No version 6.3 of Spotlight Extensions runs in 64 bit. However if requested we can provide a 32 Bit version.
Spotlight Extensions version 6.3 now works for all users of the PC
The data is collected at regular times. Most data is collected daily, but some data such as wait statistics and SQL are collected at hourly intervals, or once per day. This is not configurable by the customer.
Spotlight Extensions does not run traces. All data is captured by the Dynamic Management View.
Uploads occur every hour.
You can now share a Diagnostic Server with other users and in doing so you will only capture data once. To share a Diagnostic Server open SQL Server Management Studio and go to "Settings" in the "Spotlight" menu and select "Diagnostic Server Configuration". You can then enter the address of the Diagnostic Server you wish to share.
Yes, performance data is collected and temporarily stored in the Diagnostic Server which is installed under C:\%Program Files%\Dell\Spotlight Extensions Diagnostic Server\Agent folder. This performance data is then zipped, uploaded and then deleted once per day.
Spotlight Extensions collects system configuration and performance metrics from your SQL Server environment and uploads it to SpotlightEssentials.com. Once it's uploaded we store it for analysis and consumption by the end user. From the data and subsequent analysis SpotlightTM Essentials is able to generate a picture of your systems health and performance. To find out more please review the information available on the data handling and security page.
Ensure each SQL Server connection from the Spotlight Diagnostic Server has access to a SQL Server account that is a member of the sysadmin server role. This can be a SQL Server login (such as 'sa'), or the Spotlight Diagnostic Server can be installed to run under a Windows account that is trusted by SQL Server.
Alternatively, run this SQL script (as sysadmin) to grant the required permissions to user TrustedUser.
Shellshock is the name that’s been given to a security bug found in Bash, a command shell program commonly used on Linux and UNIX systems. The Spotlight web servers do not use Linux or UNIX systems and therefore are not vulnerable to the security bug found in Bash. Officially, the bug is documented as CVE-2014-6271 and CVE-2014-7169.
No, the Heartbleed vulnerability issue is specific to OpenSSL. The Spotlight website uses Microsoft Azure Web Roles and these do not use OpenSSL to terminate SSL connections. Windows comes with its own encryption component called Secure Channel (a.k.a. SChannel), which is not susceptible to the Heartbleed vulnerability.