{"blog_title":"NFLabs. \u30a8\u30f3\u30b8\u30cb\u30a2\u30d6\u30ed\u30b0","author_name":"yuyusanta","blog_url":"https://blog.nflabs.jp/","html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2Fblog.nflabs.jp%2Fentry%2F2023%2F03%2F10%2F133000\" title=\"MDVM(Microsoft Defender Vulnerability Management)\u306e\u65b0\u6a5f\u80fd\u3092\u4f7f\u3063\u3066\u307f\u305f - NFLabs. \u30a8\u30f3\u30b8\u30cb\u30a2\u30d6\u30ed\u30b0\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>","author_url":"https://blog.hatena.ne.jp/yuyusanta/","version":"1.0","categories":["Security","Microsoft 365","Microsoft 365 Defender"],"width":"100%","published":"2023-03-10 13:30:00","url":"https://blog.nflabs.jp/entry/2023/03/10/133000","height":"190","title":"MDVM(Microsoft Defender Vulnerability Management)\u306e\u65b0\u6a5f\u80fd\u3092\u4f7f\u3063\u3066\u307f\u305f","image_url":"https://cdn-ak.f.st-hatena.com/images/fotolife/y/yuyusanta/20230308/20230308143632.png","provider_name":"Hatena Blog","provider_url":"https://hatena.blog","type":"rich","description":"\u306f\u3058\u3081\u306b \u3053\u3093\u306b\u3061\u306f\u3002\u7814\u7a76\u958b\u767a\u90e8 \u5165\u793e2\u5e74\u76ee\u306e\u5317\u6751\u3067\u3059\u3002 \u6700\u8fd1\u3001\u793e\u5185\u3067\u5229\u7528\u3057\u3066\u3044\u308bMicrosoft 365\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u95a2\u9023\u306e\u696d\u52d9\u3092\u6271\u3046\u3053\u3068\u304c\u591a\u304f\u306a\u308a\u3001\u65e5\u3005\u7cbe\u9032\u3057\u3066\u3044\u307e\u3059('\u25c7')\u309e \u3055\u3063\u305d\u304f\u3067\u3059\u304c\u5148\u65e5\u3001MDVM(Microsoft Defender Vulnerability Management)\u306eadd-on\u304c2023.3.1\u306bGA(\u4e00\u822c\u516c\u958b)\u306b\u306a\u3063\u305f\u306e\u3067\u4f7f\u3063\u3066\u307f\u307e\u3057\u305f\uff01 \u672c\u7a3f\u3067\u306f\u3001MDVM\u3068\u8ffd\u52a0\u3055\u308c\u305fadd-on\u306b\u3064\u3044\u3066\u7d39\u4ecb\u3092\u3057\u305f\u3044\u3068\u601d\u3044\u307e\u3059\u3002 \u3053\u306e\u8ffd\u52a0\u6a5f\u80fd\u306fDefender for Endpoint \u30d7\u30e9\u30f32\u304a\u3088\u3073Microsoft 365 E5 \u30e9\u30a4\u30bb\u30f3\u30b9\u3092\u304a\u6301\u3061\u306e\u65b9\u3067\u3042\u308c\u3070\u3001a\u2026"}