List of OS supported by Uptycs

List of OS supported by Uptycs

AIX 7.2,
AIX 7.3,
Amazon Linux 2,
Amazon Linux 2022,
Amazon Linux 2023,
CentOS release 6.10 (Final),
CentOS Linux release 7.9.2009 (Core),
CentOS Linux release 8.2.2004 (Core),
CentOS Stream release 8,
CentOS Stream release 9,
Fedora release 19,
Fedora Linux Fedora release 36 (Thirty Six),
Fedora Linux Fedora release 37 (Thirty Seven),
Fedora Linux Fedora release 38 (Thirty Eight),
openSUSE Leap 15.1,
openSUSE Leap 15.2,
openSUSE Leap 15.3,
Oracle Linux Server 6.10,
Oracle Linux Server 7.9,
Oracle Linux Server 8.6,
Oracle Linux Server 9.0,
Red Hat Enterprise Linux release 8.4 (Ootpa),
Red Hat Enterprise Linux release 8.6 (Ootpa),
Red Hat Enterprise Linux release 8.7 (Ootpa),
Red Hat Enterprise Linux release 8.8 (Ootpa),
Red Hat Enterprise Linux release 9.0 (Plow),
Red Hat Enterprise Linux release 9.1 (Plow),
Red Hat Enterprise Linux release 9.2 (Plow),
Red Hat Enterprise Linux Server release 7.9 (Maipo),
Rocky Linux release 8.6 (Green Obsidian),
Rocky Linux release 9.1 (Blue Onyx),
SLES 12-SP5,
SLES 15-SP2,
SLES 15-SP3,
SLES 15-SP4,
VMware Photon 1.0,
VMware Photon OS 2.0,
VMware Photon OS 3.0,
VMware Photon OS 4.0,
VMware Photon OS 5.0,
    • Related Articles

    • How to generate and provide HAR file to Uptycs Support

      HAR (HTTP Archive) is a file format used by several HTTP session tools to export the captured data. The format is basically a JSON object with a particular set of fields. Procedure on how to generate HAR file for different browsers can be obtained at ...
    • eBPF

      To enable seamless auditing capabilities for Linux endpoints and containers, Uptycs has implemented Extended Berkeley Packet Filter (eBPF) based auditing techniques. eBPF is a powerful auditing system to monitor suspicious activities by tracing ...
    • How to obtain an API Key

      Overview An API key & secret are used to authenticate API clients to access Uptycs related resources. An API key / secret is unique to individual users. The document describes the process to obtain the same on Uptycs eco-system. Procedure Login into ...
    • What is the SUNBURST Backdoor Intrusion and How Can I detect it?

      Overview What is the SUNBURST backdoor intrusion and how can I detect it? FireEye discovered a supply chain attack trojanizing SolarWinds Orion business software updates in order to distribute malware called SUNBURST. This intrusion campaign is ...
    • How to get the custom name as standard name in the overview page of Host compliance ?

      This article provides you the steps that can be followed to get the custom name as standard name on the overview page of the host compliance as shown below. 1. To land on compliance overview page , go to Uptycs EDR --> Audit --> Compliance . 2. Then ...