How to Collect Logs for Dell Encryption Enterprise for Mac

Summary: Logs may be collected for Dell Encryption Enterprise for Mac or Dell Data Protection Enterprise Edition for Mac by following these instructions.

This article applies to This article does not apply to This article is not tied to any specific product. Not all product versions are identified in this article.

Symptoms

Note:

It is highly recommended to collect logs for Dell Encryption Enterprise for Mac (formerly Dell Data Protection | Enterprise Edition for Mac) before troubleshooting or contacting Dell Data Security ProSupport.


Affected Products:

  • Dell Encryption Enterprise for Mac
  • Dell Data Protection | Enterprise Edition for Mac

Affected Operating Systems:

  • Mac

Cause

Not applicable

Resolution

For the log collection process, click the appropriate Dell Encryption Enterprise for Mac version. For more information about versioning, reference How to Identify the Dell Encryption Enterprise for Mac / Dell Data Protection Enterprise Edition for Mac Version.

To collect logs:

  1. Log in to the appropriate endpoint.
  2. In the Dock, click System Preferences.

System Preferences

  1. Click Dell Encryption Enterprise.

Dell Encryption Enterprise

  1. At the bottom of the Dell Encryption Enterprise for Mac user interface (UI), click Collect Logs.

Collect Logs

  1. In the Dell Data Security logging UI,
    1. Optionally set Maximum Size for log collection.
    2. Optionally set a Start Date for log collection.
    3. Click Allow.

Dell Data Security logging UI

  1. Populate local administrator credentials and then click OK.

Administrator credentials

  1. In the Dell Data Security logging UI:
    1. Optionally modify the Save As name.
    2. Optionally associate Tags to the bundle.
    3. Optionally modify Where to save the bundle.
    4. Click Save.

Dell Data Security logging UI

  1. On completion, click OK.

Log confirmation

To collect logs:

  1. Log in to the appropriate endpoint.
  2. Download the Dell-Encryption-Enterprise-Mac-[VERSION].zip installer to the targeted endpoint.
Note:
  • [VERSION] = Dell Encryption Enterprise for Mac product version
  1. Double-click Dell-Encryption-Enterprise-Mac-[VERSION].zip.

Dell Encryption Mac .zip

  1. Double-click Dell-Encryption-Enterprise-Mac-[VERSION].dmg to mount the drive.

Mount the drive

  1. On the desktop, double-click Dell Encryption Enterprise.

Dell Encryption Enterprise

  1. In Dell Encryption Enterprise, double-click Utilities.

Utilities

  1. In the Utilities folder, double-click Dell Data Security - GetLogs.app.

Dell Data Security - GetLogs.app

  1. On the Personally Identifiable Information (PII) disclaimer, click Allow.

Allow

  1. In the UI that appears:
    1. Optionally change the log bundle Save As name.
    2. Optionally add Tags to the log bundle.
    3. Select Where to save the log bundle.
    4. Click Save.

Log destination

Note: By default, the log bundle saves to the active user’s home directory.
  1. Populate a local administrator User Name and Password. Once populated, click OK.

Administrator credentials

  1. Click OK.

Log confirmation

  1. Go to the log bundle location (Step 9C).

To collect logs:

  1. Log in to the appropriate endpoint.
  2. Download the Dell-[PRODUCT]-[VERSION].zip installer to the targeted endpoint.
Note:
  • [PRODUCT] =
    • v8.15.0 and Later: Encryption-Enterprise-Mac
    • v8.14.2 and Earlier: Data-Protection-Mac
  • [VERSION] = Dell Encryption Enterprise for Mac product version
  1. Double-click Dell-[PRODUCT]-[VERSION].zip.
  2. Double-click Dell-[PRODUCT]-[VERSION].dmg to mount the image.
  3. Select Go, Utilities, and then Terminal.

Terminal

  1. Double-click Terminal to launch the UI.
  2. In Terminal, type sudo sh. Do not press Enter.
  3. Navigate and then double-click the mounted disk image (Step 4).
  4. Double-click the Utilities folder.

Utilities

Note: The screenshot was taken on a Dell Data Protection | Enterprise Edition for Mac version and differs slightly on Dell Encryption Enterprise for Mac.
  1. Locate GetLogs.sh and go to Step 11.

GetLogs.sh

Note: Dell Data Protection | Enterprise Edition for Mac versions before 8.10 did not include getlogs.sh. It is recommended to download the latest versions of the software to ensure the latest getlogs.sh is used.
  1. Drag GetLogs.sh to the Terminal window after sudo sh (Step 7) and then press Enter. This auto populates the location path for getlogs.sh.

GetLogs.sh dragged to Terminal

Note: To target external volumes for log collection, add –d [path of external volume] at the end of the string before pressing Enter. For example: sudo sh /volumes/Users/admin/Desktop/GetLogs.sh –d /Volumes/ExternalHD
  1. Enter the credentials for an account with sudo rights and then press Enter to run getlogs.sh.
Note: It is common for Terminal to display "Resource busy" for several minutes as it gathers all the required information.

Gathering logs

  1. Once the shell script has completed, log output (Delllogs.zip) can be collected from Go > Home.

DellLogs.zip


To contact support, reference Dell Data Security International Support Phone Numbers.
Go to TechDirect to generate a technical support request online.
For additional insights and resources, join the Dell Security Community Forum.

Additional Information

 

Videos

 

Affected Products

Dell Encryption
Article Properties
Article Number: 000126826
Article Type: Solution
Last Modified: 23 Aug 2023
Version:  15
Find answers to your questions from other Dell users
Support Services
Check if your device is covered by Support Services.