[KB3241] Upgrade ESET Cyber Security or ESET Cyber Security Pro to the latest version

Issue

  • You want to upgrade to the latest version of ESET Cyber Security or ESET Cyber Security Pro
  • You recently upgraded your macOS and cannot open your ESET product
Cannot open your ESET product after upgrading

If you are unable to open ESET Cyber Security/Cyber Security Pro after upgrading your macOS, we recommend uninstalling and then installing the latest version. Visit our Knowledgebase article for instructions to Download, install and activate ESET Cyber Security or ESET Cyber Security Pro

Details


Click to expand

The latest version of ESET Cyber Security:

7.4.1600.0

When installing the latest version of ESET Cyber Security, users must have macOS Big Sur (11) or later.

Latest version of ESET Cyber Security Pro:

6.11.414.0

When installing the latest version of ESET Cyber Security Pro, users must have macOS 10.15 or later.


Solution

  1. Open the main program window of ESET Cyber Security or ESET Cyber Security Pro.

  2. If a new version is available, in the main program window, you will see the message “A new version of the product is available.”

    Click Learn more to display a new window containing the version number of the new build, the list of changes in the new version and other important information.

    Figure 1-1
Manually upgrade your ESET product

If the latest version of ESET Cyber Security or ESET Cyber Security Pro is available on ESET.com but does not display in the main program window, you can manually download and install the latest version.

  1. Click Yes to download the latest version.

    Figure 1-2
  2. Follow the on-screen instructions to install the latest version of your ESET product.

  3. If you are upgrading from version 6 to version 7, you must allow full disk access again after the upgrade is complete. Click the Apple menu icon → System settings.

  4. Click Privacy & SecurityFull Disk Access.

    Figure 1-3
  5. Click the toggles next to all the ESET options that are disabled to enable them.

    Figure 1-4