{"version":"1.0","provider_name":"evoila GmbH","provider_url":"https:\/\/evoila.com","author_name":"Marcin Chwa\u0142a","author_url":"https:\/\/evoila.com\/blog\/author\/marcin-chwala\/","title":"ESET Protect vs. Microsoft Defender for Endpoint","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"El1DPlfNg5\"><a href=\"https:\/\/evoila.com\/blog\/eset-protect-vs-microsoft-defender-for-endpoint\/\">ESET Protect vs. Microsoft Defender for Endpoint<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/evoila.com\/blog\/eset-protect-vs-microsoft-defender-for-endpoint\/embed\/#?secret=El1DPlfNg5\" width=\"600\" height=\"338\" title=\"&#8220;ESET Protect vs. Microsoft Defender for Endpoint&#8221; &#8212; evoila GmbH\" data-secret=\"El1DPlfNg5\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/evoila.com\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/evoila.com\/wp-content\/uploads\/2024\/04\/MicrosoftTeams-image-57.png","thumbnail_width":2000,"thumbnail_height":1125,"description":"Recently I had a chance to work for a customer who has been using ESET PROTECT antivirus. The Customer however plans to move away from the current antivirus solution, and gradually onboard all the devices into Microsoft Defender for Endpoint [MDE]. Before this can happen, existing settings and configuration of ESET must be reviewed and compared against the target solution, to ensure that rules, conditions, and exceptions can be set in place in MDE, and that MDE can take over the functionality. The exercise will focus on the current ESET PROTECT configuration being in place, not all the features available."}