Bitdefender GravityZone InstallationGuide
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
4. Central Scan (Private Cloud scanning with Security Server) with fallback* on<br />
Local Scan (Full Engines)<br />
5. Central Scan (Private Cloud scanning with Security Server) with fallback* on<br />
Hybrid Scan (Public Cloud with Light Engines)<br />
* When using a dual engines scanning, if the first engine is unavailable, the fallback<br />
engine will be used. Resource consumption and network utilization will be based<br />
on used engines.<br />
Protection Modules<br />
The following protection modules are available with <strong>Bitdefender</strong> Endpoint Security<br />
Tools:<br />
●<br />
●<br />
●<br />
●<br />
●<br />
●<br />
Antimalware<br />
Active Virus Control<br />
Firewall<br />
Content Control<br />
Device Control<br />
Power User<br />
Antimalware<br />
The antimalware protection module is based on signature scanning and heuristic<br />
analysis (B-HAVE) against: viruses, worms, trojans, spyware, adware, keyloggers,<br />
rootkits and other types of malicious software.<br />
<strong>Bitdefender</strong>'s antimalware scanning technology relies on the following protection<br />
layers:<br />
●<br />
●<br />
First, a traditional scanning method is employed where scanned content is<br />
matched against the signature database. The signature database contains byte<br />
patterns specific to known threats and is regularly updated by <strong>Bitdefender</strong>. This<br />
scanning method is effective against confirmed threats that have been<br />
researched and documented. However, no matter how promptly the signature<br />
database is updated, there is always a vulnerability window between the time<br />
when a new threat is discovered and when a fix is released<br />
Against brand-new, undocumented threats, a second layer of protection is<br />
provided by B-HAVE, <strong>Bitdefender</strong>'s heuristic engine. Heuristic algorithms detect<br />
malware based on behavioral characteristics. B-HAVE runs suspected malware<br />
in a virtual environment to test its impact on the system and ensure it poses<br />
no threat. If a threat is detected, the program is prevented from running.<br />
About <strong>GravityZone</strong> 4