Device Integration: Bitdefender GravityZone via Http Listener

Modified on Sun, 12 Apr at 11:03 PM

TABLE OF CONTENTS


Prerequisite


34.159.83.241


34.159.47.15


34.159.150.228


34.85.152.87


34.85.155.173


  • As CCE is on private network, we have to use Firewall Public IP. Therefore, the request will come on firewall's Public IP from Bitdefender GravityZone (from one of above whitelisted IPs) then will be forwarded to CCE IP on 63514 TCP port.



Enable Http Listener on CCE

  • Login to CCE machine, then go inside build directory and run ./setup.sh -http then provide yes to enable it.
  • You will get one-time basic authorization header token for http listener copy it in a text file for future usage (As Example shown in below SS)  



Generate API Token from Bitdefender GravityZone

  • API credentials can be generated from MyAccount > Control Center API 
  • Copy the API Token and API URL both in a text file.
  • On CCE run the following command echo -n '<api-token>: ' | base64 -w 0 to generate base64 encoded value of Bitdefender API Token (As Example shown in below SS) and save the output in a text for future usage. 




Configure Bitdefender GravityZone to send logs on CCE's Http Listener

  • Update the following command with correct details (i.e., bitdefender-api-host, BitDefenderGZ_Base64_Token, Firewall-Public-IP, and CCE_Authorization_Basic_Token)  and execute it on CCE host to configure http listener details from Bitdefender GravityZone side -


curl -k -X POST \
https://bitdefender-api-host/api/v1.0/jsonrpc/push \
-H 'authorization: Basic BitDefenderGZ_Base64_Token' \
-H 'cache-control: no-cache' \
-H 'content-type: application/json' \
-d '{"params": {"status": 1, "serviceType": "cef", "serviceSettings": {"url": "https://Firewall-Public-IP:63514/api/bitdefender", "authorization": "Basic CCE_Authorization_Basic_Token", "requireValidSslCertificate": false}, "subscribeToEventTypes": {"hwid-change": true, "modules": true, "sva": true, "registration": true, "supa-update-status": true, "av": true, "aph": true, "fw": true, "avc": true, "uc": true, "dp": true, "device-control": true, "sva-load": true, "task-status": true, "exchange-malware": true, "network-sandboxing": true, "malware-outbreak": true, "adcloud": true, "exchange-user-credentials": true, "exchange-organization-info": true, "hd": true, "antiexploit": true} }, "jsonrpc": "2.0", "method": "setPushEventSettings", "id": "1"}' | jq
  • If configuration done successfully you can get JSON response as example shown in below SS



  • To view the configuration, update the following command with correct details (i.e., bitdefender-api-host and BitDefenderGZ_Base64_Token) and run the following command you may see details in JSON -


curl -k -X POST https://bitdefender-api-host/api/v1.0/jsonrpc/push -H 'authorization: Basic BitDefenderGZ_Base64_Token' -H 'cache-control: no-cache' -H 'content-type: application/json' -d  '{"params": {}, "jsonrpc": "2.0", "method": "getPushEventSettings", "id": "2"}' | jq


  • Once configuration done successfully then you may start getting logs. 
  • Verify on Logs/Flow Screen (as tag: bitdefendergz) or on Deep Tracker (as Source_data_type: Bitdefender GravityZone)

Was this article helpful?

That’s Great!

Thank you for your feedback

Sorry! We couldn't be helpful

Thank you for your feedback

Let us know how can we improve this article!

Select at least one of the reasons
CAPTCHA verification is required.

Feedback sent

We appreciate your effort and will try to fix the article