System requirements and subscription information

Supported operating systems

For computers

  • Microsoft Windows 11, 10, 8.1, 8, 7
  • ARM64: Please note that on Microsoft® Windows® on ARM, some features and functionalities are not supported. Read more
  • macOS 10.12 and later. ESET Endpoint Antivirus for macOS version 7 onwards provides native support for ARM-based Apple chips.
  • Ubuntu Desktop 18.04 LTS 64-bit and RedHat Enterprise Linux (RHEL) Desktop 7 64-bit

For smartphones and tablets

  • Android 5 (Lollipop) and later
  • iOS 9 and later
  • Remote deployment via Microsoft Intune and VMware One

For file servers

  • Microsoft Windows Server 2022, 2019, 2016, 2012, 2008, R2 SP1
  • Microsoft Windows Server Core 2012, 2008R2
  • Microsoft Windows Small Business Server 2011
  • RedHat Enterprise Linux (RHEL) 7, 8, 9
  • CentOS 7
  • Ubuntu Server 18.04 LTS, 20.04 LTS, 22.04 LTS
  • Debian 10, 11
  • SUSE Linux Enterprise Server (SLES) 12, 15
  • Oracle Linux 8
  • Amazon Linux 2
  • Debian 12
  • Alma Linux 9  

For mail servers

  • Microsoft Exchange Server 2019, 2016, 2013, 2010, 2007
  • Microsoft Windows Server 2019, 2016, 2012 R2, 2012, 2008 R2, 2008 SP2
  • Microsoft Small Business Server 2011

For virtual environments

  • VMware vSphere 6.0, 6.5+, 6.7+ (vCenter Single Sign-On, vSphere Client/Web Client, vCenter Server, vCenter Inventory Service)
  • VMware NSX Manager 6.3+, 6.4.0, 6.4.1, 6.4.2
  • VMware Guest Introspection 6.2.4+, 6.3+, 6.4+

For cloud applications protection

  • Subscription for Microsoft 365 or Google Workspace to connect with the tenant (Exchange Online, OneDrive, SharePoint Online, Teams, Gmail, Google Drive)

Subscription information

Cloud and on-premises management included

Remote management platform is available as cloud-based or on-premises deployment. No need to buy or maintain additional hardware, reducing the total cost of ownership.

Subscription flexibility

Mix and match your subscription as needed
Covers all the bases, allowing you to mix and match endpoint protection without wasting a single license.

Add additional devices at any time
You can purchase seats for additional computers, laptops, mobile devices and servers any time.

Transfer a subscription to another computer
You can transfer a valid ESET subscription to a completely new computer from the original one. In addition, you can switch from one OS to another.

Switch to a different platform at any time
It's easy to switch your protection from one platform to another at any point during the subscription term without having to purchase additional subscriptions.

Are you an existing customer?

Renew today

Renew, upgrade or add devices to your existing ESET subscription.

Manage subscriptions

Enter ESET PROTECT Hub to manage your purchased subscriptions.

Installation

Install your purchased protection on additional devices.

Need assistance?

All ESET products include free technical support in your language.

See interactive demo or start a free trial

What IT pros are saying

Angela S

"It is very much customizable tool. In my opinion it is the most functional, robust and manageable tool than any other."

Read full review

Jason D

"The interface is easy to use and lightweight on the system. When used on a 4+ core device with an SSD, the system impact is negligible for most office tasks."

Read full review

Jaliya S

"It is easy to use, simple and understandable. Therefore, we can easily manage the features of it. Also, it is easy to install, configure and update. "

Read full review

Jen D

"I love the way it helps us in detecting unnecessary things that are continuously running our systems behind. In this way it enhances the security of our system."

Read full review

Based on customer reviews, through G2 Crowd surveys that asked ESET business customers to rate their experiences using ESET PROTECT solutions.

What IT pros are saying

Angela S

"It is very much customizable tool. In my opinion it is the most functional, robust and manageable tool than any other."

Read full review

Jason D

"The interface is easy to use and lightweight on the system. When used on a 4+ core device with an SSD, the system impact is negligible for most office tasks."

Read full review

Jaliya S

"It is easy to use, simple and understandable. Therefore, we can easily manage the features of it. Also, it is easy to install, configure and update. "

Read full review

Jen D

"I love the way it helps us in detecting unnecessary things that are continuously running our systems behind. In this way it enhances the security of our system."

Read full review

Based on customer reviews, through G2 Crowd surveys that asked ESET business customers to rate their experiences using ESET PROTECT solutions.

Protected by ESET since 2017
More than 9,000 endpoints

Protected by ESET since 2016
More than 4,000 mailboxes

Protected by ESET since 2016
More than 32,000 endpoints

ISP security partner since 2008
2 milion customer base

protected by ESET since 2017
more than 9,000 endpoints

protected by ESET since 2016
more than 4,000 mailboxes

protected by ESET since 2016
more than 32,000 endpoints

ISP security partner since 2008
2 milion customer base

protected by ESET since 2017
more than 9,000 endpoints

protected by ESET since 2016
more than 4,000 mailboxes

protected by ESET since 2016
more than 32,000 endpoints

ISP security partner since 2008
2 million customer base

Committed to the highest industry standards

Respected by industry analysts

Learn more

Awarded in independent tests

See test results

Appreciated by customers worldwide

Read full reviews

Stay on top of cybersecurity news

Brought to you by awarded and recognized security researchers from ESET's 11 global R&D centers.

Corporate blog

Aspiring digital defender? Explore cybersecurity internships, scholarships and apprenticeships

Kickstart your cybersecurity career with internships, scholarships, and apprenticeships that provide hands-on experience, financial support, and structured training for aspiring digital defenders.

Boosting cyber health: How vulnerability and patch management decrease threat exposure

Is your business cyber health at risk? Learn how effective vulnerability and patch management can fortify your defense, reduce threats, and keep your network safe from cyberattacks.

Webinars

We (could have) cracked open your network for under $100

On-demand

Are you creating a potentially massive vulnerability when decommissioned hardware leaves the premises?

Cyber Insurance: How to Meet Security Requirements

On-demand

This presentation will cover the cybersecurity solutions you need to have in place...

We Live Security blog

Month in security with Tony Anscombe – October 2024 edition

Election interference, American Water and the Internet Archive breaches, new cybersecurity laws, and more – October saw no shortage of impactful cybersecurity news stories

How to remove your personal information from Google Search results

Have you ever googled yourself? Were you happy with what came up? If not, consider requesting the removal of your personal information from search results.