System requirements and subscription information

Supported operating systems

For computers

  • Microsoft Windows 11, 10
  • ARM64: Please note that on Microsoft® Windows® on ARM, some features and functionalities are not supported. Read more
  • macOS 11 and later. ESET Endpoint Security for macOS provides native support for ARM-based Apple chips.
  • Ubuntu Desktop 20.04 LTS, 22.04 LTS, 24.04 LTS, Red Hat Enterprise Linux 8, 9 with supported desktop environment installed, Linux Mint 20, 21, 22

For smartphones and tablets

  • Android 9 (Pie) and later
  • iOS 9 and later

For file servers

  • Microsoft Windows Server 2025, 2022, 2019, 2016, 2012 R2
  • RedHat Enterprise Linux (RHEL)  8, 9
  • Ubuntu Server 20.04 LTS, 22.04 LTS, 24.04 LTS
  • Debian 11, 12
  • SUSE Linux Enterprise Server (SLES) 15
  • Alma Linux 8, 9
  • Rocky Linux 8, 9
  • Oracle Linux 8, 9
  • Amazon Linux 2, 2023

For mail servers

  • Microsoft Exchange Server 2019 up to CU15, 2016 up to CU23, 2013 up to CU23 (CU1 and CU4 are not supported), 2010 SP3 up to RU32
  • Microsoft Windows Server 2025, 2022, 2019, 2016, 2012 R2

For virtual environments

  • VMware vSphere 6.0, 6.5+, 6.7+ (vCenter Single Sign-On, vSphere Client/Web Client, vCenter Server, vCenter Inventory Service)
  • VMware NSX Manager 6.3+, 6.4.0, 6.4.1, 6.4.2
  • VMware Guest Introspection 6.2.4+, 6.3+, 6.4+

For cloud applications protection

  • Subscription for Microsoft 365 or Google Workspace to connect with the tenant (Exchange Online, OneDrive, SharePoint Online, Teams, Gmail, Google Drive)

Subscription information

Cloud and on-premises management included

Remote management platform is available as cloud-based or on-premises deployment. No need to buy or maintain additional hardware, reducing the total cost of ownership.

Subscription flexibility

Mix and match your subscription as needed
Covers all the bases, allowing you to mix and match endpoint protection without wasting a single license.

Add additional devices at any time
You can purchase seats for additional computers, laptops, mobile devices and servers any time.

Transfer a subscription to another device
You can transfer a valid ESET subscription to a completely new device from the original one. In addition, you can switch from one OS to another.

Switch to a different platform at any time
It's easy to switch your protection from one platform to another at any point during the subscription term without having to purchase additional subscriptions.

Are you an existing customer?

Renew today

Renew, upgrade or add devices to your existing ESET subscription.

Manage subscriptions

Enter ESET PROTECT Hub to manage your purchased subscriptions.

Installation

Install your purchased protection on additional devices.

Need assistance?

All ESET products include free technical support in your language.

See interactive demo or start a free trial

Protected by ESET since 2017
More than 9,000 endpoints

Protected by ESET since 2016
More than 4,000 mailboxes

Protected by ESET since 2016
More than 32,000 endpoints

ISP security partner since 2008
2 milion customer base

protected by ESET since 2017
more than 9,000 endpoints

protected by ESET since 2016
more than 4,000 mailboxes

protected by ESET since 2016
more than 32,000 endpoints

ISP security partner since 2008
2 milion customer base

protected by ESET since 2017
more than 9,000 endpoints

protected by ESET since 2016
more than 4,000 mailboxes

protected by ESET since 2016
more than 32,000 endpoints

ISP security partner since 2008
2 million customer base

Stay on top of cybersecurity news

Brought to you by awarded and recognized security researchers from ESET's 11 global R&D centers.

ESET blog

Playing it safe: How to spot and fight cyberbullying in online games

Children have started gaming earlier than ever, some even before the age of five. How can you shield them from possible cyberbullies and keep the experience safe?

Old threats, novel tactics: Android users face new AI security challenges

ESET Research reveals how cybercriminals have improved their malicious campaigns.

What is ransomware, and how can you avoid falling victim to it?

Understanding the nature of ransomware and how it has evolved from the early beginnings to becoming the prime cybersecurity threat to organizations and individuals is key to working out how to prevent…

What is antivirus software, how does it work, and why does it still matter?

Learn what antivirus software is, how modern antivirus works, what threats it blocks, and why it still matters.

Webinars

We (could have) cracked open your network for under $100

On-demand

Are you creating a potentially massive vulnerability when decommissioned hardware leaves the premises?

Cyber Insurance: How to Meet Security Requirements

On-demand

This presentation will cover the cybersecurity solutions you need to have in place...

We Live Security blog

This month in security with Tony Anscombe – February 2026 edition

In this roundup, Tony looks at how opportunistic threat actors are taking advantage of weak authentication, unmanaged exposure, and popular AI tools

Mobile app permissions (still) matter more than you may think

Start using a new app and you’ll often be asked to grant it permissions. But blindly accepting them could expose you to serious privacy and security risks.