A minimum of four CPUs are required. This allows the server to reserve CPUs for snort and other processes. If scanning is attempted on appliances with less than four cores, scans will run but will also likely impact performance, particularly from the intrusion detection application of Alert Logic® Threat Manager™. The vulnerability scanning engine will, however, only ever use a single core, so there is no advantage to running an 8 core box for scanning purposes.
Articles in this section
- Can Threat Manager scan in Amazon Web Services environments?
- Can vulnerability scanning credentials be defined based on an SSH key versus username and password?
- Does Alert Logic offer penetration testing?
- Does Alert Logic perform CIS Benchmark scans?
- Does Alert Logic provide a Web Application Security (WAS) scan?
- Does Cloud Insight scan Docker's application containers?
- How do I ignore a vulnerability that does not apply to my host?
- How do I set up a scan?
- How does CloudTrail consolidation affect install, especially if performing a self-service install via alertlogic.com?
- How many CPUs are required on a Threat Manager appliance to enable internal vulnerability scanning?