What this integration is
This integration ingests Bitdefender GravityZone security events into your SIEM stack using GravityZone’s Event Push Service. In SOCFortress CoPilot deployments, Bitdefender typically pushes events to a small HTTP receiver/connector, which then forwards them to Graylog over syslog.Data path (how it flows)
- Bitdefender GravityZone (cloud) → Event Push Service
- Event Push Service → CoPilot-hosted HTTP receiver (connector)
- Receiver → Graylog input (syslog)
- Graylog → stream/index/dashboards (provisioned)
- Optional: Graylog alerting → Incident ingestion (if configured)
Prerequisites
- Bitdefender API access is enabled and an API client is created.
- Network path is in place so Bitdefender can reach your HTTP receiver.
- You have a target syslog host/port (Graylog input).
- Event Push Service API connector (CEF): https://www.bitdefender.com/business/support/en/77209-144080-build-an-event-push-service-api-connector-for-cef-standard.html
Credentials & configuration you’ll need
From Bitdefender:- API credentials / auth string (connector uses an
authentication_string)
- Graylog host + port (syslog target)
- A public-facing DNS/port so Bitdefender can deliver events to the receiver
CoPilot setup (recommended workflow)
- Provision the customer first (so the tenant wiring exists).
- In CoPilot, open the customer and add the Bitdefender integration.
- Enter the required configuration values.
- Deploy/start the Bitdefender connector container generated during provisioning.
- Graylog CEF/syslog input
- Graylog stream + index
- Grafana datasource + dashboards
- Bitdefender docker compose + config
Deployment notes (connector container)
In a standard layout, provisioning creates a customer-specific folder under:/opt/CoPilot/data/data/<CUSTOMER_NAME>/
Success criteria
- Bitdefender events are arriving in Graylog
- Events are routed to the customer’s index/stream
- Dashboards show non-empty data (after a short delay)
Troubleshooting
- Verify inbound firewall/NAT allows Bitdefender → HTTP receiver traffic.
- Verify the receiver can reach Graylog syslog input (host/port).
- Validate TLS cert/key configuration if
secure.enabled=true. - Confirm auth string matches what Bitdefender expects.
