System requirements and subscription information

Supported operating systems

For computers

  • Windows
  • macOS
  • Linux

Note: Exact features and functionality may vary depending on the OS and version used.

See detailed specifications here

For smartphones and tablets

  • Android
  • iOS and iPadOS (Mobile Device Management functionality only)

Note: Exact features and functionality may vary depending on the OS and version used.

See detailed specifications for Android security here
See detailed specifications for MDM here

For file servers

  • Windows
  • Linux

Note: Exact features and functionality may vary depending on the OS and version used.

See detailed specifications here

For mail servers

Supported mail servers

  • Exchange

Note: Exact features and functionality may vary depending on the server version used.

See detailed specifications here

For virtual environments

  • VMware vSphere 6.0, 6.5+, 6.7+ (vCenter Single Sign-On, vSphere Client/Web Client, vCenter Server, vCenter Inventory Service)
  • VMware NSX Manager 6.3+, 6.4.0, 6.4.1, 6.4.2
  • VMware Guest Introspection 6.2.4+, 6.3+, 6.4+

For cloud workloads

  • Subscription to Microsoft Azure, Amazon Web Services, or Google Cloud Platform to connect with virtual machines (supported OS distributions: Linux and Windows).

For cloud applications protection

  • Subscription for Microsoft 365 or Google Workspace to connect with the tenant (Exchange Online, OneDrive, SharePoint Online, Teams, Gmail, Google Drive)

Subscription information

Cloud and on-premises management included

Remote management platform is available as cloud-based or on-premises deployment. No need to buy or maintain additional hardware, reducing the total cost of ownership.

Subscription flexibility

Mix and match your subscription as needed
Covers all the bases, allowing you to mix and match endpoint protection without wasting a single license.

Add additional devices at any time
You can purchase seats for additional computers, laptops, mobile devices and servers any time.

Transfer a subscription to another device
You can transfer a valid ESET subscription to a completely new device from the original one. In addition, you can switch from one OS to another.

Are you an existing customer?

Renew today

Renew, upgrade or add devices to your existing ESET subscription.

Manage subscriptions

Enter ESET PROTECT Hub to manage your purchased subscriptions.

Installation

Install your purchased protection on additional devices.

Need assistance?

All ESET products include free technical support in your language.

See interactive demo or start a free trial

Protected by ESET since 2017
More than 9,000 endpoints

Protected by ESET since 2016
More than 4,000 mailboxes

Protected by ESET since 2016
More than 32,000 endpoints

ISP security partner since 2008
2 milion customer base

protected by ESET since 2017
more than 9,000 endpoints

protected by ESET since 2016
more than 4,000 mailboxes

protected by ESET since 2016
more than 32,000 endpoints

ISP security partner since 2008
2 milion customer base

protected by ESET since 2017
more than 9,000 endpoints

protected by ESET since 2016
more than 4,000 mailboxes

protected by ESET since 2016
more than 32,000 endpoints

ISP security partner since 2008
2 million customer base

Stay on top of cybersecurity news

Brought to you by awarded and recognized security researchers from ESET's 11 global R&D centers.

ESET blog

How to take legacy operational technology (OT) risks in manufacturing head-on

Do you know how to bridge the gap between legacy risks and modern security needs?

Phishing is now more dangerous than ever. Businesses need new tools.

ESET boosts its Anti-Phishing with detection of malicious QR codes and calendar invites.

Sextortion explained: How to keep yourself and your family safe

We all know not to believe everything we read online. But when an email lands in your inbox from someone claiming to have compromiing images of you, reason tends to go out of the window.

Why threat intelligence is at the heart of security integration

Security analysts don’t need more noise. They need intelligence that’s fit for purpose, integrates, and delivers clarity without friction.

We Live Security blog

Digital assets after death: Managing risks to your loved one’s digital estate

Fraudsters often target the accounts of the deceased or their grieving relatives. Here’s how to keep the scammers at bay.

This month in security with Tony Anscombe – March 2026 edition

The past four weeks have seen a slew of new cybersecurity wake-up calls that showed why every organization needs a well-thought-out cyber-resilience plan