Directly contact our Support Team

Installing Bitdefender Security Server in Microsoft Azure

GravityZone is a business security solution built from ground-up for virtualization and cloud to deliver security services to physical endpoints, mobile devices, virtual machines in private, public cloud and Microsoft Exchange mail servers.

The Bitdefender Security Server is a dedicated virtual machine that deduplicates and centralizes most of the antimalware functionality of antimalware agents, acting as a scan server.

The Security Server virtual appliance is available in several formats, compatible with the main virtualization platforms (OVA, XVA, VHD, OVF, RAW). Other platforms may support these formats, but under certain conditions. For example, the Security Server VHD file is compatible with Microsoft Azure only by following a special deployment process, apart from the one described in the GravityZone Installation Guide.

This article shows you how you can install Security Server in Microsoft Azure.

  1. Download the Security Server virtual appliance image (VHD file) from the Packages page of GravityZone Control Center to C:\vhd.
  2. Resize the appliance to a supported Azure filesize:
    Resize-VHD -Path C:\vhd\Bitdefender_SVE-SVA-Multi-Platform.vhd -SizeBytes 21GB
  3. Prepare PowerShell for Azure:
    Install-Module AzureRM
  4. Upload the file to Azure:
    $resourceGroupName = "Resources"
    $recreatedVhd = "C:\vhd\Bitdefender_SVE-SVA-Multi-Platform.vhd"
    $destinationVhd = ""
    Add-AzureRmVhd -LocalFilePath $recreatedVhd -Destination $destinationVhd -ResourceGroupName $resourceGroupName -NumberOfUploaderThreads 5
    note Note:
    • Azure supports only fixed sized VHD files. Add-AzureRmVhd commandlet takes the dynamic size VHD file and uploads it as a fixed size.
    • Please note that $destinationVhd is a custom path. Make sure to choose a valid path in your Azure environment.
  5. Create the virtual machine in Azure:
    1. Get the network to be attached to the VM:
      $virtualNetworkName = "Resources-vnet"
      $locationName = "westeurope"
      $virtualNetwork = Get-AzureRmVirtualNetwork -ResourceGroupName $resourceGroupName -Name $virtualNetworkName
      note Note:
      Depending on your Azure setup, you may need to use other values for the above mentioned variables.
    2. Configure public IP:
      $publicIp = New-AzureRmPublicIpAddress -Name "SVASrv" -ResourceGroupName $ResourceGroupName -Location $locationName -AllocationMethod Dynamic
      $networkInterface = New-AzureRmNetworkInterface -ResourceGroupName $resourceGroupName -Name "SVASrv-Interface" -Location $locationName -SubnetId $virtualNetwork.Subnets[0].Id -PublicIpAddressId $publicIp.Id
    3. Configure VM settings:
      $vmConfig = New-AzureRmVMConfig -VMName "SVASrv" -VMSize "Standard_DS1"
      $vmConfig = Set-AzureRmVMOSDisk -VM $vmConfig -Name "SVASrv" -VhdUri $destinationVhd -CreateOption Attach –Linux
      $vmConfig = Add-AzureRmVMNetworkInterface -VM $vmConfig -Id $networkInterface.Id
    4. Create the VM in Azure:
      $vm = New-AzureRmVM -VM $vmConfig -Location $locationName -ResourceGroupName $resourceGroupName
  6. Configure Security Server to connect to GravityZone:
    1. Connect to the Security Server appliance via SSH.
    2. Log in with default credentials.
    3. Run the Security Server setup:
      # /usr/bin/sva-setup
    4. Select option 3 Communication Server configuration from the menu.
    5. Choose the on-premises option as the server type, when prompted.
    6. Depending on the GravityZone platform you use, configure the following details:
      • For GravityZone On-Premises, enter the IP and the port number of the Communication Server to which the Security Server should connect, followed by port 8443.
      • For GravityZone Cloud, add the Cloud Communication Server address depending on your company location:
        • EU:
        • US:

        Also, select option 4 Configure the client ID and enter your company ID.

    7. Select Ok to confirm your action.

Rate this article: