View the minimum hardware requirements for running vulnerability scans in Network Vulnerability Scanner to ensure the best performance.
To run vulnerability scans, you require one or more deployed Service Gateways with
the Network Vulnerability Scanner service installed. The recommended configuration
and virtual hardware requirements depend on the number of assets you intend to scan.
The following table details the Service Gateway hardware and configuration recommendations
for daily vulnerability scans according to asset total.
![]() |
ImportantNetwork Vulnerability Scanner is a memory-intensive service. Make sure you have sufficient
memory capacity reserved in your Service Gateways. The information presented on this
page is based on experimental results under ideal network conditions within Trend
Micro's internal network. The requirements remain the same, but results may vary when
used in your organization's environment.
|
Daily asset count
|
Recommended configuration
|
Hardware requirements
|
Less than 1,000
|
One Service Gateway using a single configured vulnerability scan
|
2 CPUs, 4 GB RAM
|
1,000 to 19,862 |
One Service Gateway using multiple configured vulnerability scans
|
2 CPUs, 4 GB RAM
|
More than 19,862
|
Multiple Service Gateways using one or more configured vulnerability scans
|
Horizontally scaled according to the number of assets scanned by each Service Gateway
|
![]() |
TipThe following tips can help you optimize scan performance:
|
The following table shows the average scan time of a single asset for each supported
platform using a single scan configuration.
![]() |
NoteActual scan durations may be longer than the times stated in the table due to information
collection and report generation. You can find the actual scan duration in the scan
report for each scan.
|
Device platform
|
Total scan time per asset in seconds
|
Linux
|
80
|
Windows
|
100
|
Cisco IOS
|
300
|
Fortinet FortiOS
|
60
|