TDR and Bitdefender

Deployment Overview

Threat Detection and Response (TDR) is a collection of advanced malware defense tools that correlate threat indicators from Fireboxes and Host Sensors to enable real-time, automated response to stop known, unknown, and evasive threats.

As part of the TDR solution, you install TDR Host Sensors to provide endpoint protection. In some cases, the TDR Host Sensor might have conflicts with the antivirus software installed on your endpoints. To resolve this issue, you can configure exclusions in the antivirus software and in TDR.

This document includes information about the integration of a TDR Host Sensor with a host that runs Bitdefender. It does not describe the procedure to set up Threat Detection and Response. For information about how to set up your TDR account, how to enable TDR on a Firebox, and how to install a Host Sensor, see Quick Start — Set Up Threat Detection and Response.

Integration Summary

To avoid conflicts between the TDR Host Sensor and Bitdefender GravityZone Business Security, add these exclusions:

  • Exclusions in TDR for Bitdefender GravityZone Business Security — For Windows:
    • C:\Program Files\Bitdefender\
    • C:\ProgramData\Bitdefender\
  • Exclusions in TDR for Bitdefender GravityZone Business Security — For Mac:
    • /Library/Bitdefender/AVP/
    • /Library/Application Support/Endpoint Security for Mac/
  • Exclusions in Bitdefender GravityZone Business Security for the TDR Host Sensor — For Windows:
    • 64-bit Windows — C:\Program Files (x86)\WatchGuard\Threat Detection and Response\
    • 32-bit Windows — C:\Program Files\WatchGuard\Threat Detection and Response\
  • Exclusions in Bitdefender GravityZone Business Security for the TDR Host Sensor — For Mac:
    • /usr/local/watchguard/

If the Host Sensor and Bitdefender GravityZone Business Security detect and respond to a threat at the same time, this can cause high utilization of system resources such as CPU, memory, and disk I/O.

Configuration Details

To complete this deployment, you must have:

  • An active Threat Detection and Response subscription with Host Sensor licenses
  • Bitdefender GravityZone Business Security:
    • Bitdefender Endpoint Security Tools 6.6.16.226 — For Windows
    • Bitdefender Endpoint Security for Mac 4.10.57.200057

The TDR and Fireware versions tested for this deployment included:

  • TDR Host Sensor 5.8.5.9153
  • Firebox with Fireware v12.5.2 or higher

The Windows test environment for this deployment included:

  • Windows 7, 8.1, 10 Enterprise 64-bit Operating System
  • Memory (RAM) — 8 GB
  • Processor — 2 CPU Cores

The Mac test environment for this deployment included:

  • macOS 10.13
  • Memory (RAM) — 8 GB
  • Processor — Intel Core i5

Configure Exclusions in TDR

In your TDR account, add the exclusions to manually identify paths for files and processes that you do not want Host Sensors to monitor. Before you deploy a Host Sensor on computers that Bitdefender GravityZone Business Security installed, add exclusions for the Bitdefender GravityZone Business Security file paths as TDR Exclusions in your TDR account. To add the exclusions to TDR, you can either use Predefined Exclusion Sets or add the exclusions manually.

Predefined Exclusion Sets

TDR has predefined AV exclusion sets for the most common third-party AV tools. This AV tool has a predefined exclusion set available. Predefined exclusion sets include all recommended exclusions for the AV tool. TDR updates these exclusion sets as needed. For information about predefined AV exclusion sets, see Configure TDR Exclusions.

You must also add the TDR exclusions to your AV software to avoid potential conflicts.

Manually Add AV Exclusions

If you do not want to exclude all the recommended paths in a predefined exclusion set, you can add exclusions manually.

In your TDR account, add the TDR exclusions for the paths shown in the Integration Summary.

Unless otherwise noted, configure each TDR exclusion with these options, which are selected by default:

  • Also exclude subfolders
  • Entities to exclude: Files and Processes

To add an exclusion in TDR:

  1. Log in to your TDR account or managed account as a user with Operator privileges.
  2. Select Configuration > Exclusion.
  3. Click Add Exclusion.
    The Add Exclusion dialog box opens.
  4. In the Path text box, type the path to exclude. Folders specified in an exclusion must end with a backslash.
  5. To apply the exception to all hosts, in the Hosts / Groups text box, specify the group All Hosts.
  6. Click Save & Close.

Repeat these steps to add each exclusion.

Configure Exclusions in Bitdefender GravityZone Business Security

In Bitdefender GravityZone Business Security, add the exclusions to identify the paths for files and locations to exclude. To prevent conflicts between the Host Sensor and Bitdefender GravityZone Business Security, we recommend you add exclusions in Bitdefender GravityZone Business Security for the paths used by the TDR Host Sensor.

To exclude directories used by the TDR Host Sensor, add the exclusions for the paths listed in the Integration Summary.

To add an exclusion in Bitdefender GravityZone Business Security — Both Windows and macOS:

  1. Log in to your Bitdefender GravityZone account.
  2. Click Policies on the left panel.
  3. Select the policy you want to update.
    1. The default policy is read-only. To edit the default policy, click Clone Policy. Add the exclusions and then set the cloned policy as default.
  1. Select Antimalware on the left panel.
    A list of options opens.
  2. Select Settings.
  3. Select the Custom Exclusions check box.
  4. From the Type column drop-down list, select File or Folder depending on which you want to add.
  5. Type the exclusion paths in the Excluded items column.
  6. From the Modulescolumn drop-down list, select all items.
  7. In the Action column, click +.
  8. Select Network Protection > General.
  9. Select the Global Exclusions check box.
  10. From the Type drop-down list, select Application.
  11. In the Entity text box, type host_sensor.
  12. In the Action column, click +.

    Steps 11-15 are to make sure the communication between TDR on a Mac with TDR Cloud is active.

  13. Click Save.
  14. Check the policy you just modified. Then select Set as default on the upper part of the page to apply the policy.

The results of this testing might also apply to these products, which were not tested:

  • Bitdefender GravityZone for Enterprise
  • Bitdefender for SMBs — Business Security
  • Bitdefender for SMBs — Advanced Business Security

For information about the integration testing methodology, see TDR Testing Methodology.