![]() Sometimes, performance issues can't be alleviated by changing the configuration. Tuning is conducted by measuring performance for the default or existing configuration, and then modifying the configuration to improve performance and increase security. Administrators are expected to tune each instance of the real-time antimalware scanner to the needs of the specific environment. So, a real-time antimalware scanner is expected to compound the existing CPU utilization, but isn't the driving force behind system resource consumption.īecause our software exists in a diverse range of environments, it's impossible to provide a default configuration that meets the balance between protection and performance in all possible environments. If the system is idle, the scanner is idle. The real-time antimalware scanner CPU utilization is proportional to the amount of disk activity that occurs on the system. If the file is malicious, an action is taken on it. If the file isn't malicious, it's returned to the process that requested it. The scan engine then returns a decision about whether the file is malicious. This component intercepts the file and delivers it to the scan engine. ![]() All our real-time antimalware scanners operate by inserting a component that's used to monitor all disk access requests made by any process running in memory.
0 Comments
Leave a Reply. |