{"version":"1.0","height":"190","width":"100%","published":"2026-01-30 19:38:25","title":"\u3010CrowdStrike\u3011Falcon Foundry\u5fb9\u5e95\u89e3\u8aac \u305d\u306e\uff13","url":"https://techblog.ap-com.co.jp/entry/2026/01/30/193825","categories":["CrowdStrike","Cyber Security","\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3","EDR","NG-SIEM"],"author_url":"https://blog.hatena.ne.jp/j_tanaka/","html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2Ftechblog.ap-com.co.jp%2Fentry%2F2026%2F01%2F30%2F193825\" title=\"\u3010CrowdStrike\u3011Falcon Foundry\u5fb9\u5e95\u89e3\u8aac \u305d\u306e\uff13 - APC \u6280\u8853\u30d6\u30ed\u30b0\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>","description":"\u4eca\u56de\u306f\u3001\u516c\u5f0f\u30c1\u30e5\u30fc\u30c8\u30ea\u30a2\u30eb\u300e\u8105\u5a01\u30cf\u30f3\u30c6\u30a3\u30f3\u30b0\u30c0\u30c3\u30b7\u30e5\u30dc\u30fc\u30c9\u3068\u30ec\u30dd\u30fc\u30c8\u30b9\u30b1\u30b8\u30e5\u30fc\u30eb\u306e\u4f5c\u6210\u300f\u3092\u984c\u6750\u306b\u3001Falcon\u30b3\u30f3\u30bd\u30fc\u30eb\u4e0a\u3067\u306eGUI\u958b\u767a\u30d5\u30ed\u30fc\u3092\u89e3\u8aac\u3057\u307e\u3059\u3002","type":"rich","provider_url":"https://hatena.blog","image_url":"https://cdn-ak.f.st-hatena.com/images/fotolife/j/j_tanaka/20260119/20260119104337.png","author_name":"j_tanaka","blog_title":"APC \u6280\u8853\u30d6\u30ed\u30b0","blog_url":"https://techblog.ap-com.co.jp/","provider_name":"Hatena Blog"}