Directly contact our Support Team

Bitdefender enforces HTTPS protocol for Security Server updates

Starting July 30th 2020, Bitdefender enforces in GravityZone the use of the HTTPS protocol for Security Server updates from Bitdefender fallback update servers. The fallback location of Bitdefender update servers will only be accessible via HTTPS.

GravityZone Cloud

HTTPS enforcement affects Bitdefender Security Server (Multi-Platform), GravityZone services like Security for Virtualized Environments (SVE) and Security for Storage, and the behavior of the Use Bitdefender Public Update Server as fallback option from the General > Update section in the policy settings.

To comply with this change, make sure that your network firewalls allow traffic to the following addresses:

  • upgrade.bitdefender.com on TCP port 443
  • download.bitdefender.com on TCP port 443

This change does not affect Security Server updates from Bitdefender Endpoint Security Tools with Relay role.

No security policy reconfiguration is required.

GravityZone On-premises

HTTPS enforcement affects all Bitdefender Security Servers (Multi-Platform, NSX-T, NSX-V, and vShield) and GravityZone services like Bitdefender Hypervisor Introspection (HVI), Security for Virtualized Environments (SVE) and Security for Storage, and the behavior of the Use Bitdefender Public Update Server as fallback option from the General > Update section in the policy settings.

To comply with this change, make sure that your network firewalls allow traffic to the following addresses:

  • upgrade.bitdefender.com on TCP port 443
  • update-onprem.2d585.cdn.bitdefender.net on TCP port 443
  • download.bitdefender.com on TCP port 443

This change does not affect Security Server updates from local Bitdefender update servers, such as GravityZone virtual appliance with Update Server role and Bitdefender Endpoint Security Tools with Relay role.

No security policy reconfiguration is required.


Rate this article:

Submit