Collecting local logs from an endpoint

Prev Next

This article provides an overview of the Beyond Identity Platform Authenticator log collecting.


Windows

On Windows, Beyond Identity logs are stored within the user’s AppData directory.  

The default location is: %AppData%\BeyondIdentity\logs

Where %AppData% typically resolves to:

C:\Users\<username>\AppData\Local\Programs

Notes:

  •     If the user profile is configured with roaming profiles, the log files will be stored     in the roaming profile location. This is the default path Windows Explorer opens when navigating to     %AppData%.  

  •     If hidden files and folders are not enabled in Windows Explorer, the     AppData folder will not be visible.  

  To send logs to the Beyond Identity Support team, compress (zip) the   logs folder and attach it to your support ticket response.


Windows Desktop Login

  If you are using Windows Desktop Login (WDL) with the Beyond Identity Authenticator,   two additional log sets are required:

  • Credential Provider logs

  • Desktop Login Service logs

  These Windows Desktop Login–specific logs are located at: %ProgramData%\BeyondIdentity\logs

  As with standard logs, compress (zip) the entire logs folder and attach it to your   support ticket when submitting to the Beyond Identity Support team.

Windows Data Protection State Collection

CollectDPState.ps1 is a PowerShell script that collects and archives the data protection (DP) state of a Windows computer. It is intended to be run before and after reproducing an issue where a loss of protected data has occurred (e.g., the loss of Beyond Identity keys after a password reset).

Running the script will produce a timestamped zip archive of the collected data in the same directory as the script. The user should send the archive to Beyond Identity for analysis.

Data collected:

  • Basic computer and operating system information

  • TPM information, including the SRK and EK public keys

  • DPAPI provider registry values

  • DPAPI master key files (the contents of %APPDATA%\Microsoft\Protect)

  • Domain controller information

  • Applications of interest

macOS - Collecting Logs by the PA

In Beyond Identity, there is a feature built into the authenticator that generates the last two weeks of log files.
Open the Beyond Identity application, then under the Help menu, click on Generate logs...

The logs will be produced in a finder window shortly after clicking the generate logs button. They can then be compressed and uploaded to support.

macOS - Collecting Logs with the log command

In macOS, the logs can also be collected in a terminal window by using the log command.

To dump all Beyond Identity PA logs into a macospa.log file:

log show --predicate 'subsystem CONTAINS "com.beyondidentity"' > macospa.log

To dump Beyond Identity PA logs from the last hour:

log show --predicate 'subsystem CONTAINS "com.beyondidentity"' -last 1h > macospa.log

For a real-time streaming of the logs to the terminal window, the following command can be used:

log stream --predicate 'subsystem CONTAINS "com.beyondidentity"'

Sys Diagnose

macOS

The sys diagnose creates a system-wide log, where it will capture full system diagnostics. This can be helpful in situations where 3rd party services could be involved.

They can do so by hitting the keys: Shift + Control + Option + Command +

After about a minute or two, a finder window will open with the sysdiagnose file highlighted.

iOS

To trigger a sysdiagnose on iOS, perform the following steps:

  1. Press VOL Up + Down + Power

  2. Wait for 1s or 1.5s

  3. release all buttons

You will feel a vibration. After a few minutes, go to Settings > Privacy > Analytics > Analytics Data; there be a log with sysdiagnose and the corresponding date.

Linux

On Linux, the log files can be found in:

~/.beyond-identity/logs

Logging information is collected by date so in general, you only need to send the latest log file to the support team.

CollectDPState (1)
11.94 KB