System requirements and subscription information

Supported operating systems

For computers

  • Microsoft Windows 11, 10
  • ARM64: Please note that on Microsoft® Windows® on ARM, some features and functionalities are not supported. Read more
  • macOS 11 and later. ESET Endpoint Security for macOS provides native support for ARM-based Apple chips.
  • Ubuntu Desktop 20.04 LTS, 22.04 LTS, 24.04 LTS, Red Hat Enterprise Linux 8, 9 with supported desktop environment installed, Linux Mint 20, 21, 22

For smartphones and tablets

  • Android 9 (Pie) and later
  • iOS 9 and later

For file servers

  • Microsoft Windows Server 2025, 2022, 2019, 2016, 2012 R2
  • RedHat Enterprise Linux (RHEL)  8, 9
  • Ubuntu Server 20.04 LTS, 22.04 LTS, 24.04 LTS
  • Debian 11, 12
  • SUSE Linux Enterprise Server (SLES) 15
  • Alma Linux 8, 9
  • Rocky Linux 8, 9
  • Oracle Linux 8, 9
  • Amazon Linux 2, 2023

For mail servers

  • Microsoft Exchange Server 2019 up to CU15, 2016 up to CU23, 2013 up to CU23 (CU1 and CU4 are not supported), 2010 SP3 up to RU32
  • Microsoft Windows Server 2025, 2022, 2019, 2016, 2012 R2

For virtual environments

  • VMware vSphere 6.0, 6.5+, 6.7+ (vCenter Single Sign-On, vSphere Client/Web Client, vCenter Server, vCenter Inventory Service)
  • VMware NSX Manager 6.3+, 6.4.0, 6.4.1, 6.4.2
  • VMware Guest Introspection 6.2.4+, 6.3+, 6.4+

For cloud applications protection

  • Subscription for Microsoft 365 or Google Workspace to connect with the tenant (Exchange Online, OneDrive, SharePoint Online, Teams, Gmail, Google Drive)

Subscription information

Cloud and on-premises management included

Remote management platform is available as cloud-based or on-premises deployment. No need to buy or maintain additional hardware, reducing the total cost of ownership.

Subscription flexibility

Mix and match your subscriptions as needed
Flexible subscription covers all the bases, allowing you to mix and match endpoint protection without wasting a single subscription.

Add additional devices at any time
You can purchase subscriptions for additional computers, laptops, mobile devices and servers any time.

Transfer a subscription to another computer
You can transfer a valid ESET subscription to a completely new computer from the original one. In addition, you can switch from one OS to another.

Switch to a different platform at any time
It's easy to switch your protection from one platform to another at any point during the subscription term without having to purchase additional subscriptions.

Are you an existing customer?

Renew today

Renew, upgrade or add devices to your existing ESET subscription.
 

Manage subscriptions

Enter ESET PROTECT Hub to manage your purchased subscriptions.
 

Installation

Install your purchased protection on additional devices.
 

Need assistance?

All ESET products include free technical support in your language.
 

Renew today

Renew, upgrade or add devices to your existing ESET subscription.

Manage subscriptions

Enter ESET PROTECT Hub to manage your purchased subscriptions.

Installation

Install your purchased protection on additional devices.

Need assistance?

All ESET products include free technical support in your language.

Watch demos or start a free trial

Protected by ESET since 2017
more than 9,000 endpoints

Protected by ESET since 2016
more than 4,000 mailboxes

Protected by ESET since 2016
more than 32,000 endpoints

ISP security partner since 2008
2 milion customer base

Stay on top of cybersecurity news

Brought to you by awarded and recognized security researchers from ESET's 11 global R&D centers.

ESET Blog

The world of ransomware sees new players and tactics. Businesses need to improve their prevention methods

Cybercriminals increasingly utilize Ransomware as a Service boosted by EDR Killers. ESET meets the challenge with its prevention-first approach.

ESET World 2025: From prevention to response featuring Forrester

Follow Forrester’s Joseph Blankenship and Padraic Harrington as they explore the endpoint security cycle in all its modern glory during ESET World 2025.

See more

We Live Security blog

Phishing, privileges and passwords: Why identity is critical to improving cybersecurity posture

Identity is effectively the new network boundary. It must be protected at all costs.

MuddyWater: Snakes by the riverbank

MuddyWater targets critical infrastructure in Israel and Egypt, relying on custom malware, improved tactics, and a predictable playbook