How Aurora Protect Desktop collects and uses data
For complete information about this product, see the Aurora Endpoint Security docs.
|
Item |
Data collection and use |
|---|---|
|
Malware detection and remediation |
|
|
Customer administrator information |
Arctic Wolf collects the following information to deliver customer support:
|
|
Collection of endpoint data |
Arctic Wolf collects and processes the following endpoint data to identify and protect the device from threats:
|
|
Application inventory |
Arctic Wolf collects the following application information to identify and protect customer endpoints against threats:
|
|
Threat events |
Arctic Wolf collects the following threat information to manage the resolution of detected events:
|
|
Customer administrative login activity |
Arctic Wolf collects the following customer login information to audit authentication activity and manage risks:
|
|
Data storage |
|
Data retention
| Personal data processed | Data retention period |
|---|---|
|
Customer administration information |
Personal data may be deleted upon request. |
|
Endpoint data |
All endpoint data is removed 30 days after the end of the contract. Data for inactive devices may be automatically removed based on customer configured policies. Customer administrators may also remove data through the console or provide instructions to customer support to remove endpoint data. |
|
Potentially malicious portable executables and scripts |
Data is de-identified and retained indefinitely. |
|
Potentially malicious files uploaded through management console |
Data is de-identified and retained indefinitely. |
|
Application inventory |
Data is removed 30 days after the end of the contract. |
|
Threat events |
Data is stored for up to 37 days. |
|
Customer administrative login activity |
Data is stored for 1 year. |
|
Email delivery activity |
Data is stored for 30 days. |