Created on 
    
	
		
		
		01-23-2025
	
		
		01:20 AM
	
	
	
	
	
	
	
	
	
	
	
	
	
	
  Edited on 
    
	
		
		
		10-17-2025
	
		
		03:30 AM
	
	
	
	
	
	
	
	
	
	
	
	
	
	
 By  
				
		
		
			mdeparisse_FTNT
		
		
		
		
		
		
		
		
	
			 
		
This article describes how to investigate if FortiSIEM Windows Agent spikes high CPU utilization on Windows servers.
Windows Agent v4.4.x, v5.x, v7.x.x, v7.1.x, v7.2.x. Supervisor and Collector v6.x, v7.x, v7.1.x, v7.2.x.
FortiSIEM Agents are designed to be lightweight and not consume more than 5% of a system's CPU and memory.
Ensure that the system has met the pre-requisite defined in the Windows Agent Installation Guide and FortiSIEM Version Compatibility Matrix as per the installed agent version.
On the Windows server navigate to Windows Event Viewer -> Application, System, and Security logs. Check if any event is generated by the FortiSIEM agent.
On the Windows server navigate to Windows Event Viewer -> Application, System, and Security logs. Assess for any unusually high number of events. In this case, fine-tune the system audit policies and analyze what is triggering such a high event rate.
Investigate from the FortiSIEM Analytics tab to find out which event type count is maximum.
Run a historical search for 10mins or 1 hour :
Filters: Reporting IP = <Windows-IP> AND System Event Category BETWEEN 0,6
Display conditions: Reporting IP , Event Name , Count(Matched Events)
Export a 10-60 minutes duration report and review.
Temporarily exclude the high event type eventID from Windows Agent Template and click Apply on Template, to observe if system utilization has restored to normal. Later evaluate if still the event is required in FortiSIEM or can reduce the occurrence on Windows server.
Probe for any errors in Agent logs from the Windows server located in C:\ProgramData\FortiSIEM\Agent\Logs\.
Probe for any errors in FortiSIEM collector logs phAgentManager process :
cat /opt/phoenix/log/phoenix.log | grep -i phAgentManager
Inspect Network Connectivity between the Windows server and collector for any latency.
Verify if large events are cached on the Windows server. The cache for the Windows agent is stored in the following directory:
C:\ProgramData\AccelOps\Agent\Database\AoWinAgt.db
If still issue persists then contact Fortinet Support with all the above details.
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.