How to Collect Logs for Dell Encryption Enterprise for Mac
Summary: Logs may be collected for Dell Encryption Enterprise for Mac or Dell Data Protection Enterprise Edition for Mac by following these instructions.
This article applies to
This article does not apply to
This article is not tied to any specific product.
Not all product versions are identified in this article.
Symptoms
Note:
- As of February 2021, Dell Encryption Enterprise for Mac has reached End of Maintenance. This product and its articles are no longer updated by Dell. For more information, reference the Product Life Cycle (End of Support / End of Life) Policy for Dell Data Security. If you have any questions on alternative articles, either reach out to your sales team or contact endpointsecurity@dell.com.
- Reference Endpoint Security for additional information about current products.
It is highly recommended to collect logs for Dell Encryption Enterprise for Mac (formerly Dell Data Protection | Enterprise Edition for Mac) before troubleshooting or contacting Dell Data Security ProSupport.
Affected Products:
- Dell Encryption Enterprise for Mac
- Dell Data Protection | Enterprise Edition for Mac
Affected Operating Systems:
- Mac
Cause
Not applicable
Resolution
For the log collection process, click the appropriate Dell Encryption Enterprise for Mac version. For more information about versioning, reference How to Identify the Dell Encryption Enterprise for Mac / Dell Data Protection Enterprise Edition for Mac Version.
To collect logs:
- Log in to the appropriate endpoint.
- In the Dock, click System Preferences.

- Click Dell Encryption Enterprise.

- At the bottom of the Dell Encryption Enterprise for Mac user interface (UI), click Collect Logs.

- In the Dell Data Security logging UI,
- Optionally set Maximum Size for log collection.
- Optionally set a Start Date for log collection.
- Click Allow.

- Populate local administrator credentials and then click OK.

- In the Dell Data Security logging UI:
- Optionally modify the Save As name.
- Optionally associate Tags to the bundle.
- Optionally modify Where to save the bundle.
- Click Save.

- On completion, click OK.

To collect logs:
- Log in to the appropriate endpoint.
- Download the Dell-Encryption-Enterprise-Mac-[VERSION].zip installer to the targeted endpoint.
Note:
- [VERSION] = Dell Encryption Enterprise for Mac product version
- Double-click Dell-Encryption-Enterprise-Mac-[VERSION].zip.

- Double-click Dell-Encryption-Enterprise-Mac-[VERSION].dmg to mount the drive.

- On the desktop, double-click Dell Encryption Enterprise.

- In Dell Encryption Enterprise, double-click Utilities.

- In the Utilities folder, double-click Dell Data Security - GetLogs.app.

- On the Personally Identifiable Information (PII) disclaimer, click Allow.

- In the UI that appears:
- Optionally change the log bundle Save As name.
- Optionally add Tags to the log bundle.
- Select Where to save the log bundle.
- Click Save.

Note: By default, the log bundle saves to the active user’s home directory.
- Populate a local administrator User Name and Password. Once populated, click OK.

- Click OK.

- Go to the log bundle location (Step 9C).
To collect logs:
- Log in to the appropriate endpoint.
- Download the Dell-[PRODUCT]-[VERSION].zip installer to the targeted endpoint.
Note:
- [PRODUCT] =
- v8.15.0 and Later: Encryption-Enterprise-Mac
- v8.14.2 and Earlier: Data-Protection-Mac
- [VERSION] = Dell Encryption Enterprise for Mac product version
- Double-click Dell-[PRODUCT]-[VERSION].zip.
- Double-click Dell-[PRODUCT]-[VERSION].dmg to mount the image.
- Select Go, Utilities, and then Terminal.

- Double-click Terminal to launch the UI.
- In Terminal, type
sudo sh. Do not press Enter. - Navigate and then double-click the mounted disk image (Step 4).
- Double-click the Utilities folder.

Note: The screenshot was taken on a Dell Data Protection | Enterprise Edition for Mac version and differs slightly on Dell Encryption Enterprise for Mac.
- Locate GetLogs.sh and go to Step 11.

Note: Dell Data Protection | Enterprise Edition for Mac versions before 8.10 did not include getlogs.sh. It is recommended to download the latest versions of the software to ensure the latest getlogs.sh is used.
- Drag GetLogs.sh to the Terminal window after sudo sh (Step 7) and then press Enter. This auto populates the location path for getlogs.sh.

Note: To target external volumes for log collection, add –d [path of external volume] at the end of the string before pressing Enter. For example:
sudo sh /volumes/Users/admin/Desktop/GetLogs.sh –d /Volumes/ExternalHD
- Enter the credentials for an account with sudo rights and then press Enter to run getlogs.sh.
Note: It is common for Terminal to display "Resource busy" for several minutes as it gathers all the required information.

- Once the shell script has completed, log output (Delllogs.zip) can be collected from Go > Home.

To contact support, reference Dell Data Security International Support Phone Numbers.
Go to TechDirect to generate a technical support request online.
For additional insights and resources, join the Dell Security Community Forum.
Additional Information
Videos
Affected Products
Dell EncryptionArticle Properties
Article Number: 000126826
Article Type: Solution
Last Modified: 23 Aug 2023
Version: 15
Find answers to your questions from other Dell users
Support Services
Check if your device is covered by Support Services.