System requirements
For seamless operation of ESET Endpoint Security, the system should meet the following hardware and software requirements (default product settings):
Processors Supported
Intel or AMD processor, 32-bit (x86) with SSE2 instruction set or 64-bit (x64), 1 GHz or higher
ARM64-based processor, 1 GHz or higher
Operating Systems
Microsoft® Windows® 11
Microsoft® Windows® 10
For a detailed list of supported Microsoft® Windows® 10 and Microsoft® Windows® 11 versions, see the Windows Operating system support policy. |
Always keep your operating system up to date. |
The ESET Endpoint Security installer created in ESET PROTECT 8.1 and later supports Windows 10 Enterprise for Virtual Desktops and Windows 10 multi-session mode. |
ESET Endpoint Security features requirements
See the system requirements for specific ESET Endpoint Security features in the table below:
Feature |
Requirements |
---|---|
Intel® Threat Detection Technology |
See the supported processors. |
Secure Browser |
See the supported web browsers. |
Specialized Cleaner |
Non-ARM64-based processor |
Exploit Blocker |
Non-ARM64-based processor. |
Deep Behavioral Inspection |
Non-ARM64-based processor. |
Secure Browser – website redirection |
Non-ARM64-based processor. |
Other
- System requirements of the operating system and other software installed on the computer are fulfilled
- 0.3 GB of free system memory (see Note 1)
- 1 GB of free disk space (see Note 2)
- Minimum display resolution 1024 x 768
- Internet connection or a local area network connection to a source (see Note 3) for product updates
- Two antivirus programs running simultaneously on a single device causes inevitable system resource conflicts, such as slowing down the system to make it inoperable
Although installing and running the product on systems that do not meet these requirements might be possible, ESET recommends prior usability testing based on performance requirements.
(1) The product might use more memory if the memory would be otherwise unused on a heavily infected computer or when huge data lists are being imported into the product (for example, URL white lists). |