System requirements and license information
Supported operating systems
For computers
- Microsoft Windows 11, 10, 8.1, 8, 7
- ARM64: Please note that on Microsoft® Windows® on ARM, some features and functionalities are not supported. Read more
- macOS 10.12 and later. ESET Endpoint Antivirus for macOS version 7 onwards provides native support for ARM-based Apple chips.
- Ubuntu Desktop 18.04 LTS 64-bit and RedHat Enterprise Linux (RHEL) Desktop 7 64-bit
For smartphones and tablets
- Android 5 (Lollipop) and later
- iOS 9 and later
For file servers
- Microsoft Windows Server 2022, 2019, 2016, 2012, 2008, R2 SP1
- Microsoft Windows Server Core 2012, 2008R2
- Microsoft Windows Small Business Server 2011
- RedHat Enterprise Linux (RHEL) 7, 8, 9
- CentOS 7
- Ubuntu Server 18.04 LTS, 20.04 LTS, 22.04 LTS
- Debian 10, 11
- SUSE Linux Enterprise Server (SLES) 12, 15
- Oracle Linux 8
- Amazon Linux 2
For mail servers
- Microsoft Exchange Server 2019, 2016, 2013, 2010, 2007
- Microsoft Windows Server 2019, 2016, 2012 R2, 2012, 2008 R2, 2008 SP2
- Microsoft Small Business Server 2011
- IBM Domino 6.5.4 and newer
- HCL Domino 11
For virtual environments
- VMware vSphere 6.0, 6.5+, 6.7+ (vCenter Single Sign-On, vSphere Client/Web Client, vCenter Server, vCenter Inventory Service)
- VMware NSX Manager 6.3+, 6.4.0, 6.4.1, 6.4.2
- VMware Guest Introspection 6.2.4+, 6.3+, 6.4+
For cloud applications protection
- Subscription for Microsoft 365 or Google Workspace to connect with the tenant (Exchange Online, OneDrive, SharePoint Online, Teams, Gmail, Google Drive)
Subscription information
Cloud and on-premises management included
Remote management platform is available as cloud-based or on-premises deployment. No need to buy or maintain additional hardware, reducing the total cost of ownership.
Subscription flexibility
Mix and match your subscriptions as needed
Flexible subscription covers all the bases, allowing you to mix and match endpoint protection without wasting a single subscription.
Add additional devices at any time
You can purchase subscriptions for additional computers, laptops, mobile devices and servers any time.
Transfer a subscription to another computer
You can transfer a valid ESET subscription to a completely new computer from the original one. In addition, you can switch from one OS to another.
Switch to a different platform at any time
It's easy to switch your protection from one platform to another at any point during the subscription term without having to purchase additional subscriptions.
Are you an existing customer?
Renew today
Renew, upgrade or add devices to your existing ESET license.
Manage licenses
ESET Business Account is a license management platform for business customers.
Installation
Install your purchased protection on additional devices.
Need assistance?
All ESET products include free technical support in your language.
See interactive demo or start a free trial
protected by ESET since 2017
more than 9,000 endpoints
protected by ESET since 2016
more than 4,000 mailboxes
protected by ESET since 2016
more than 32,000 endpoints
ISP security partner since 2008
2 million customer base
Based on customer reviews, through G2 Crowd surveys that asked ESET business customers to rate their experiences using ESET Endpoint Security.
What IT pros are saying
"Runs better than ANY other AV I have EVER used, blocks the issues before the user can attempt to use the questionable files."
Read full review
"I enjoy the continuous protection, automatic updates, and small size of this program in comparison to other options."
Read full review
"The things I enjoy most about their products is how light they run on my clients' systems and how easy they are to manage and configure."
Read full review
Committed to the highest industry standards
Respected by industry analysts
Awarded in independent tests
Appreciated by customers worldwide
Stay on top of cybersecurity news
Brought to you by awarded and recognized security researchers from ESET's 13 global R&D centers.
Cloud console included The license allows you to choose either a cloud-based or on-premises management console. Select your preferred deployment after purchase.
RECOMMENDED
Cloud console included The license allows you to choose either a cloud-based or on-premises management console. Select your preferred deployment after purchase.
Cloud console included The license allows you to choose either a cloud-based or on-premises management console. Select your preferred deployment after purchase.
RECOMMENDED
Cloud console included The license allows you to choose either a cloud-based or on-premises management console. Select your preferred deployment after purchase.
Price available on request
Cloud console included The license allows you to choose either a cloud-based or on-premises management console. Select your preferred deployment after purchase.
Price available on request
RECOMMENDED
Endpoint Detection & Response
Includes ESET Enterprise Inspector
Highly customizable EDR enables identification of anomalous behavior and further investigation with subsequent response capabilities to incidents and breaches. Learn more
*manageable only via on-premises ESET PROTECT console
Cloud‑based
console
Full Security Management - from Prevention to Response
Automated security management and threat remediation
Flexible, comprehensive reporting
Complete network visibility
Includes
ESET PROTECT
cloud or on-premises
Endpoint Protection
Comprehensive, cross-platform protection for computers and mobile devices
Block targeted attacks
Stop fileless attacks
Secure Browser
File Sever
Security
Multilayered protection for the file server system
Safeguard the file storage
Network Attack Protection improves server resilience
Detect advanced persistent threats
Includes
ESET File Security
Full Disk Encryption
Manage encryption on Windows and macOS machines
Deploy, activate and encrypt devices in a single action
Encrypt system disks, partitions or entire drives
Includes
ESET Full Disk Encryption
Cloud
Sandbox
Ransomware and zero-day threats detection
Powerful cloud sandbox analysis backed by machine learning techniques
Behavior-based Detection
Granular reports with detailed information about samples and their behavior
Includes
ESET Dynamic Threat Defense
Mail
Security
Multilayered technology filtering spam and malware
Anti-phishing protection
Protection for the server's file system
Robust quarantive management
Includes
ESET Mail Security
Cloud app protection
Enhanced anti-spam, anti-malware, anti-phishing and cloud sandboxing technology.
Automatic protection of new user mailboxes
Immediate notification when detection of malware occurs
Protecting Exchange Online and OneDrive applications
Includes
ESET Cloud Office Security
Endpoint Detection & Response
Synchronized detection and remediation in multiplatform environments
Respond to incidents with built-in set of rules or custom rules
Prevent company policy violation
Features an API for effective integration with SIEMs, SOARs, ticketing tools and many others
Includes
ESET Enterprise Inspector
Related resources and documents
Solution overview
ESET Endpoint Solutions provides reliable protection against advanced threats and attacks.
Use Cases
Future proof your IT security with cloud sandboxing and behavior-based detection.
Technology
How ESET leading-edge technology goes far beyond the capabilities of basic antivirus?
Customer stories
What our customers appreciate on ESET? Find the customer stories relevant for your industry.
Manage your endpoints wherever you are
Experience the console's full potential right now.
No need to install or set up anything.
Single-click management
Actions such as create an exclusion, submit files for further analysis or initiate a scan are available within a single click.
Advanced reports
ESET PROTECT platform provides over 170 built-in reports and allows you to create custom reports from over 1000 data points.
Custom notifications
Use predefined notification or create your own. The notification system features a full “what you see is what you get” editor.
Integration via APIs
ESET PROTECT Platform features well-documented APIs that enable effective integration with tools such as SIEM, SOAR, and many others.
Learn more