How Aurora Focus collects and uses data
For complete information about this product, see the Aurora Endpoint Security docs.
|
Item |
Data collection and use |
|---|---|
|
Customer administration information |
Arctic Wolf collects the following customer administration data to deliver customer support:
|
|
Collecting data to detect and respond to threats |
|
|
Collection of endpoint configuration data |
Arctic Wolf collects the following on the configuration of a device endpoint to assess the impact of potentially malicious activity on customer endpoints:
|
|
Collection of endpoint process artifacts |
Arctic Wolf collects the following information about endpoint process artifacts to assess the impact of potentially malicious activity on customer endpoints:
|
|
Collection of endpoint file artifacts |
Arctic Wolf collects the following information about endpoint file artifacts to assess the impact of potentially malicious activity on customer endpoints:
|
|
Collection of endpoint user artifacts |
Arctic Wolf collects the following information about endpoint user artifacts to assess the impact of potentially malicious activity on customer endpoints:
|
|
Collection of endpoint registry artifacts (Windows OS only) |
Arctic Wolf collects and processes the following information about endpoint registry artifacts to assess the impact of potentially malicious activity on customer endpoints:
|
|
Collection of endpoint network artifacts |
Arctic Wolf collects and processes the following information about endpoint network artifacts to assess the impact of potentially malicious activity on customer endpoints:
|
|
Collection of endpoint event data |
Arctic Wolf collects and processes the following information about endpoint event data to assess the impact of potentially malicious activity on customer endpoints:
|
|
Detections data |
Arctic Wolf collects the following information on detection data to manage the resolution of detected events:
|
|
Customer administrative login activity |
Arctic Wolf collects and processes login activity from administrators or operators of a customer's tenant (includes date and time, a user's unique identifier, status, and account name) to manage authentication auditing and risk management. |
|
Data storage |
|
Data retention
| Personal data processed | Data retention period |
|---|---|
|
Customer administrator information |
Personal data may be deleted upon request. |
|
Endpoint configuration data |
Data is removed 30 days after the end of the contract. |
|
Endpoint artifacts and event data |
Data is stored in the cloud and is accessible for 30 days by default. The customer can increase the data retention timeframe by purchasing a longer storage duration. Backup data is stored for up to 15 months or 30 days after the end of contract, whichever is less. |
|
Alert data |
Data is stored in the cloud and accessible for 37 days. Customer can increase the data retention timeframe by purchasing a longer storage duration. |
|
Detections data |
Data is stored in the cloud and accessible for 30 days. Customer can increase the data retention timeframe by purchasing a longer storage duration. Backup data is stored for up to 15 months or 30 days after the end of contract, whichever is less. |
|
Focus view data |
Data is stored for 30 days. |
|
InstaQuery results data |
Data is stored in the cloud and accessible for 60 days. The customer can increase the data retention timeframe by purchasing a longer storage duration. |
|
Remote response transaction log |
Data is stored for 30 days. |
|
Customer administrative login activity |
Data is stored for 1 year. |