Some take approaches which can best be described as akin to a human immune system, applying different remedies to an error and logging what is effective for future use, alerting the owner for intervention only when all other options have been exhausted.
These fingerprints look deep into the characteristics of the machine, logging such things as the time zone, keyboard language, operating-system version and other key identifiers.