System requirements
For seamless operation of ESET Endpoint Antivirus, the system should meet the following hardware and software requirements (default product settings):
Processors Supported
Intel or AMD processor, 32-bit (x86) with SSE2 instruction set or 64-bit (x64), 1 GHz or higher
ARM64-based processor, 1 GHz or higher
Operating Systems
Microsoft® Windows® 11
Microsoft® Windows® 10
For a detailed list of supported Microsoft® Windows® 10 and Microsoft® Windows® 11 versions, see the Windows Operating system support policy. |
Always keep your operating system up to date. |
Support for Azure Code Signing must be installed on all Windows operating systems to install or upgrade ESET products released after July 2023. More information. |
ESET Endpoint Antivirus features requirements
See the system requirements for specific ESET Endpoint Antivirus features in the table below:
Feature |
Requirements |
---|---|
Intel® Threat Detection Technology |
See the supported processors. |
Specialized Cleaner |
Non-ARM64-based processor. |
Exploit Blocker |
Non-ARM64-based processor. |
Deep Behavioral Inspection |
Non-ARM64-based processor. |
The ESET Endpoint Antivirus installer created in ESET PROTECT On-Prem supports Windows 10 Enterprise for Virtual Desktops and Windows 10 multi-session mode. |
Other
- System requirements of the operating system and other software installed on the computer are fulfilled
- 0.3 GB of free system memory (see Note 1)
- 1 GB of free disk space (see Note 2)
- Minimum display resolution 1024 x 768
- Internet connection or a local area network connection to a source (see Note 3) for product updates
- Two antivirus programs running simultaneously on a single device causes inevitable system resource conflicts, such as slowing down the system to make it inoperable
Although installing and running the product on systems that do not meet these requirements might be possible, we recommend prior usability testing based on performance requirements.
(1) The product might use more memory if the memory would be otherwise unused on a heavily infected computer or when huge data lists are being imported into the product (for example, URL white lists). |