Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

Need some advice about best practice approach for scheduling Anti-Virus scan using Trend Micro OfficeScan 10.6 SP2

Posted on 2013-12-26
2
Medium Priority
?
761 Views
Last Modified: 2014-01-08
Environment: Running 4 ESX Host with about 20 VM's (Windows Server) on each host. Each ESX host has 16 CPUs x 2.26 GHz, with 262130.80 MB of RAM.

Anti-Virus Solution: Trend Micro Enterprise Security Suite. Primarily using OfficeScan for servers.

Questions:
1. What is the best approach for scheduling a scan? When should I schedule a scan to all VMs, and how often?
2. If I run all scan at once? Will that slow down the network or use up all resources as specified above? Is what I have enough to run all scans at once, or should I set different scan schedules?
3. Is there any videos online that will show me how to do the basic administration with OfficeScan? Basically I want videos that show me how to configure Server-client (endpoints) configuration using the Office Scan web console.
0
Comment
Question by:jaedenone
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 23

Accepted Solution

by:
Patrick Bogers earned 1500 total points
ID: 39741333
Hi,

1) it depends, are the VM's used to write to a lot? Scan them oftem during non-peak hours.
If the VM's are more read-only servers scan them full once a week and quick on remaining days.
2) Yes scanning requires a lot of read IOPS so prevent them scanning all at once. Have 3 or 4 scan at once and monitor your disk usage to get a good balance.
You definatelly should have spread scanning in place.
3) This youtube movie shows basic administration for the Office Scan console. Off course youtube has a lot more videos that might interest you.
0
 
LVL 24

Expert Comment

by:Mohammed Hamada
ID: 39747714
0

Featured Post

Cyber Threats to Small Businesses (Part 2)

The evolving cybersecurity landscape presents SMBs with a host of new threats to their clients, their data, and their bottom line. In part 2 of this blog series, learn three quick processes Webroot’s CISO, Gary Hayslip, recommends to help small businesses beat modern threats.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article investigates the question of whether a computer can really be cleaned once it has been infected, and what the best ways of cleaning a computer might be (in this author's opinion).
After seeing many questions for JRNL_WRAP_ERROR for replication failure, I thought it would be useful to write this article.
This tutorial will walk an individual through locating and launching the BEUtility application to properly change the service account username and\or password in situation where it may be necessary or where the password has been inadvertently change…
This tutorial will walk an individual through the steps necessary to join and promote the first Windows Server 2012 domain controller into an Active Directory environment running on Windows Server 2008. Determine the location of the FSMO roles by lo…

618 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question