The following Commvault Threat Scan requirements are for software-managed deployments and SaaS deployments where customer-managed storage is configured as a scan target.
Note
When Threat Scan plans are configured to use Commvault-managed storage (default configuration), the threat scanning infrastructure is fully provisioned and operated by Commvault; no additional infrastructure or deployment steps are required.
If you configure a plan to scan customer-managed storage (cloud or on-premises), you must deploy new access nodes or reuse existing backup access nodes with the required components, according to the software deployment requirements shown below or reuse existing backup access nodes.
License Requirements
- Commvault Threat Scan license
Threat Scan Server Requirements
-
Set up a server used for scanning data.
-
For Windows VM workloads, set up a Windows Threat Scan server.
-
For Linux VM workloads, set up a Linux Threat Scan server.
Hardware Requirements
|
Component |
System Limits |
|
|---|---|---|
|
Source data size per node |
200 TB |
400 TB |
|
Objects per node (estimated based on an average file size of 2 MB) |
100 million |
200 million |
|
Average file size |
2 MB |
2 MB |
|
CPU or vCPU |
16 cores |
32 cores |
|
RAM |
32 GB |
64 GB |
|
Index disk space 1 (SSD class disk recommended) |
1 TB |
2 TB |
1 Not applicable for VM scans.
Note
-
File indexing and Threat Analysis processes do not recognize when backup operations are running on proxies. Because these processes are resource-intensive, they can negatively impact backup performance and delay job completion. To avoid performance issues, do not overlap proxies used for Threat Analysis jobs with those used for backup jobs. The access nodes defined at the Threat Analysis plan level should be different from the proxies configured for backups (defined at the hypervisor or VM group level).
-
To scale for larger configurations, you can add additional nodes, but you must ensure that the nodes are running the same OS. For more information, see Adding a Node to the Index Server.
-
The maximum size of file that can be analyzed is 50 MB.
-
This is not applicable for VM scans.
Software Requirements
Linux
-
Red Hat Enterprise Linux/CentOS 7.3 or a more recent version.
-
Rocky Linux 8.x, Rocky Linux 9.x
-
Ubuntu 22.04, Ubuntu 24.04
Windows
- Windows Server 2016 or a more recent version.
Package Requirements
Deploy the following packages on Threat Scan servers:
-
Content Extractor
-
Index Gateway
-
MediaAgent
-
Threat Analysis
-
Virtual Server Agent
Virtual Server Agent Requirements
-
Threat Analysis supports Linux virtual machines (including FreeBSD) that use UFS and ZFS file systems via Ubuntu 24.x access nodes.
-
For ZFS file systems, Rocky Linux and RHEL access nodes are also supported. Ensure that ZFS is installed on any access node used for ZFS backups.
Advanced Requirements
For additional Threat Scan configuration information, see Commvault Threat Scan - Advanced Requirements.