How to Identify Your OS and Architecture
Step 1: Identify Your Operating System
Expand the section below that matches your platform:
🔹 Windows
- Press Win + R, type
winver, and press Enter.- This shows your Windows edition (e.g., Windows 10, Windows 11, Windows Server).
🔹 macOS
- Click the Apple logo in the top left → About This Mac.
- You’ll see macOS name (e.g., Ventura, Sonoma) and chip type (Intel or Apple Silicon).
🔹 Linux
Open a terminal and run one of the following:
lsb_release -a
This will show the distribution (Ubuntu, Debian, RHEL, CentOS, SLES, Amazon Linux, Oracle Linux, PhotonOS).
Step 2: Identify Your Architecture
Run the appropriate command for your platform:
🔹 Windows
- Press Win + R, type
msinfo32, press Enter. - Look for System Type:
x64-based PC→ x86_64 / amd64ARM-based PC→ arm64x86-based PC→ x86
🔹 macOS
- In About This Mac:
- Chip: Apple M1 / M2 / M3 → arm64
- Processor: Intel → x86_64 / amd64
🔹 Linux
Run in terminal:
uname -m
Typical outputs:
x86_64→ x86_64 / amd64aarch64→ arm64s390x→ s390x (IBM zLinux)i386ori686→ x86
Step 3: Match to the Correct Sensor
Once you know your OS version (Step 1) and architecture (Step 2):
- Go to the sensor download page.
- Select your Operating System family (e.g., Windows, macOS or Linux).
- Choose the version that matches your system.
- Finally, pick the architecture you identified (
x86_64,arm64,s390x,x86, oramd64).
If multiple builds are available, always prefer the one that exactly matches both your OS and architecture.
Frequently Asked Questions
Can the sensor run without an internet connection?
No, the sensor requires an internet connection to run. The sensor needs to be connected to the internet in order to perform checks, receive policy updates, and report results. Without an internet connection, the sensor cannot function properly.
How often do tasks run?
The sensor performs checks at regular intervals to maintain up-to-date system security. Tasks typically run anywhere from once every few minutes to once per day, depending on configuration settings and requirements. Tasks follow a schedule for prompt issue detection and can also be triggered manually or by specific events like system reboots or policy updates.
What is Endpoint Security?
Endpoint security refers to the protection of individual devices (endpoints) such as computers, laptops, and servers from cybersecurity threats. It involves security measures like antivirus software, firewalls, encryption, and monitoring tools to detect vulnerabilities and prevent attacks. The sensor helps enforce endpoint security by checking for misconfigurations, inactive security software, and other risks that could compromise the system.
Which operating systems are supported?
The Rotate Sensor supports Windows and macOS operating systems.
What’s the difference between Unauthorized, Paused, Deactivated and Uninstalled?
- Unauthorized - The sensor is not logged in using the company’s SSO. This potentially could affect identifying the user of the sensor. The “Disconnect” button will unauthorize the sensor’s logged user.
- Paused - The sensor is temporarily halted but can be easily resumed. This state is often used for maintenance or troubleshooting purposes.
- Deactivated - The sensor is not running and not collecting data. This should be used when a device is no longer relevant, but might be in the future. The sensor will still be installed on the user’s device.
- Uninstalled - The sensor will be removed from the user’s device. This should be used when a device is no longer relevant and never will. This is irreversible.