All Systems Operational

GravityZone Control Center Single Sign-On (gravityzone.bitdefender.com) Operational
GravityZone Cloud Instance 1 (cloudgz.gravityzone.bitdefender.com) Operational
Management Console Operational
GravityZone -> Endpoint Communication Operational
Licensing Operational
API Operational
GravityZone Cloud Instance 2 (cloud.gravityzone.bitdefender.com) Operational
Management Console Operational
GravityZone -> Endpoint Communication Operational
Licensing Operational
API Operational
GravityZone Cloud Instance 3 (cloudap.gravityzone.bitdefender.com) Operational
Management Console Operational
GravityZone -> Endpoint Communication Operational
Licensing Operational
API Operational
Bitdefender Endpoint Security Tools Operational
Windows Operational
Linux Operational
macOS Operational
Operational
Degraded Performance
Partial Outage
Major Outage
Maintenance
Jun 19, 2025

No incidents reported today.

Jun 18, 2025

No incidents reported.

Jun 17, 2025

No incidents reported.

Jun 16, 2025

No incidents reported.

Jun 15, 2025

No incidents reported.

Jun 14, 2025

No incidents reported.

Jun 13, 2025
Resolved - On 13 June 2025, Bitdefender identified and promptly addressed a false positive detection generated by Bitdefender Endpoint Security Tools (BEST) for Windows. An analytical signature, originally introduced to detect the “Poweliks” malware family, was triggered by a new Microsoft Windows compatibility script, used during a particular Microsoft Windows KB update. As a result, BEST may have blocked the corresponding powershell.exe process started for the compatibility script, on some endpoints.

Timeline


00:35 UTC – Automated monitoring systems detected an unusual spike in PowerShell detections.

02:50 UTC – Root cause identified; emergency fix prepared.

03:17 UTC – Corrective signature created and tested.

03:58 UTC – Corrected signature update released to all update channels. Protection remained uninterrupted throughout the incident.

Impact

The detection interrupted only the Microsoft compatibility script; there was no data loss, service disruption, or security exposure.

Resolution

The faulty signature was disabled shortly via an incremental update.

Preventive Actions

Bitdefender is enhancing its automated response mechanisms for interpreter based detections and refining regression test coverage to prevent similar occurrences.

Customer Action

No action is required. Please ensure that your endpoints have received the latest signature update dated 13 June 2025, 06:58 UTC. If residual alerts appear, contact Bitdefender Enterprise Support.

We apologize for any inconvenience and thank you for your continued trust.

Jun 13, 04:00 UTC
Jun 12, 2025
Completed - The scheduled maintenance has been completed.
Jun 12, 09:00 UTC
In progress - Scheduled maintenance is currently in progress. We will provide updates as necessary.
Jun 12, 07:00 UTC
Scheduled - Scheduled infrastructure maintenance may temporarily affect external Identity Provider logins.
After the update IDP integrations and consequently platform login may be impacted if the certificate's fingerprint is not automatically updated in the integrated IDP. In such cases, refer to the IDP integration documentation or contact Enterprise Support.

Jun 11, 10:33 UTC
Jun 11, 2025

No incidents reported.

Jun 10, 2025

No incidents reported.

Jun 9, 2025

No incidents reported.

Jun 8, 2025

No incidents reported.

Jun 7, 2025

No incidents reported.

Jun 6, 2025

No incidents reported.

Jun 5, 2025
Completed - The scheduled maintenance has been completed.
Jun 5, 12:00 UTC
In progress - Scheduled maintenance is currently in progress. We will provide updates as necessary.
Jun 5, 07:00 UTC
Scheduled - Due to a scheduled update, Control Center will be unavailable.
For details check Release notes

May 26, 13:11 UTC