To improve system resources utilization on the agent, you can optimize these performance-related
settings according to best practices.
See also:
Minimize disk usage
Reserve an appropriate amount of disk space for storing identified malware files.
The space that you reserve applies globally to all computers: physical machines and
virtual machines. The setting can be overridden at the policy level and at the computer
level.
TipAlerts are raised when there is not enough disk space to store an identified file.
|
Procedure
- Open the policy or computer editor that you want to configure.
- Click .
- Under Identified Files, clear Default.
- Specify the disk space to use in the Maximum disk space used to store identified files box.
- Click Save.
What to do next
Optimize CPU usage
-
Exclude files from real-time scans if they are normally safe but have high I/O, such as databases, Microsoft Exchange quarantines, and network shares (on Windows, you can use procmon to find files with high I/O). See Exclusions.
-
Do not scan network directories. See Scan a network directory (real-time scan only).
-
Do not use Smart Scan if the computer doesn't have reliable network connectivity to the Trend Micro Smart Protection Network or your Smart Protection Server. See Smart Protection in Server & Workload Protection.
-
Reduce the CPU impact of malware scans by setting CPU Usage to Medium (Recommended; pauses between scanning files) or Low (pauses between scanning files for a longer interval than the medium setting).
Note
Modification of CPU usage is only available for Manual and Scheduled scans.a. Open the properties of the malware scan configuration. b. On the Advanced tab, select the CPU Usage during which scans run. c. Click OK. -
Create a scheduled task to run scans at a time when CPU resources are more readily available. See Schedule Server & Workload Protection to perform tasks.
-
Reduce or keep small default values for the maximum file size to scan, maximum levels of compression from which to extract files, maximum size of individual extracted files, maximum number of files to extract, and OLE Layers to scan. See Scan for specific types of malware.
WARNING
Most malware is small, and nested compression indicates malware. But if you don't scan large files, there is a small risk that Anti-Malware won't detect some malware. You can mitigate this risk with other features such as integrity monitoring. See Set up Integrity Monitoring. -
Use multi-threaded processing for manual and scheduled scans (real-time scans use multi-threaded processing by default). Multi-threaded processing is effective only on systems that support this capability. To apply the setting, after you have enabled it, restart the computer.
Note
Do not enable multi-threaded processing under the following circumstances:- Resources are limited (for example, CPU-bound tasks)
- Resources should be held by only one operator at a time (for example, IO-bound tasks)
a. Click Policies. b. Double-click to open the policy where you want to enable multi-threaded processing. c. Click. d. In the Resource Allocation for Malware Scans section, select Yes. e. Restart the computers on which you enabled multi-threaded processing for the setting to take effect.Note
Multi-threaded processing may reduce the number of CPU cores available at a given time to the computer's other processes.- When Resource Allocation for Malware Scans is enabled, the CPU usage setting is ignored even if set to Medium or Low.
Optimize RAM usage
-
Reduce or keep small default values for the maximum file size to scan, maximum levels of compression from which to extract files, maximum size of individual extracted files, maximum number of files to extract, and OLE Layers to scan. See Scan for specific types of malware.
WARNING
Most malware is small, and nested compression indicates malware. But if you don't scan large files, there is a small risk that Anti-Malware won't detect some malware. You can mitigate this risk with other features such as integrity monitoring. See Set up Integrity Monitoring.