System requirements and subscription information

Supported operating systems

For computers

  • Windows
  • macOS
  • Linux

Note: Exact features and functionality may vary depending on the OS and version used.

See detailed specifications here

For smartphones and tablets

  • Android
  • iOS and iPadOS (Mobile Device Management functionality only)

Note: Exact features and functionality may vary depending on the OS and version used.

See detailed specifications for Android security here
See detailed specifications for MDM here

For file servers

  • Windows
  • Linux

Note: Exact features and functionality may vary depending on the OS and version used.

See detailed specifications here

For mail servers

Supported mail servers

  • Exchange

Note: Exact features and functionality may vary depending on the server version used.

See detailed specifications here

For cloud workloads

  • Subscription to Microsoft Azure, Amazon Web Services, or Google Cloud Platform to connect with virtual machines (supported OS distributions: Linux and Windows).

For virtual environments

  • VMware vSphere 6.0, 6.5+, 6.7+ (vCenter Single Sign-On, vSphere Client/Web Client, vCenter Server, vCenter Inventory Service)
  • VMware NSX Manager 6.3+, 6.4.0, 6.4.1, 6.4.2
  • VMware Guest Introspection 6.2.4+, 6.3+, 6.4+

For cloud applications protection

  • Subscription for Microsoft 365 to connect with the tenant (Exchange Online, OneDrive, SharePoint Online, Teams)

License information

Cloud and on-premises management included

Remote management platform is available as cloud-based or on-premises deployment. No need to buy or maintain additional hardware, reducing the total cost of ownership.

Subscription flexibility

Mix and match your subscriptions as needed
Flexible subscription covers all the bases, allowing you to mix and match endpoint protection without wasting a single subscription.

Add additional devices at any time
You can purchase subscriptions for additional computers, laptops, mobile devices and servers any time.

Transfer a subscription to another device
You can transfer a valid ESET subscription to a completely new device from the original one. In addition, you can switch from one OS to another.

Are you an existing customer?

Renew today

Renew, upgrade or add devices to your existing ESET subscription.

Manage subscriptions

Enter ESET PROTECT Hub to manage your purchased subscriptions.

Installation

Install your purchased protection on additional devices.

Need assistance?

All ESET products include free technical support in your language.

Watch demos or start a free trial

What IT pros are saying

Angela S

"It is very much customizable tool. In my opinion it is the most functional, robust and manageable tool than any other."

Read full review

Jason D

"The interface is easy to use and lightweight on the system. When used on a 4+ core device with an SSD, the system impact is negligible for most office tasks."

Read full review
ESET PROTECT Advanced is a leader in Endpoint Protection Suites on G2

Jaliya S

"It is easy to use, simple and understandable. Therefore, we can easily manage the features of it. Also, it is easy to install, configure and update. "

Read full review

Jen D

"I love the way it helps us in detecting unnecessary things that are continuously running our systems behind. In this way it enhances the security of our system."

Read full review

Based on customer reviews, through G2 Crowd surveys that asked ESET business customers to rate their experiences using ESET Endpoint Security.

protected by ESET since 2017
more than 9,000 endpoints

protected by ESET since 2016
more than 4,000 mailboxes

protected by ESET since 2016
more than 32,000 endpoints

ISP security partner since 2008
2 milion customer base

Committed to the highest industry standards

ESET is a 'Major Player' in modern endpoint security IDC MarketScape: Worldwide Modern Endpoint Security for Enterprises 2021 Vendor Assessment

Learn more

ESET was awarded in multiple independent tests

See test results

ESET is a ‘Top Player’ in endpoint security Advanced Persistent Threat (APT) Protection - Market Quadrant 2021

Learn more

ESET PROTECT Advanced is a leader in Endpoint Protection Suites on G2

ESET is appreciated by customers worldwide

Read full reviews

ESET is among 'Established Vendors' in endpoint protection

Learn more

Respected by industry analysts

Learn more

Awarded in independent tests

See test results

Appreciated by customers worldwide

Read full reviews

Stay on top of cybersecurity news

Brought to you by awarded and recognized security researchers from ESET's 13 global R&D centers.

ESET blog

Zero Trust model explained: Why “never trust, always verify” matters more than ever

This article breaks down what Zero Trust means in 2026, how it has evolved, and why adoption has become an urgent strategic priority.

What are EDR killers? How ransomware attacks disable EDR and how to stop it

A practical guide to EDR killers and the tactics ransomware groups use to blind endpoint defenses.

Chat apps for kids: A parent’s guide to getting it right

Messaging apps open exciting social worlds for kids, but parental guidance is still advised. How to make chatting apps a safe space?

Why zero trust is critical for healthcare cybersecurity

Despite pressure from regulators and diligent efforts to bolster cybersecurity, attacks are common and healthcare organizations remain at substantial risk.

We Live Security blog

Recovery scammers hit you when you’re down: Here’s how to avoid a second strike

If you’ve been the victim of fraud, you’re likely already a lead on a ‘sucker list’ – and if you’re not careful, your ordeal may be about to get worse.

As breakout time accelerates, prevention-first cybersecurity takes center stage

Threat actors are using AI to supercharge tried-and-tested TTPs. When attacks move this fast, cyber-defenders need to rethink their own strategy.