System requirements and subscription information

Supported operating systems

For computers

  • Microsoft Windows 11, 10
  • ARM64: Please note that on Microsoft® Windows® on ARM, some features and functionalities are not supported. Read more
  • macOS 11 and later. ESET Endpoint Security for macOS provides native support for ARM-based Apple chips.
  • Ubuntu Desktop 20.04 LTS, 22.04 LTS, 24.04 LTS, Red Hat Enterprise Linux 8, 9 with supported desktop environment installed, Linux Mint 20, 21, 22

For smartphones and tablets

  • Android 9 (Pie) and later
  • iOS 9 and later

For file servers

  • Microsoft Windows Server 2025, 2022, 2019, 2016, 2012 R2
  • RedHat Enterprise Linux (RHEL)  8, 9
  • Ubuntu Server 20.04 LTS, 22.04 LTS, 24.04 LTS
  • Debian 11, 12
  • SUSE Linux Enterprise Server (SLES) 15
  • Alma Linux 8, 9
  • Rocky Linux 8, 9
  • Oracle Linux 8, 9
  • Amazon Linux 2, 2023

For mail servers

  • Microsoft Exchange Server 2019 up to CU15, 2016 up to CU23, 2013 up to CU23 (CU1 and CU4 are not supported), 2010 SP3 up to RU32
  • Microsoft Windows Server 2025, 2022, 2019, 2016, 2012 R2

For virtual environments

  • VMware vSphere 6.0, 6.5+, 6.7+ (vCenter Single Sign-On, vSphere Client/Web Client, vCenter Server, vCenter Inventory Service)
  • VMware NSX Manager 6.3+, 6.4.0, 6.4.1, 6.4.2
  • VMware Guest Introspection 6.2.4+, 6.3+, 6.4+

For cloud applications protection

  • Subscription for Microsoft 365 or Google Workspace to connect with the tenant (Exchange Online, OneDrive, SharePoint Online, Teams, Gmail, Google Drive)

Subscription information

Cloud and on-premises management included

Remote management platform is available as cloud-based or on-premises deployment. No need to buy or maintain additional hardware, reducing the total cost of ownership.

Subscription flexibility

Mix and match your subscription as needed
Covers all the bases, allowing you to mix and match endpoint protection without wasting a single license.

Add additional devices at any time
You can purchase seats for additional computers, laptops, mobile devices and servers any time.

Transfer a subscription to another computer
You can transfer a valid ESET subscription to a completely new computer from the original one. In addition, you can switch from one OS to another.

Switch to a different platform at any time
It's easy to switch your protection from one platform to another at any point during the subscription term without having to purchase additional subscriptions.

Are you an existing customer?

Renew today

Renew, upgrade or add devices to your existing ESET subscription.

Manage subscriptions

Enter ESET PROTECT Hub to manage your purchased subscriptions.

Installation

Install your purchased protection on additional devices.

Need assistance?

All ESET products include free technical support in your language.

See interactive demo or start a free trial

Protected by ESET since 2017
More than 9,000 endpoints

Protected by ESET since 2016
More than 4,000 mailboxes

Protected by ESET since 2016
More than 32,000 endpoints

ISP security partner since 2008
2 milion customer base

protected by ESET since 2017
more than 9,000 endpoints

protected by ESET since 2016
more than 4,000 mailboxes

protected by ESET since 2016
more than 32,000 endpoints

ISP security partner since 2008
2 milion customer base

protected by ESET since 2017
more than 9,000 endpoints

protected by ESET since 2016
more than 4,000 mailboxes

protected by ESET since 2016
more than 32,000 endpoints

ISP security partner since 2008
2 million customer base

Stay on top of cybersecurity news

Brought to you by awarded and recognized security researchers from ESET's 11 global R&D centers.

ESET blog

Buried in rules: How to stay ahead of compliance

There’s a duality to compliance, wherein it is both a growing burden, but also an excellent opportunity.

What does ESET’s recognition as a Customers’ Choice for Endpoint Protection Platforms by the 2026 Gartner® Peer Insights™ mean for end users?

Learn what this recognition means for organizations seeking reliable, scalable endpoint protection.

Help young gamers dodge Fortnite’s risks

Fortnite is more than just a popular game. It’s a social space where children play, communicate, and form habits that reach beyond the screen. What are its main risks, and how can parents help kids…

The most common scams small businesses should be aware of

Scams get more sophisticated, and everyone is a target.

Webinars

We (could have) cracked open your network for under $100

On-demand

Are you creating a potentially massive vulnerability when decommissioned hardware leaves the premises?

Cyber Insurance: How to Meet Security Requirements

On-demand

This presentation will cover the cybersecurity solutions you need to have in place...

We Live Security blog

Taxing times: Top IRS scams to look out for in 2026

It’s time to file your tax return. And cybercriminals are lurking to make an already stressful period even more edgy.

OfferUp scammers are out in force: Here’s what you should know

The mobile marketplace app has a growing number of users, but not all of them are genuine. Watch out for these common scams.