Configure the Telemetry Service
Telemetry data tracks the usage of RSA Authentication Manager features and provides reliability and software version information for your Authentication Manager instances. RSA collects this data to better understand product configuration and usage, improve support, and focus development efforts to dramatically improve customer satisfaction. No personal identifiable information (PII) or sensitive information collected.
Telemetry data is sent by each AM primary and replica instance. You can download and view the telemetry data that is sent to RSA on the Download Troubleshooting Files page in the Operations Console.
The Telemetry service is automatically enabled when you upgrade or when you install (fresh installation) RSA Authentication Manager . Telemetry data is stored offline. RSA assigns each customer deployment a time to send the data that is between 1:00 AM and 5:00 AM local time. If AM is unable to send telemetry data to RSA, then you can configure the telemetry settings.
Before you begin
- Confirm that your firewall rules allow access to telemetry.access.securid.com and the IP addresses 52.188.41.46 and 52.160.192.135.
- If your company uses URL filtering, be sure that telemetry.access.securid.com and both IP addresses shown above are whitelisted.
Procedure
- In the Security Console, click Setup > System Settings.
- Under Advanced Settings, click Telemetry.
- Verify that the Enable Telemetry checkbox is selected. Telemetry is automatically enabled when you install or upgrade to RSA Authentication Manager 8.9.
- A proxy server is required if AM is behind an external firewall. If you already use a proxy server to connect your deployment to Cloud Authentication Service (CAS), then these fields are pre-filled with the same data.
If you need to modify these fields, do the following:
- Under Proxy Configuration, click Enable Proxy Configuration.
- In the Proxy Host field, enter the hostname of the proxy server. For example, example.com. If you have an HTTP proxy server that does not require a certificate, you can enter either a hostname or an IP address.
- In the Proxy Port field, enter the port used by the proxy server.
- In the Proxy Username field, enter the unique username for the proxy server.
- In the Proxy Password field, enter the unique password for the proxy server.
- If you made changes to your proxy server configuration, such as changing the username or password, restart the proxy server.
- Click Test Connection.
- If you are using an HTTPS proxy server, you are prompted to trust a proxy server certificate. Verify the certificate with your help desk or network administrator, and click Yes.
The trusted proxy server certificate cannot be deleted in AM. You can replace the certificate by updating the proxy server connection or by connecting to a new proxy server.
An HTTP proxy server does not require this step.
- In the Save telemetry data field, you can modify the number of days for which you save the telemetry data offline. The default value is 30 days, but you can save one year (365 days) of telemetry data.
- Click Apply Settings.
After you finish
To view the telemetry data that is sent to RSA, download the AM log files. The telemetry data is in the directory Authentication Manager Logs\server\logs\telemetry. For more information, see Download Troubleshooting Files.
Related Articles
System internal error on RSA Authentication Manager 8.x when accessing options under System Settings for Email (SMTP), Log… 19Number of Views RSA Governance & Lifecycle Recipes: Telemetry Chart - ROI AFX Hours 11Number of Views Poodle Bite, Sandworm, .NET MS14-057, and other OpenSSL Vulnerabilities and Impact in RSA products 87Number of Views Configure a Proxy Server 39Number of Views RSA MFA Agent for Windows logs a warning that "System cannot access location data for this computer" 34Number of Views
Trending Articles
RSA MFA Agent 2.3.6 for Microsoft Windows Installation and Administration Guide RSA Authentication Manager 8.9 Release Notes (January 2026) How to install the jTDS JDBC driver on WildFly for use with Data Collections in RSA Identity Governance & Lifecycle RSA Authentication Manager 8.8 Setup and Configuration Guide Artifacts to gather in RSA Identity Governance & Lifecycle