Version comparison
Feature |
Version 6 |
(ESET Endpoint Antivirus) Version 7.3 & 7.4 |
Version 8 |
---|---|---|---|
Architecture |
Monolithic |
Micro-services |
Micro-services |
Architectural security profile |
The main process runs under root (all important operations are done by the main process) |
Each service runs with the lowest possible rights Lower possible attack vector Vulnerability in one service doesn't expose the whole application. Crashing or hijacking one product process will not disable all protections |
Same as in version 7 |
Architectural Stability profile |
Crash in monolithic scanner causes a temporal void in protection Automatic process reboot in case of a crash |
Non-critical service crash will not cause a pause in protection Simpler services optimized for specific tasks Automatic service reboot in case of a crash |
Same as in version 7 |
macOS Support |
10.12 (Sierra) 10.13 (High Sierra) 10.14 (Mojave) 10.15 (Catalina) 11 (Big Sur) 12 (Monterey) 13 (Ventura) 14 (Sonoma) |
10.15 Catalina (only version 7.3) 11 (Big Sur) 12 (Monterey) 13 (Ventura) 14 (Sonoma) |
11 (Big Sur) 12 (Monterey) 13 (Ventura) 14 (Sonoma) 15 (Sequoia) |
Native 64-bit scanning engine |
x |
x |
x |
Native 64-bit application |
x |
x |
x |
Multi-language support |
language-specific installation package |
all languages in one package (GUI language same as system) |
all languages in one package (GUI language same as system) |
Native ARM support |
|
from version 7.1.1700.0 |
x |
Rosetta ARM support |
x |
x |
x |
Detection of potentially unwanted, unsafe and suspicious applications |
x |
x |
x |
Performance exclusions |
x |
x |
x |
Detection exclusions by Path & Detection |
After creating detection exclude (files are scanned, but issues are ignored) in ESET PROTECT On-Prem, it creates performance exclusion (files are not scanned). |
x |
x |
Detection exclusions by Detection |
|
x |
x |
Detection exclusions by Exact file (hash) |
|
x |
x |
Real-time file system protection |
x |
x |
x |
Increase network volumes compatibility |
x |
not needed |
not needed |
Scan under logged-in user |
|
x |
x |
Scan local drives |
x |
x |
x |
Scan removable media |
x |
x |
x |
Scan network drives |
x |
x |
x |
Scan on open, creation |
x |
x |
x |
Scan on execution |
x |
Yes, part of open |
Yes, part of open |
Process Exclusions |
|
x |
x |
Cloud-based protection |
x |
x |
x |
ESET LiveGrid© Reputation system |
x |
x (extended) |
x (extended) |
ESET LiveGrid© Feedback system |
x |
x |
x |
Granular configuration of what can be sent |
|
x |
x |
Malware scans (On-demand) |
x |
x |
x |
Scan of symbolic links |
x |
x |
x |
Scan of email files |
x |
x |
x |
Scan of mailboxes |
x |
x |
x |
Scan of archives |
x |
x |
x |
Scan of self-extracting archives |
x |
x |
x |
Scan of runtime packers |
x |
x |
x |
Scan alternative data streams (ADS) |
x |
x |
x |
Enable smart optimization |
x |
x |
x |
Exclude system folders from scanning |
x |
Not needed |
Not needed |
Run background scans with low priority |
|
x
|
x
|
Preserve last access timestamp |
x |
x |
x |
Start-up scan |
x |
|
|
Application exclusions |
x |
x |
x |
IP addresses exclusions |
x |
x |
x |
Web Access Protection (HTTP scanning) |
x |
x |
x |
Email Client protection |
x |
x |
x |
Anti-phishing protection |
x |
x |
x |
Custom Proxy server for Primary/secondary update server |
x |
x |
x |
Modules rollback |
x |
x |
x |
Pre-release updates |
x |
x |
x |
Delayed updates |
x |
x |
x |
Device Control |
x |
|
|
Firewall |
x |
|
x |
Web Control |
x |
|
|
ERMM support (command line interface for Remote Monitoring and Management integration) |
x |
|
|
ESET Enterprise Inspector support |
x |
x |
x |
Command line interface |
x |
x (unified with ESET Endpoint for Linux) |
x (unified with ESET Endpoint for Linux) |
Detection log |
x |
x |
x |
Event log |
x |
x |
x |
Computer scan log |
x |
x |
x |
Import or export settings |
x |
x |
x |
Quarantine |
x |
x |
x |
Local task Scheduler |
x |
x |
x |
Proxy server configuration |
x |
x |
x |
Presentation mode |
x |
x (system native Do not disturb) |
x (system native Do not disturb) |
Log files |
x |
x |
x |
Detected threats |
x |
x |
x |
Events |
x |
x |
x |
Computer scan |
x |
x |
x |
Device Control |
x |
|
|
Firewall |
x |
|
x |
Filtered websites |
x |
x |
x |
Web Control |
x |
|
|
Log filtering |
x |
x |
x |
Protection statistics |
x |
x |
x |
Scheduler |
x |
x |
x |
Running processes |
x |
|
|
Quarantine |
x |
x |
x |
Submit file for analysis |
x |
x (7.4) |
x |
Protection status |
x |
x |
x |
Manual modules update |
x |
x |
x |
Local settings/configuration by the user |
x |
x |
x |
Import or export settings from GUI |
x |
x |
x |
Help |
x |
x |
x |
Brand new native graphical user interface |
|
x |
x |
Dark Mode support |
|
x |
x |
High-resolution display support |
x |
x |
x |
Ability to disable GUI to user |
|
x |
x |
Native notifications |
|
x |
x |
Menu bar |
x |
x |
x |
Ability to hide Menu bar icon |
x |
x |
x |
Context menu integration |
x |
|
x |
Granular control of protection status shown in GUI/reported to ESET PROTECT On-Prem or ESET PROTECT |
x |
x |
x |
System update notifications |
x |
x |
x |
Local GUI-based installation |
x |
x |
x |
Component-based installation |
x |
|
x |
Remote component-based installation (component installation needs additional steps) |
x |
|
x |
Silent installation support (via MDM pre-approvals) |
x |
x |
x |
Product update via reinstallation |
x |
x |
x |
Product update from ESET PROTECT On-Prem or ESET PROTECT |
x |
x |
x |
Activation with license key |
x |
x |
x |
Subscription license support |
x |
x |
x |
Activation via ESET PROTECT On-Prem or ESET PROTECT |
x |
x |
x |
Activation with offline license file |
x |
x |
x |
Compatibility with ESET PROTECT |
x |
x |
x |
Compatibility with ESET PROTECT On-Prem |
x |
x |
x |