This knowledge base article outlines the actions required on the customer side to enable the Bitdefender GravityZone integration and Security Telemetry forwarding to the SIEM environment.
To complete the Bitdefender integration, there are two separate data flows that may be used:
SOCFortress can prepare the Graylog inputs, parsing, and dashboards, but the customer is responsible for the Bitdefender-side configuration, DNS, firewall changes, and endpoint rollout.
Create a public DNS record that points to the public IP address of the firewall sitting in front of the SIEM environment.
Example:
firehose.your_domain.com
This is required so Bitdefender GravityZone can send traffic to a public, reachable hostname.
Create the required firewall/NAT rule(s) so incoming Bitdefender traffic is forwarded to the appropriate internal SIEM host.
Based on the implementation discussed, the customer needed to forward the following:
copilot_ip:5557
Important: If your deployment uses different internal IPs or ports, use the values provided by SOCFortress for your environment.
If your firewall policy restricts inbound traffic by source IP, make sure the required Bitdefender Event Push Service source IPs are allowed. Bitdefender documents these IPs in their setPushEventSettings article and states they must be whitelisted to ensure communication between GravityZone and the SIEM/HTTP collector.
Bitdefender reference:https://www.bitdefender.com/business/support/en/77209-135319-setpusheventsettings.html
https://www.bitdefender.com/business/support/en/77209-135319-setpusheventsettings.html
Bitdefender-documented source IPs at the time of writing:
34.148.142.174
34.126.111.12
34.48.74.208
35.198.138.109
35.246.228.213
35.234.118.64
34.159.83.241
34.159.47.15
Note: Bitdefender may update these IPs over time, so always validate against the Bitdefender article above before implementing or troubleshooting the integration.
In the Bitdefender GravityZone console, create or update the forwarding configuration so events are sent to the hostname and port provided by SOCFortress.
Security Telemetry forwarding example:
5557
SOCFortress will confirm the correct destination settings for the standard SIEM feed and the Security Telemetry feed.
When first enabling the Security Telemetry forwarding, enable the Ignore SSL Errors option in Bitdefender GravityZone.
This helps validate connectivity and confirm the incoming message structure during initial setup. Once the connection and certificates are confirmed working as expected, SOCFortress can advise whether this setting should remain enabled.
For the Bitdefender integration to work properly, the customer must provide a reachable public DNS record, configure the necessary firewall rules, whitelist the Bitdefender Event Push Service source IPs if filtering is enabled, enable forwarding in GravityZone, roll out Security Telemetry to endpoints, and provide VPN access if dashboard development is requested. Once those pieces are in place, SOCFortress can complete the ingestion, parsing, normalization, and dashboard work.
Was this article helpfu?
Thank you for voting
You are related to multiple companies. Please select the company you wish to login as.