Table of contents

Sizing

Sizing guidelines for Workload Security deployments vary by the scale of your network, hardware, and software.

Agent and relay sizing

Guidance for processor, memory and disk space allocation has been moved to system requirements.

Estimated Agent resource consumption

The following tables show the estimated resource consumption for deployments using commonly used feature combinations.

Windows Agent

Modules enabled RAM
Anti-Malware Web Reputation Service Activity Monitoring Application Control Integrity Monitoring Log Inspection Firewall Intrusion Prevention
156 MB
148 MB
150 MB
308 MB
280 MB
390 MB
361 MB

Linux Agent

Modules enabled RAM
Anti-Malware Web Reputation Service Activity Monitoring Application Control Integrity Monitoring Log Inspection Firewall Intrusion Prevention
315 MB
172 MB
399 MB
312 MB
448 MB
413 MB
492 MB
538 MB