GRAVITYZONE UNIFIED SECURITY MANAGEMENT Use Cases for Beta Testers
Introduction This document provides beta testers with guidelines for testing Bitdefender GravityZone solutions. To send your feedback, use the Feedback link in GravityZone Control Center. Use Case 1 New Customer Deploys GravityZone to Protect Computers Description: A customer downloads the GravityZone Virtual Appliance and starts to deploy it to protect the company computers. 1. Import the virtual appliance image in a VMware vsphere, Citrix XenServer or Microsoft Hyper-V virtual environment. 2. Start the machine and complete the setup from the CLI interface: configure the network settings and install all roles (Database, Update Server, Web Console and Communication Server) on the same machine. 3. Access the Control Center web interface and log in with MyBitdefender username and password. 4. Go to Settings and configure the integration with Active Directory (AD). 5. Go to Accounts, import a user from AD and grant the user Administrator permissions over Computers (with access to all groups). 6. Log out and then log in to the Control Center web interface with the username and 7. Go to Network, select a computer and perform an installation task (note the need to add credentials). 8. From the Network section: a. Check synchronization with Active Directory. b. Check Custom Groups operations: add, edit, remove and show all computers. c. Check group filters: Managed, Unmanaged, Deleted. d. Search for a computer using available filters. e. Assign a quick scan task. f. Assign an update task. g. View task progress and results in the Tasks section (scan tasks may take a while). 9. Go to Network -> Packages and add (customize) an Endpoint Security installation package. 10. Run the Setup Downloader on a workstation and observe the local installation process: a. Measure the installation process time and tell us what you think. b. Check that a scan is performed during installation (follow the setup wizard progress). c. Check if the installation has finished successfully. d. In Control Center, go to Network and check if the endpoint has synced (it must appear in the Managed Computers list). e. Tell us about your overall installation experience. 11. Go to Policies and create a new template policy. 2
12. Go to Network and assign the new policy. a. Select a computer or a group of computers. b. Open the policy assignment options and note the current settings. c. Stop the policy inheritance and assign the new policy. 13. Test the Quarantine feature: a. On a protected workstation, try to download an Eicar test file from: c. In Control Center, go to Quarantine and delete or restore the file. 14. Test Control Center reporting feature: a. Create new scheduled reports: Now, Daily, Weekly, Monthly. b. Create a quick report from the Network section. 15. Go to Dashboard and customize it: 16. Go to Logs and check your actions in Control Center. Use Case 2 Computer User Interacts with the Client Software Description: My IT department installed the new security software, Endpoint Security by Bitdefender, on my workstation. 1. Open the Endpoint Security by Bitdefender interface by using the Notification Area (System Tray) icon and observe the following: - Minimal vs. Extended view: what do you think about it? - Status tab: does this section provide the necessary info from the end-user s point of view? What about the administrator s point of view? What would you add or remove? - Tasks tab: what do you think about the tasks available here? - Events tab: use the information filtering and search. 2. Go to the Tasks tab and run a Quick Scan task, then a Custom Scan. Tell us what you think about the scan wizard: - Are the scan wizard steps and options clear for the Custom Scan? What else would you add or remove? - At the end of the scan, click the Show Log button does the Log File include all the information you need? - What do you think about the scan speed? - Tell us about your overall scan experience. 3. Right-click the Notification Area (System Tray) icon, click About and: - Check that the software is up-to-date (automatic updates). - Check the displayed information. 4. With Endpoint Security by Bitdefender installed, please use your system as before and tell us about the product impact on your computer: - CPU and Memory consumption - Slowdowns or application crashes - Slow Internet access 3
Use Case 3 Existing Customer Adopts Virtualization (VMware with vshield) protection to virtual machines within their recently implemented virtualized environment (VMware vcenter with vshield Endpoint). 2. Go to Settings -> Virtualization and add a new virtual server. 3. Go to Accounts, edit an administrator user and grant the user access permissions over Virtual Machines, with the new server set as target. 4. Log out and then log in to the Control Center web interface with the username and 5. Go to Network and install a Security Virtual Appliance (SVA) on a host. 6. Go to Network, select a virtual machine and perform an installation task (note the need to add credentials). 7. From the Network section: a. Check integration with vcenter Server. b. Change views. c. Assign a Scan task and check the scan report. d. Assign an Update task. 8. Go to Policies and create a new template policy. 9. Go to Network and assign the new policy to a specific host. 10. Test the Quarantine feature: a. On a protected machine, try to download an Eicar test file from: c. In Control Center, go to Quarantine and delete/restore/download the file. 11. Go to Reports and create new scheduled reports: Now, Daily, Weekly, Monthly. 12. Go to Dashboard and customize it: 13. Go to Logs and check your actions in Control Center. 4
Use Case 4 Existing Customer Adopts Virtualization (VMware without vshield) protection to virtual machines within their recently implemented virtualized environment (VMware vcenter without vshield Endpoint). 2. Go to Settings -> Virtualization and add a new virtual server. 3. Go to Accounts, edit an administrator user and grant the user access permissions over Virtual Machines, with the new server set as target. 4. Log out and then log in to the Control Center web interface with the username and 5. Go to Network and install a Security Virtual Appliance (SVA) on a host. 6. Go to Network -> Packages and add (customize) a Silent Agent installation package. 7. Download and install the Silent Agent on a virtual machine. 8. Go to Network, select a virtual machine and perform an installation task (note the need to add credentials). 9. From the Network section: a. Check vcenter Server inventory. b. Change views. c. Assign a Scan task and check the scan report. d. Assign an Update task. 10. Go to Policies and create a new template policy. 11. Go to Network and assign the new policy to a specific host. 12. Test the Quarantine feature: a. On a protected machine, try to download an Eicar test file from: c. In Control Center, go to Quarantine and delete/restore/download the file. 13. Go to Reports and create new scheduled reports: Now, Daily, Weekly, Monthly. 14. Go to Dashboard and customize it: 15. Go to Logs and check your actions in Control Center. 5
Use Case 5 Existing Customer Adopts Virtualization (Citrix XenServer) protection to virtual machines within their recently implemented virtualized environment (Citrix XenServer). 2. Go to Settings -> Virtualization and add a new virtual server. 3. Go to Accounts, edit an administrator user and grant the user access permissions over Virtual Machines, with the new server set as target. 4. Log out and then log in to the Control Center web interface with the username and 5. Go to Network and install a Security Virtual Appliance (SVA) on a host. 6. Go to Network -> Packages and add (customize) a Silent Agent installation package. 7. Download and install the Silent Agent on a virtual machine. 8. Go to Network, select a virtual machine and perform an installation task (note the need to add credentials). 9. From the Network section: a. Check XenServer inventory. b. Change views. c. Assign a Scan task and check the scan report. d. Assign an Update task. 10. Go to Policies and create a new template policy. 11. Go to Network and assign the new policy to a specific host. 12. Test the Quarantine feature: a. On a protected machine, try to download an Eicar test file from: c. In Control Center, go to Quarantine and delete/restore/download the file. 13. Go to Reports and create new scheduled reports: Now, Daily, Weekly, Monthly. 14. Go to Dashboard and customize it: 15. Go to Logs and check your actions in Control Center. 6
Use Case 6 Existing Customer Secures Mobile Devices protection to the mobile devices of its employees. 2. Go to Accounts and create a new user (or edit an existing user), granting the user Administrator permissions over Mobile Devices (with access to all users). 3. Log out and then log in to the Control Center web interface with the username and 4. Go to Network and add a new device to a user. 5. The Admin or the user installs the GravityZone Mobile Client on the device (from App Store / Play Market), launches it, then enters the activation code or scans the QR code (available on the user s email or on the mobile device properties). 6. Device is now active and can be controlled from the Control Center. 7. Go to Policies and create a new template policy. 8. Go to Network and assign the new policy to a user or a group of users. Use Case 7 Company Employee Loses Mobile Device Description: A company employee reports to the IT department that his company s mobile device was stolen. The mobile device is protected by Bitdefender. 1. The IT admin with administrator permissions over Mobile Devices logs in to the Control Center web interface. 2. From the Network section: a. Lock the device. b. Locate the device in order to identify if it is really stolen. c. Wipe data on the device. 7