{"description":"Microsoft Defender \u8106\u5f31\u6027\u306e\u7ba1\u7406\uff08Microsoft Defender Vulnerability Management\uff09\u304c\u30b9\u30bf\u30f3\u30c9\u30a2\u30ed\u30f3\u306e\u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3\u3068\u3057\u3066\u3082\u63d0\u4f9b\u3055\u308c\u308b\u767a\u8868\u304c\u3042\u308a\u307e\u3057\u305f\u3002Availability of Defender Vulnerability Management Standalone and Container vulnerability assessments Defender \u8106\u5f31\u6027\u7ba1\u7406\u306f\u3001\u30a8\u30fc\u30b8\u30a7\u30f3\u30c8\u30ec\u30b9\u306e\u30b9\u30ad\u30e3\u30ca\u30fc\u3067\u30c7\u30d0\u30a4\u30b9\u306e\u30ea\u30b9\u30af\u3092\u7d99\u7d9a\u7684\u306b\u76e3\u8996\u3001\u691c\u51fa\u3057\u3001\u307e\u305f\u7d71\u5408\u3055\u308c\u305f\u30a4\u30f3\u30d9\u30f3\u30c8\u30ea\u306b\u3088\u308a\u3001\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2 \u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u3001\u30c7\u30b8\u30bf\u30eb\u8a3c\u660e\u66f8\u3001\u30cf\u30fc\u30c9\u2026","height":"190","provider_name":"Hatena Blog","provider_url":"https://hatena.blog","blog_title":"tos-akiba\u306e\u30d6\u30ed\u30b0","title":"Microsoft Defender \u8106\u5f31\u6027\u306e\u7ba1\u7406\u304c\u30b9\u30bf\u30f3\u30c9\u30a2\u30ed\u30f3\u3067\u3082\u63d0\u4f9b\u53ef\u80fd\u306b","version":"1.0","url":"https://akitec.hatenablog.com/entry/2023/08/17/164427","published":"2023-08-17 16:44:27","width":"100%","image_url":null,"author_name":"tos-akiba","categories":[],"type":"rich","author_url":"https://blog.hatena.ne.jp/tos-akiba/","blog_url":"https://akitec.hatenablog.com/","html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2Fakitec.hatenablog.com%2Fentry%2F2023%2F08%2F17%2F164427\" title=\"Microsoft Defender \u8106\u5f31\u6027\u306e\u7ba1\u7406\u304c\u30b9\u30bf\u30f3\u30c9\u30a2\u30ed\u30f3\u3067\u3082\u63d0\u4f9b\u53ef\u80fd\u306b - tos-akiba\u306e\u30d6\u30ed\u30b0\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>"}