跳至主要內容
  • 簡單快速地下訂單
  • 檢視訂單及追蹤商品運送狀態
  • 建立並存取您的產品清單
  • 使用「公司管理」來管理您的 Dell EMC 網站、產品和產品層級連絡人。

How to Collect Logs for Dell Threat Defense

摘要: Logs may be collected for Dell Threat Defense by following these instructions.

本文可能採用自動翻譯。如果您對翻譯品質有任何寶貴意見,請使用此頁面底部的表單告訴我們,謝謝。

文章內容


症狀

Note:

This article discusses the methods for collecting Dell Threat Defense logs.


Affected Products:

Dell Threat Defense

Affected Operating Systems:

Windows
Mac


原因

Not applicable.

解析度

It is highly recommended to collect logs before troubleshooting Dell Threat Defense or contacting Dell Data Security ProSupport. For more information about contacting Dell Data Security ProSupport, reference Dell Data Security International Support Phone Numbers.

Click the appropriate operating system for more information.

A Dell Threat Defense administrator can gather either Threat Defense logs or MSI logs. Click the appropriate log type for more information.

Dell Threat Defense documents threat info, event data, policy changes, build updates, and registration within its own product logging. These logs should be gathered when troubleshooting issues with Dell Threat Defense.

To collect logs:

  1. Enable verbose logging to ensure that all relevant information is captured. For more information about how to enable verbose logging, reference How to Enable Verbose Logging in Dell Threat Defense.
  2. Go to C:\Program Files\Cylance\Desktop\log.

Windows Explorer address bar

Note: The location may differ based on specifications during installation. Reference How To Uninstall Dell Threat Defense for more information.

A new log is generated every day with a date stamp as a title. Each log is capped at 100 MB. If this limit is reached, the active log file is indexed, and a new daily log file is created. Up to 30 daily logs are available at one time before rolling over.

Example log files

Note: When troubleshooting, always start with the newest log and work backwards to find the issue.

Dell Threat Defense uses Microsoft Installer (MSI) logs to record product install and uninstall information. If a device is having issues with installing or uninstalling Dell Threat Defense, then MSI logs may provide additional insight on the root cause.

To collect MSI logs:

  1. Log in with the user experiencing issues installing or uninstalling Dell Threat Defense.
  2. Right-click the Windows start menu and select Run.

Run

  1. In the Run UI, type %temp% and then click OK.

Run UI

  1. Collect any file in %temp% that beings with Dell_Threat_Defense.

Example log files

Note: Always start with the log that matches the time in which install or uninstall issues occurred.

A Dell Threat Defense administrator can gather Threat Defense logs, the Install log, or the System log. Click the appropriate log type for more information.

Dell Threat Defense documents threat info, event data, policy changes, build updates, and registration within its own product logging. These logs should be gathered when troubleshooting issues with Dell Threat Defense.

To collect logs:

  1. Enable verbose logging to ensure that all relevant information is captured. For more information about how to enable verbose logging, reference How to Enable Verbose Logging in Dell Threat Defense.
  2. From the Apple menu, click Go and then Go to Folder.

Go to Folder

  1. Type /Library/Application Support/Cylance/Desktop/Log and then press OK.

Going to Cylance desktop log folder

Note: The location may differ based on specifications during installation. Reference How to Install Dell Threat Defense for more information.

A new log is generated every day with a date stamp as a title. Each log is capped at 100 MB. If this limit is reached, the active log file is indexed, and a new daily log file is created. Up to 30 daily logs are available at one time before rolling over.

Example log files

Note: When troubleshooting, always start with the newest log and work backwards to find the issue.

Dell Threat Defense uses the native install.log to document installation information. The install.log may provide additional insight on the root cause of installation issues with Dell Threat Defense.

To collect install.log:

  1. From the Apple menu, click Go and then Go to Folder.

Go to Folder

  1. Type /var/log and then press OK.

Going to log folder

  1. Copy install.log to an easily accessed area for further investigation.

Install.log

Note: The install.log contains information about application and Mac updates. It is recommended to search for "Cylance" to ensure that the information is relevant to Dell Threat Defense.

Dell Threat Defense uses the native system.log to document uninstall information. The system.log may provide additional insight on the root cause of uninstall issues with Dell Threat Defense.

To collect system.log:

  1. From the Apple menu, click Go and then Go to Folder.

Go to Folder

  1. Type /var/log and then press OK.

Going to log folder

  1. Copy system.log to an easily accessed area for further investigation.

System.log

Note: The system.log contains information about all applications residing on a device. It is recommended to search for "Cylance" to ensure that the information is relevant to Dell Threat Defense.

To contact support, reference Dell Data Security International Support Phone Numbers.
Go to TechDirect to generate a technical support request online.
For additional insights and resources, join the Dell Security Community Forum.

 

其他資訊

   

影片

   

文章屬性


受影響的產品

Dell Encryption, Dell Threat Defense

上次發佈日期

19 12月 2022

版本

13

文章類型

Solution