A cloud-native solution that protects workloads across hybrid and multi-cloud environments with threat detection and security recommendations
wdavdaemon cpu usage issue and possible tuning point
Environment Summary
- Platform: Azure VM
- OS: RHEL 9.4
- Protection: Microsoft Defender for Servers (via Defender for Cloud)
- Process: Microsoft Defender for Endpoint for Linux (mdatp / wdavdaemon)
- Symptom: Periodic CPU spikes from wdavdaemon during early morning hours
Q1. Is it expected behavior for wdavdaemon on Linux to periodically consume ~10–20% CPU during off‑peak hours (e.g., early morning), assuming no active malware detection events? Is this typically associated with:
Scheduled/background scans?
Signature updates followed by housekeeping scans?
File system event processing?
Under what conditions should this be considered abnormal and require remediation?
Q2. We observed that after downsizing the VM SKU from 8 vCPU → 4 vCPU, the average CPU percentage used by wdavdaemon decreased (approx. 20% → 10%). Is wdavdaemon designed to scale CPU usage based on available vCPU count, or does it use a fixed / capped internal concurrency model?
Can lower average CPU % on smaller SKUs be explained by:
Shorter execution bursts?
Thread/concurrency limits?
Differences in how CPU % is calculated on Azure?
We want to confirm whether this observation aligns with expected product behavior.
Q3. For Linux (RHEL 9.4), what supported tuning options are recommended to reduce CPU impact from wdavdaemon while keeping protection enabled?
Microsoft Security | Microsoft Defender | Microsoft Defender for Cloud
2 answers
Sort by: Most helpful
-
Deleted
This answer has been deleted due to a violation of our Code of Conduct. The answer was manually reported or identified through automated detection before action was taken. Please refer to our Code of Conduct for more information.
Comments have been turned off. Learn more
-
Deleted
This answer has been deleted due to a violation of our Code of Conduct. The answer was manually reported or identified through automated detection before action was taken. Please refer to our Code of Conduct for more information.
Comments have been turned off. Learn more