Users Guide
history, or cookies in connection with this program, any personal data inadvertently collected or viewed will be treated in
accordance with the Dell Privacy Policy available for review at https://www.Dell.com/privacy.
The information encrypted in the data log sent to Dell contains the following categories of data:
● Hardware and software inventory — Installed devices, processors, memory, network devices, usage, and Service Tag
● Software configuration for servers — Operating system and installed applications
● Configuration information — Interfaces, VLAN, Data Center Bridging (DCB), spanning tree, and stacking
● Identity information — System name, domain name, and IP address
● Event data — Windows event logs, core dump, and debug logs
You can also access and view the data collected by SupportAssist Enterprise. For information on viewing the collected data, see
Viewing a collection from the Devices page on page 83.
By default, SupportAssist Enterprise collects data from all devices, irrespective of the service contract of the devices, and
sends the data securely to Dell. The collection of data is staggered, and the data is collected from 10 devices at a time. For
information about the default frequency of data collection, see Default schedule for collection of system information on page
80.
NOTE: If the security policy of your company restricts sending some of the collected data outside of your company
network, you can configure SupportAssist Enterprise to exclude the collection of certain data from your devices. For
information on excluding the collection of certain data, see Enabling or disabling the collection of identity information on
page 81 and Enabling or disabling the collection of software information and the system log on page 82.
NOTE: For more information about the data collected by SupportAssist Enterprise and how the collected data is used by
Dell, see the Dell SupportAssist: Security Considerations technical document at https://www.Dell.com/SupportAssistGroup.
Overview 11