System requirements and subscription information

Supported operating systems

For computers

  • Microsoft Windows 11, 10, 8.1, 8, 7
  • ARM64: Please note that on Microsoft® Windows® on ARM, some features and functionalities are not supported. Read more
  • macOS 10.12 and later. ESET Endpoint Antivirus for macOS version 7 onwards provides native support for ARM-based Apple chips.
  • Ubuntu Desktop 18.04 LTS 64-bit and RedHat Enterprise Linux (RHEL) Desktop 7 64-bit

For smartphones and tablets

  • Android 5 (Lollipop) and later
  • iOS 9 and later
  • Remote deployment via Microsoft Intune and VMware One

For file servers

  • Microsoft Windows Server 2022, 2019, 2016, 2012, 2008, R2 SP1
  • Microsoft Windows Server Core 2012, 2008R2
  • Microsoft Windows Small Business Server 2011
  • RedHat Enterprise Linux (RHEL) 7, 8, 9
  • CentOS 7
  • Ubuntu Server 18.04 LTS, 20.04 LTS, 22.04 LTS
  • Debian 10, 11
  • SUSE Linux Enterprise Server (SLES) 12, 15
  • Oracle Linux 8
  • Amazon Linux 2
  • Debian 12
  • Alma Linux 9  

For mail servers

  • Microsoft Exchange Server 2019, 2016, 2013, 2010, 2007
  • Microsoft Windows Server 2019, 2016, 2012 R2, 2012, 2008 R2, 2008 SP2
  • Microsoft Small Business Server 2011

For virtual environments

  • VMware vSphere 6.0, 6.5+, 6.7+ (vCenter Single Sign-On, vSphere Client/Web Client, vCenter Server, vCenter Inventory Service)
  • VMware NSX Manager 6.3+, 6.4.0, 6.4.1, 6.4.2
  • VMware Guest Introspection 6.2.4+, 6.3+, 6.4+

For cloud applications protection

  • Subscription for Microsoft 365 or Google Workspace to connect with the tenant (Exchange Online, OneDrive, SharePoint Online, Teams, Gmail, Google Drive)

Subscription information

Cloud and on-premises management included

Remote management platform is available as cloud-based or on-premises deployment. No need to buy or maintain additional hardware, reducing the total cost of ownership.

Subscription flexibility

Mix and match your subscription as needed
Covers all the bases, allowing you to mix and match endpoint protection without wasting a single license.

Add additional devices at any time
You can purchase seats for additional computers, laptops, mobile devices and servers any time.

Transfer a subscription to another computer
You can transfer a valid ESET subscription to a completely new computer from the original one. In addition, you can switch from one OS to another.

Switch to a different platform at any time
It's easy to switch your protection from one platform to another at any point during the subscription term without having to purchase additional subscriptions.

Are you an existing customer?

Renew today

Renew, upgrade or add devices to your existing ESET subscription.

Manage subscriptions

Enter ESET PROTECT Hub to manage your purchased subscriptions.

Installation

Install your purchased protection on additional devices.

Need assistance?

All ESET products include free technical support in your language.

See interactive demo or start a free trial

Protected by ESET since 2017
More than 9,000 endpoints

Protected by ESET since 2016
More than 4,000 mailboxes

Protected by ESET since 2016
More than 32,000 endpoints

ISP security partner since 2008
2 milion customer base

protected by ESET since 2017
more than 9,000 endpoints

protected by ESET since 2016
more than 4,000 mailboxes

protected by ESET since 2016
more than 32,000 endpoints

ISP security partner since 2008
2 milion customer base

protected by ESET since 2017
more than 9,000 endpoints

protected by ESET since 2016
more than 4,000 mailboxes

protected by ESET since 2016
more than 32,000 endpoints

ISP security partner since 2008
2 million customer base

Stay on top of cybersecurity news

Brought to you by awarded and recognized security researchers from ESET's 11 global R&D centers.

Corporate blog

AI moves to your PC with its own special hardware

AI Meets Your PC: Intel Core Ultra Processors with Built-in NPU

Cybersecurity and AI: What does 2025 have in store?

AI and Cybersecurity: A New Frontier in 2025 Threats and Defenses

Webinars

We (could have) cracked open your network for under $100

On-demand

Are you creating a potentially massive vulnerability when decommissioned hardware leaves the premises?

Cyber Insurance: How to Meet Security Requirements

On-demand

This presentation will cover the cybersecurity solutions you need to have in place...

We Live Security blog

UEFI Secure Boot: Not so secure

ESET researchers uncover a vulnerability in a UEFI application that could enable attackers to deploy malicious bootkits on unpatched systems

Under the cloak of UEFI Secure Boot: Introducing CVE-2024-7344

The story of a signed UEFI application allowing a UEFI Secure Boot bypass