Skip to main content

How to Identify Your OS and Architecture

backBack

How to Identify Your OS and Architecture

Installation GuidesDuration6 min

Step 1: Identify Your Operating System

Expand the section below that matches your platform:

🔹 Windows

  • Press Win + R, type winver, and press Enter.
    • This shows your Windows edition (e.g., Windows 10, Windows 11, Windows Server).

🔹 macOS

  • Click the Apple  logo in the top left → About This Mac.
  • You’ll see macOS name (e.g., Ventura, Sonoma) and chip type (Intel or Apple Silicon).

🔹 Linux

Open a terminal and run one of the following:

lsb_release -a

This will show the distribution (Ubuntu, Debian, RHEL, CentOS, SLES, Amazon Linux, Oracle Linux, PhotonOS).


Step 2: Identify Your Architecture

Run the appropriate command for your platform:

🔹 Windows

  1. Press Win + R, type msinfo32, press Enter.
  2. Look for System Type:
    • x64-based PCx86_64 / amd64
    • ARM-based PCarm64
    • x86-based PCx86

🔹 macOS

  • In About This Mac:
    • Chip: Apple M1 / M2 / M3arm64
    • Processor: Intelx86_64 / amd64

🔹 Linux

Run in terminal:

uname -m

Typical outputs:

  • x86_64x86_64 / amd64
  • aarch64arm64
  • s390xs390x (IBM zLinux)
  • i386 or i686x86

Step 3: Match to the Correct Sensor

Once you know your OS version (Step 1) and architecture (Step 2):

  • Go to the sensor download page.
  • Select your Operating System family (e.g., Windows, macOS or Linux).
  • Choose the version that matches your system.
  • Finally, pick the architecture you identified (x86_64, arm64, s390x, x86, or amd64).

If multiple builds are available, always prefer the one that exactly matches both your OS and architecture.

Frequently Asked Questions

General
Can the sensor run without an internet connection?

No, the sensor requires an internet connection to run. The sensor needs to be connected to the internet in order to perform checks, receive policy updates, and report results. Without an internet connection, the sensor cannot function properly.

How often do tasks run?

The sensor performs checks at regular intervals to maintain up-to-date system security. Tasks typically run anywhere from once every few minutes to once per day, depending on configuration settings and requirements. Tasks follow a schedule for prompt issue detection and can also be triggered manually or by specific events like system reboots or policy updates.

What is Endpoint Security?

Endpoint security refers to the protection of individual devices (endpoints) such as computers, laptops, and servers from cybersecurity threats. It involves security measures like antivirus software, firewalls, encryption, and monitoring tools to detect vulnerabilities and prevent attacks. The sensor helps enforce endpoint security by checking for misconfigurations, inactive security software, and other risks that could compromise the system.

Which operating systems are supported?

The Rotate Sensor supports Windows and macOS operating systems.

Sensor
What’s the difference between Unauthorized, Paused, Deactivated and Uninstalled?
  • Unauthorized - The sensor is not logged in using the company’s SSO. This potentially could affect identifying the user of the sensor. The “Disconnect” button will unauthorize the sensor’s logged user.
  • Paused - The sensor is temporarily halted but can be easily resumed. This state is often used for maintenance or troubleshooting purposes.
  • Deactivated - The sensor is not running and not collecting data. This should be used when a device is no longer relevant, but might be in the future. The sensor will still be installed on the user’s device.
  • Uninstalled - The sensor will be removed from the user’s device. This should be used when a device is no longer relevant and never will. This is irreversible.

On this page