Topics on this page
Sizing
Sizing guidelines for Workload Security deployments vary by the scale of your network, hardware, and software.
Agent and relay sizing
Guidance for processor, memory and disk space allocation has been moved to system requirements.
Estimated Agent resource consumption
The following tables show the estimated resource consumption for deployments using commonly used feature combinations.
Windows Agent
Modules enabled | RAM | |||||||
Anti-Malware | Web Reputation Service | Activity Monitoring | Application Control | Integrity Monitoring | Log Inspection | Firewall | Intrusion Prevention | |
✔ | 156 MB | |||||||
✔ | 148 MB | |||||||
✔ | ✔ | ✔ | 150 MB | |||||
✔ | ✔ | ✔ | ✔ | 308 MB | ||||
✔ | ✔ | ✔ | ✔ | 280 MB | ||||
✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | 390 MB | |
✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | 361 MB |
Linux Agent
Modules enabled | RAM | |||||||
Anti-Malware | Web Reputation Service | Activity Monitoring | Application Control | Integrity Monitoring | Log Inspection | Firewall | Intrusion Prevention | |
✔ | 315 MB | |||||||
✔ | ✔ | 172 MB | ||||||
✔ | ✔ | 399 MB | ||||||
✔ | ✔ | ✔ | 312 MB | |||||
✔ | ✔ | ✔ | ✔ | 448 MB | ||||
✔ | ✔ | ✔ | ✔ | 413 MB | ||||
✔ | ✔ | ✔ | ✔ | ✔ | ✔ | 492 MB | ||
✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | 538 MB |