Solved

Need some advice about best practice approach for scheduling Anti-Virus scan using Trend Micro OfficeScan 10.6 SP2

Posted on 2013-12-26
2
715 Views
Last Modified: 2014-01-08
Environment: Running 4 ESX Host with about 20 VM's (Windows Server) on each host. Each ESX host has 16 CPUs x 2.26 GHz, with 262130.80 MB of RAM.

Anti-Virus Solution: Trend Micro Enterprise Security Suite. Primarily using OfficeScan for servers.

Questions:
1. What is the best approach for scheduling a scan? When should I schedule a scan to all VMs, and how often?
2. If I run all scan at once? Will that slow down the network or use up all resources as specified above? Is what I have enough to run all scans at once, or should I set different scan schedules?
3. Is there any videos online that will show me how to do the basic administration with OfficeScan? Basically I want videos that show me how to configure Server-client (endpoints) configuration using the Office Scan web console.
0
Comment
Question by:jaedenone
2 Comments
 
LVL 19

Accepted Solution

by:
Patricksr1972 earned 500 total points
ID: 39741333
Hi,

1) it depends, are the VM's used to write to a lot? Scan them oftem during non-peak hours.
If the VM's are more read-only servers scan them full once a week and quick on remaining days.
2) Yes scanning requires a lot of read IOPS so prevent them scanning all at once. Have 3 or 4 scan at once and monitor your disk usage to get a good balance.
You definatelly should have spread scanning in place.
3) This youtube movie shows basic administration for the Office Scan console. Off course youtube has a lot more videos that might interest you.
0
 
LVL 23

Expert Comment

by:Mohammed Hamada
ID: 39747714
0

Featured Post

Best Practices: Disaster Recovery Testing

Besides backup, any IT division should have a disaster recovery plan. You will find a few tips below relating to the development of such a plan and to what issues one should pay special attention in the course of backup planning.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Operating system developers such as Microsoft (https://www.microsoft.com) and Apple have made incredible strides in virus protection over the past decade. Operating systems come packaged with built in defensive tools such as virus protection and a f…
You cannot be 100% sure that you can protect your organization against crypto ransomware but you can lower down the risk and impact of the infection.
This tutorial will give a short introduction and overview of Backup Exec 2012 and how to navigate and perform basic functions. Click on the Backup Exec button in the upper left corner. From here, are global settings for the application such as conne…
To efficiently enable the rotation of USB drives for backups, storage pools need to be created. This way no matter which USB drive is installed, the backups will successfully write without any administrative intervention. Multiple USB devices need t…

785 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question