System requirements and license information

Supported operating systems

For computers

  • Microsoft Windows 10, 8.1, 8, 7
  • macOS 10.12 and later
  • Ubuntu Desktop 18.04 LTS 64-bit and RedHat Enterprise Linux (RHEL) Desktop 7 64-bit

For smartphones and tablets

  • Android 5 (Lollipop) and later
  • iOS 8 and later

For file servers

  • Microsoft Windows Server 2019, 2016, 2012, 2008
  • Microsoft Windows Storage Server 2016, 2012, 2008
  • Microsoft Windows MultiPoint Server 2012, 2011, 2010
  • Microsoft Windows Small Business Server 2011
  • RedHat Enterprise Linux (RHEL) 7 64-bit
  • CentOS 7 64-bit
  • Ubuntu Server 16.04 LTS 64-bit, 18.04 LTS 64-bit
  • Debian 9 64-bit
  • SUSE Linux Enterprise Server (SLES) 12 64-bit, 15 64-bit

For mail servers

  • Microsoft Windows Server 2016, 2012, 2008, 2003
  • Microsoft Small Business Server 2011
  • Microsoft Exchange Server 2019, 2016, 2013, 2010, 2007

For virtual environments

  • VMware vSphere 6.0, 6.5+, 6.7+ (vCenter Single Sign-On, vSphere Client/Web Client, vCenter Server, vCenter Inventory Service)
  • VMware NSX Manager 6.3+, 6.4.0, 6.4.1, 6.4.2
  • VMware Guest Introspection 6.2.4+, 6.3+, 6.4+

For cloud applications protection

  • Subscription for Microsoft 365 to connect with the tenant (Exchange Online, OneDrive)

License information

Cloud and on-premise management included

Remote management platform is available as cloud-based or on-premises deployment. No need to buy or maintain additional hardware, reducing the total cost of ownership.

Flexible licensing

Mix and match your licenses as needed
ESET Unilicense covers all the bases, allowing you to mix and match endpoint protection without wasting a single license.

Add additional devices at any time
You can purchase licenses for additional computers, laptops, mobile devices and servers any time.

Transfer a license to another computer
You can transfer a valid ESET license to a completely new computer from the original one. In addition, you can switch from one OS to another.

Switch to a different platform at any time
It's easy to switch your protection from one platform to another at any point during the license term without having to purchase additional licenses.

Are you an existing customer?

Renew Today

Renew, upgrade or add devices to your existing ESET license.

Manage Licenses

ESET Business Account is a license management platform for business customers.

Installation

Install your purchased protection on additional devices.

Need Assistance?

All ESET products include free technical support in your language.

See interactive demo or start a free trial

What IT pros are saying

"Runs better than ANY other AV I have EVER used, blocks the issues before the user can attempt to use the questionable files."

Read full review

"I enjoy the continuous protection, automatic updates, and small size of this program in comparison to other options."

Read full review

"The things I enjoy most about their products is how light they run on my clients' systems and how easy they are to manage and configure."

Read full review
ESET PROTECT Advanced is a leader in Small-Business Endpoint Protection Suites on G2

Based on customer reviews, through G2 Crowd surveys that asked ESET business customers to rate their experiences using ESET Endpoint Security.

protected by ESET since 2017
more than 9,000 endpoints

protected by ESET since 2016
more than 4,000 mailboxes

protected by ESET since 2016
more than 14,000 endpoints

ISP security partner since 2008
2 million customer base

Committed to the highest industry standards

Respected by industry analysts

Learn more

Awarded in independent tests

See test results

ESET PROTECT Advanced is a leader in Small-Business Endpoint Protection Suites on G2

Appreciated by customers worldwide

Read full reviews

Stay on top of cybersecurity news

Brought to you by awarded and recognized security researchers from ESET's 13 global R&D centers.

Corporate blog

Leveling the playing field for all with MDR

One thing that every company, from the smallest business to the largest enterprise, has in common is that all of them face a world of evolving threats.

Imagine vacationing without a smartphone — cybercriminals can’t

With all of the fake websites and apps out there, critical cybersecurity for travelers begins at home before the trip even starts.

See more

We Live Security blog

Major phishing-as-a-service platform disrupted – Week in security with Tony Anscombe

The investigation uncovered at least 40,000 phishing domains that were linked to LabHost and tricked victims into handing over their sensitive details

Gripped by Python: 5 reasons why Python is popular among cybersecurity professionals

Python’s versatility and short learning curve are just two factors that explain the language’s 'grip' on cybersecurity