You are viewing a printer friendly version of this ESET Knowledgebase article.

ESET Knowledgebase

ESET Knowledgebase

Download and Install ESET Internet Security

Issue

This article applies to the following product:

  • ESET Internet Security

 

Solution

  1. Uninstall any previously installed antivirus software on your system.

  2. If you have a CD, insert it into your computer (if the installation does not begin automatically, click Start → Computer and double-click the ESET disc icon).

    To install without a CD:
    1. Download the ESET Internet Security installer file.

    2. Double-click the installer file to begin installation.
  1. In the Install ESET Internet Security window, click Continue.

Figure 1-1

  1. Review the End-user license agreement and click I Accept.

Figure 1-2

  1. In the I have a license window, click Enter a License Key. If you are updating from a previous version, your license information will be entered automatically.


Click here if you do not have a License Key or did not receive an email with license info following your purchase.

Figure 1-3

  1. Type or copy/paste your License Key in the License Key field and click Continue. Make sure you enter the License Key exactly as it appears and include the hyphens. If you copy/paste be sure you do not accidentally select additional space around the text. If you have a CD, type your Activation Key (printed on the label) in the blank field. Be sure to include the hyphens.

Figure 1-4

  1. Click Continue. You have the option to install a different product in this step, however doing so will keep you from using all of the features in ESET Internet Security.

Figure 1-5

 

  1. Select your preference for ESET Live Grid and Detection of Potentially Unwanted Applications. Click Install.

Figure 1-6
 

  1. Click Done to exit the Installation Wizard.

Figure 1-7

  1. ESET Internet Security is now installed and fully functional. You will be prompted to set up additional security tools. Click for help to setup Parental Control and Anti-Theft.

Figure 1-8