time Sandbox Analyzer detects a new threat among the automatically submitted samples. You are presented with details such as hostname or IP of the endpoint, time and date of the detection, threat type, path, name, size of the files and the remediation action taken on each one.

    This notification is not sent for manual submissions.

    Note

    You will not receive notifications for clean analyzed samples. Information on all submitted samples is available in the Sandbox Analyzer Results report and in the Sandbox Analyzer section, in the main menu of Control Center.

    Syslog format availability: JSON, CEF

  • HyperDetect event

    This notification informs you when HyperDetect finds any antimalware or unblocked events in the network. This notification is sent for each HyperDetect event and provides the following details:

    • Affected endpoint information (name, IP, installed agent)

    • Malware type and name

    • Infected file path and parent process path. For file-less attacks it is provided the name of the executable used in the attack.

    • Infection status

    • The SHA256 hash of the malware executable

    • The type of the intended attack (targeted attack, grayware, exploits, ransomware, suspicious files and network traffic)

    • Detection level (Permissive, Normal, Aggressive)

    • Detection time and date

    • Detection type

    • Logged user

    • Command line used

    Syslog format availability: JSON, CEF

    You can view details about the infection and further investigate the issues by generating a HyperDetect Activity report right from the Notifications page. To do so:

    1. In Control Center, click the gz_notifications_bell_icon_48451_c_p_op_en.pngNotification button to display the Notification Area.

    2. Click the Show more link at the end of the notification to open the Notifications page.

    3. Click the View report button in the notification details. This opens the report configuration window.

    4. Configure the report if needed. For more information, refer to Creating Reports.

    5. Click Generate.

    Note

    To avoid spamming, you will receive maximum one notification per hour.

  • Missing Patch Issue

    This notification occurs when endpoints in your network are missing one or more available patches.

    GravityZone automatically sends a notification containing all findings within the last 24 hours to the notification date.

    You can view which endpoints are in this situation by clicking the View report button in notification details.

    By default, the notification refers to security patches, but you may configure it to inform you of non-security patches as well.

    Syslog format availability: JSON, CEF

  • New Incident

    This notification informs you when a new incident occurs. Once enabled, the notification is generated every time a new incident is displayed under the Incidents section of Control Center. The corresponding syslog event contains a list of relevant items extracted from the incident details which you can use to enrich Security information and event management (SIEM) driven correlations. For more details click the Incidents Name

    Syslog format availability: JSON, CEF

    Note

    In order to get notifications for new incidents, the minimum value for the Severity Score field is 10. However, you can adjust by entering any value between 10 and 100.

  • Ransomware detection

    This notification informs you when GravityZone detects a ransomware attack within your network. You are provided with details regarding the targeted endpoint, the user that was logged in, the source of the attack, the number of encrypted files, and the time and date of the attack.

    At the time you receive the notification the attack is already blocked.

    The link in the notification will redirect you to the Ransomware Activity page, where you can view the list of encrypted files and restore them if needed.

    Syslog format availability: JSON, CEF

  • Storage Antimalware

    This notification is sent when malware is detected on an ICAP-compliant storage device. This notification is created for each malware detection, providing details about the infected storage device (name, IP, type), detected malware and detection time.

    Syslog format availability: JSON, CEF

  • Blocked Devices

    This notification is triggered when a blocked device or a device with read-only permission connects to the endpoint. If the exact same device connects multiple times in one hour, only one notification is sent during this interval. If the device connects again after one hour a new notification is triggered.

    Syslog format availability: JSON, CEF

  • Troubleshooting activity

    This notification informs you when a troubleshooting event in your network ends. You can view details about the event type and status, the troubleshooting target, the storage location where you can find the logs archive, and others.

    Syslog format availability: JSON, CEF

  • New Investigation Files Activity

    This notification is triggered when there are new requests related to forensic data gathering.

  • Security Container update status

    The notification informs you when the product update status changes for a Security Container installed in your network.

    Syslog format availability: JSON, CEF

  • Anti-Tampering event

    This notification informs you whenever the security agent’s callback functions are maliciously removed or disabled, or vulnerable drivers are detected on endpoints.