Workload Security on Linux allows you to define how much CPU Deep Security Agent can
use.
This functionality is only available if Application Control is disabled. If Application
Control is enabled, the agent is forced into an unlimited CPU usage and a warning
is displayed on Overview > General.
Before defining CPU usage by the agent, you should check the cgroups CPU support status
with your Linux operating system provider.
You can configure CPU usage via the Workload Security console, as follows:
- Open the Computer where you want to enable the agent CPU usage control.
- Click .
- Under CPU Usage Control, select either a specific percentage or Unlimited. Note that setting this to any value other than Unlimited has a negative impact on performance during detection.
There is a backward compatibility with the earlier agent versions (see Legacy implementation):
CPU usage range
|
CPU usage label (legacy)
|
5% ~ 50%
|
Extremely Low
|
55% ~ 95%
|
Low
|
Unlimited
|
Unlimited
|
Legacy implementation
The Workload Security agent CPU usage control was available for earlier versions of
Linux agents with Anti-Malware and Activity Monitoring enabled.
The protection levels were the following:
Extremely Low
Function
|
Protection details
|
Limitations
|
Anti-Malware
|
Asynchronous deferred real-time scan for newly created and modified files.
|
Cannot be enabled or disabled for Predictive Machine Learning and Behavior Monitoring
via
. |
Activity Monitoring
|
Loss of activity logs of the busiest events based on their environment if the CPU
usage is higher than 10%.
|
Low
Function
|
Protection details
|
Limitations
|
Anti-Malware
|
Synchronous real-time scan for newly created and modified files within a certain time
period as well as executable files.
|
|
Activity Monitoring
|
Loss of activity logs of the busiest events based on their environment if the CPU
usage is higher than 40%.
|
Unlimited
Function
|
Protection details
|
Limitations
|
Anti-Malware
|
Full protection via a real-time scan (default).
|
|
Activity Monitoring
|
No loss of activity logs of busiest events.
|