How Uptycs Manages Sensor Versions

How Uptycs Manages Sensor Versions

We always keep the latest version from the last four series of Sensor. For example, right now, we have the following versions:

  • 5.12.2.16 (latest in the 5.12.2.x series)
  • 5.12.1.21 (latest in the 5.12.1.x series)
  • 5.11.0.10 (latest in the 5.11.0.x series)
  • 5.10.2.21 (latest in the 5.10.2.x series)

When a new version is released in an existing series, we replace the older version in that series with the new one. For instance, 5.12.2.14 has already been replaced by 5.12.2.16.

If a new series is released—like 5.13.0.x—then we will remove the oldest series (currently 5.10.2.x) to make room for the latest one. This ensures we always provide the most up-to-date and relevant versions for our users.

Info
If you have any questions, please reach out to us at support@uptycs.com.


    • Related Articles

    • How to generate and provide HAR file to Uptycs Support

      HAR (HTTP Archive) is a file format used by several HTTP session tools to export the captured data. The format is basically a JSON object with a particular set of fields. Procedure on how to generate HAR file for different browsers can be obtained at ...
    • List of OS supported by Uptycs

      AIX 7.2, AIX 7.3, Amazon Linux 2, Amazon Linux 2022, Amazon Linux 2023, CentOS release 6.10 (Final), CentOS Linux release 7.9.2009 (Core), CentOS Linux release 8.2.2004 (Core), CentOS Stream release 8, CentOS Stream release 9, Fedora release 19, ...
    • eBPF

      To enable seamless auditing capabilities for Linux endpoints and containers, Uptycs has implemented Extended Berkeley Packet Filter (eBPF) based auditing techniques. eBPF is a powerful auditing system to monitor suspicious activities by tracing ...
    • How to obtain an API Key

      Overview An API key & secret are used to authenticate API clients to access Uptycs related resources. An API key / secret is unique to individual users. The document describes the process to obtain the same on Uptycs eco-system. Procedure Login into ...
    • What is the SUNBURST Backdoor Intrusion and How Can I detect it?

      Overview What is the SUNBURST backdoor intrusion and how can I detect it? FireEye discovered a supply chain attack trojanizing SolarWinds Orion business software updates in order to distribute malware called SUNBURST. This intrusion campaign is ...