How to Buy
For administrators managing devices on behalf of their organization, Windows 11 will be available through the same, familiar channels that you use today for Windows 10 feature updates. You will be able to use existing deployment and management tools, such as Windows Update for Business, Microsoft Endpoint Manager, and Windows Autopilot. For more information, seePlan for Windows 11.
For devices that are not managed by an organization, the Windows 11 upgrade will be offered to eligible Windows 10 devices through Windows Update using Microsoft's intelligent rollout process to ensure a smooth upgrade experience.
For more information about device eligibility, seeWindows 11 requirements.
Windows 11 Enterprise
Windows 11 Enterprise is licensed as an upgrade license to Windows Pro. Windows 11 Enterprise may be licensed through the Windows Enterprise per device license, the Windows Enterprise E3 per user license, or the Windows Enterprise E5 per user license. Users without Windows Pro devices to upgrade from may still license Windows Enterprise for remote virtualization scenarios with the Windows VDA E3 or E5 license.
Windows 11 Enterprise E3
Windows 11 Enterprise E3 provides access to Windows 11 Enterprise edition, and includes a set of Windows cloud services that enable advanced protection against modern security threats, a broad range of options for operating system deployments and updates, and comprehensive device and application management. Learn morehere.
Windows 11 Enterprise E5
Windows 11 Enterprise E5 includes everything in Windows 11 Enterprise E3with the addition of Microsoft Defender for Endpoint—a security service that helps enterprises detect, investigate, and respond to advanced attacks on their networks.
Building on the existing security defenses in Windows 11 Enterprise E3, Microsoft Defender for Endpoint provides a post-breach layer of protection to the Windows 10 security stack. With a combination of client technology built into Windows 11 and a robust cloud service, it can help detect threats that have made it past other defenses, provide enterprises with information to investigate the breach across endpoints, and offer response recommendations.