One aspect of the present invention can include a method for restricting
resources consumed by ghost agents. The method can include the step of
associating a ghost agent with a host. A resource utilization value can
be ascertained for the ghost agent and the host combined. The ascertained
resource utilization value can be compared with a usage threshold. A
determination can be made as to whether operations of the ghost agent are
to be executed based upon the previous comparison.