<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:xhtml="http://www.w3.org/1999/xhtml">
  <url>
    <loc>https://help.defense.com/en/articles/4967198-how-to-reset-two-factor-authentication-2fa</loc>
    <lastmod>2025-08-13T12:53:16Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/4967513-how-to-add-a-user-to-your-defense-com-account</loc>
    <lastmod>2025-08-12T15:40:34Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/4967525-how-to-add-an-asset-to-your-asset-profile</loc>
    <lastmod>2025-08-13T12:59:00Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/5103544-how-to-confirm-your-penetration-test-scope</loc>
    <lastmod>2025-08-07T12:11:43Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/5103551-how-to-log-in-to-your-defense-com-account</loc>
    <lastmod>2025-08-12T16:25:17Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/5103559-how-to-get-started-with-external-vulnerability-scanning</loc>
    <lastmod>2025-08-13T09:41:25Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/5376273-how-to-sign-up-for-defense-com</loc>
    <lastmod>2025-08-11T13:47:55Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/5388332-how-to-install-endpoint-protection-on-windows</loc>
    <lastmod>2025-08-13T09:05:24Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/5388459-how-to-install-endpoint-protection-on-linux</loc>
    <lastmod>2025-08-11T15:54:29Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/5391647-understanding-the-modules-included-in-endpoint-protection</loc>
    <lastmod>2023-11-07T10:15:25Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/5391820-how-to-use-endpoint-protection-on-windows</loc>
    <lastmod>2025-08-13T15:09:54Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/5394912-how-to-add-a-recon-target</loc>
    <lastmod>2025-10-01T14:57:06Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/5396865-how-to-schedule-vulnerability-scans</loc>
    <lastmod>2025-08-11T15:41:11Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/5396869-how-to-edit-a-user</loc>
    <lastmod>2025-08-12T13:56:33Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/5405093-how-to-reset-a-forgotten-password</loc>
    <lastmod>2025-08-12T14:46:42Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/5430131-how-to-enrol-for-cyber-essentials-certification</loc>
    <lastmod>2025-08-11T14:55:03Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/5430265-how-to-reset-your-defense-com-password</loc>
    <lastmod>2025-08-12T14:38:49Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/5433241-api-assessment-prerequisites</loc>
    <lastmod>2025-08-05T10:11:53Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/5435994-how-to-give-yourself-and-users-access-to-your-customer-s-account</loc>
    <lastmod>2026-03-04T15:50:00Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/5588448-how-to-prepare-for-your-penetration-test</loc>
    <lastmod>2025-08-11T15:21:01Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/5603643-how-to-view-your-penetration-test-report</loc>
    <lastmod>2025-08-11T16:58:22Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/5605913-what-is-a-cvss-score</loc>
    <lastmod>2025-08-05T08:53:25Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/5620718-how-to-view-your-vulnerability-scan-report</loc>
    <lastmod>2025-08-11T16:46:05Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/5621048-choosing-the-right-access-method-for-your-internal-infrastructure-assessment</loc>
    <lastmod>2023-03-03T11:34:22Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/5649124-how-to-set-up-an-endpoint-protection-package</loc>
    <lastmod>2025-08-12T15:48:02Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/5897686-how-to-view-and-manage-your-customer-s-account</loc>
    <lastmod>2026-03-04T15:52:26Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/5903821-how-to-invite-users-to-download-endpoint-protection</loc>
    <lastmod>2025-08-13T14:34:03Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/5908315-how-to-raise-a-support-ticket</loc>
    <lastmod>2025-08-13T15:45:05Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/5913467-understanding-runbooks</loc>
    <lastmod>2025-08-13T11:02:53Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/5930010-how-to-set-up-internal-vulnerability-scanning</loc>
    <lastmod>2026-01-29T13:45:54Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/5987981-introduction-to-lucene-queries</loc>
    <lastmod>2025-08-05T08:49:14Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/6208831-how-to-whitelist-phishing-simulator-domains-in-microsoft365</loc>
    <lastmod>2025-08-05T07:49:25Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/6209084-how-to-whitelist-phishing-simulator-domains-in-google-workspace</loc>
    <lastmod>2025-08-11T07:28:28Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/6209137-viewing-and-completing-your-defense-com-phishing-campaign</loc>
    <lastmod>2025-08-12T14:04:50Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/6236022-microsoft-exchange-client-access-server-information-disclosure-vulnerability</loc>
    <lastmod>2022-11-07T11:00:10Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/6302785-apple-macos-apache-vulnerabilities</loc>
    <lastmod>2022-09-21T19:18:40Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/6302795-ssl-version-2-and-3-protocol-detection-windows-vulnerability</loc>
    <lastmod>2022-11-08T12:42:26Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/6302810-ssl-medium-strength-cipher-suite-supported-sweet32-windows</loc>
    <lastmod>2022-11-07T11:55:31Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/6302817-microsoft-windows-unquoted-service-path-enumeration-vulnerability</loc>
    <lastmod>2022-11-08T13:07:21Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/6302890-windows-security-feature-bypass-in-secure-boot</loc>
    <lastmod>2022-09-21T19:21:21Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/6505863-how-to-run-a-remote-scan-using-endpoint-protection</loc>
    <lastmod>2025-08-12T16:09:04Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/6600745-insecure-windows-service-permissions</loc>
    <lastmod>2022-11-08T13:21:55Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/6662414-how-to-use-the-defense-com-cyber-assessment</loc>
    <lastmod>2025-08-11T14:47:26Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/6714676-microsoft-internet-explorer-unsupported-version-detection-vulnerability</loc>
    <lastmod>2022-11-07T11:25:25Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/6714717-microsoft-windows-smb-null-session-authentication-vulnerability</loc>
    <lastmod>2022-11-07T11:29:08Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/6714731-mta-open-mail-relaying-allowed-thorough-test-windows-vulnerability</loc>
    <lastmod>2022-11-07T11:38:11Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/6714756-smb-signing-not-required-linux-vulnerability</loc>
    <lastmod>2022-11-07T11:48:08Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/6714765-smb-signing-not-required-windows-vulnerability</loc>
    <lastmod>2022-11-07T11:50:45Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/6714772-ssl-medium-strength-cipher-suite-supported-sweet32-linux-vulnerability</loc>
    <lastmod>2022-11-07T11:52:42Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/6717936-ssl-rc4-cipher-suites-supported-bar-mitzvah-linux-vulnerability</loc>
    <lastmod>2022-11-08T10:29:18Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/6718545-ssl-rc4-cipher-suites-supported-bar-mitzvah-windows-vulnerability</loc>
    <lastmod>2022-11-08T12:38:06Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/6718572-ssl-version-2-and-3-protocol-detection-linux-vulnerability</loc>
    <lastmod>2022-11-08T12:44:47Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/6718581-terminal-services-doesn-t-use-network-level-authentication-nla-only-vulnerability</loc>
    <lastmod>2022-11-08T12:48:34Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/6718593-terminal-services-encryption-level-is-not-fips-140-compliant-vulnerability</loc>
    <lastmod>2022-11-08T12:50:33Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/6718595-tls-version-1-0-protocol-detection-linux-vulnerability</loc>
    <lastmod>2022-11-08T12:52:31Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/6718603-tls-version-1-0-protocol-detection-windows-vulnerability</loc>
    <lastmod>2022-11-08T12:55:38Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/6718611-tls-version-1-1-protocol-deprecated-linux-vulnerability</loc>
    <lastmod>2022-11-08T12:57:19Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/6718613-tls-version-1-1-protocol-deprecated-windows-vulnerability</loc>
    <lastmod>2022-11-08T12:59:57Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/6718649-untrusted-microsoft-office-macro-execution-enabled-vulnerability</loc>
    <lastmod>2022-11-08T13:12:44Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/6718668-windows-printnightmare-registry-exposure-cve-2021-34527-oob-security-update-rce-july-2021-vulnerability</loc>
    <lastmod>2022-11-08T13:16:43Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/6749563-how-to-configure-your-linux-log-collector-for-defense-com-siem</loc>
    <lastmod>2025-12-12T12:42:31Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/6796428-ssl-medium-strength-cipher-suite-supported-sweet32-macos-cups-vulnerability</loc>
    <lastmod>2022-12-08T17:12:16Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/6796443-ssl-medium-strength-cipher-suite-supported-sweet32-windows-iis-crypto-vulnerability</loc>
    <lastmod>2022-12-05T11:36:03Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/6796453-ssl-rc4-cipher-suites-supported-bar-mitzvah-windows-iis-crypto-vulnerability</loc>
    <lastmod>2022-12-05T11:35:33Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/6796461-ssl-version-2-and-3-protocol-detection-windows-iis-crypto-vulnerability</loc>
    <lastmod>2022-12-05T11:35:04Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/6796466-tls-version-1-0-protocol-detection-windows-iis-crypto-vulnerability</loc>
    <lastmod>2022-12-05T11:33:22Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/6796505-tls-version-1-1-protocol-deprecated-windows-iis-crypto-vulnerability</loc>
    <lastmod>2022-12-05T11:52:23Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/6890640-ssl-certificate-signed-using-weak-hashing-algorithm-vulnerability</loc>
    <lastmod>2023-05-11T09:21:53Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/7045396-how-to-deploy-endpoint-protection-using-microsoft-intune</loc>
    <lastmod>2025-08-13T10:34:39Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/7841830-how-to-create-a-custom-threat</loc>
    <lastmod>2025-08-12T15:34:15Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/7845350-how-to-configure-your-windows-log-collector-for-defense-com-siem</loc>
    <lastmod>2025-08-12T16:30:30Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/7895373-how-to-configure-your-log-collector-on-redhat-enterprise-linux-8</loc>
    <lastmod>2023-05-17T08:37:24Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/7946863-winverifytrust-signature-validation-cve-2013-3900-mitigation-enablecertpaddingcheck-vulnerability</loc>
    <lastmod>2023-05-25T14:32:56Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/7947026-ssh-server-cbc-mode-ciphers-enabled-linux-vulnerability</loc>
    <lastmod>2023-05-25T15:06:06Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/7947052-ssh-weak-key-exchange-algorithms-enabled-linux-vulnerability</loc>
    <lastmod>2023-05-25T15:14:46Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/7947062-ssh-weak-mac-algorithms-enabled-linux-vulnerability</loc>
    <lastmod>2023-05-25T15:17:50Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/7947072-ssl-tls-diffie-hellman-modulus-1024-bits-logjam-vulnerability</loc>
    <lastmod>2023-05-25T15:25:16Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/8061655-how-to-troubleshoot-linux-siem-collector-logging-issues</loc>
    <lastmod>2025-08-12T11:02:05Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/8062666-feature-overview-patch-management</loc>
    <lastmod>2023-07-14T10:01:29Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/8065680-feature-overview-device-control</loc>
    <lastmod>2023-07-14T09:59:54Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/8067206-feature-overview-content-control</loc>
    <lastmod>2023-07-14T09:59:07Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/8067361-feature-overview-anti-exploit</loc>
    <lastmod>2023-07-14T09:57:36Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/8095335-feature-overview-anti-malware</loc>
    <lastmod>2023-07-14T09:56:05Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/8119605-feature-overview-firewall</loc>
    <lastmod>2023-07-14T09:53:45Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/8123868-feature-overview-network-attack-defense</loc>
    <lastmod>2023-07-13T11:02:13Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/8124607-feature-overview-full-disk-encryption</loc>
    <lastmod>2025-08-11T16:14:45Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/8232468-how-to-troubleshoot-windows-siem-collector-logging-issues</loc>
    <lastmod>2025-08-12T11:08:39Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/8233267-how-to-resend-user-sign-up-emails</loc>
    <lastmod>2025-08-12T13:48:06Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/8278417-how-to-install-endpoint-protection-on-mac-os</loc>
    <lastmod>2025-08-13T10:02:20Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/8278605-how-to-uninstall-defense-com-endpoint-security-from-windows</loc>
    <lastmod>2025-08-13T15:08:32Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/8278621-uninstalling-endpoint-protection-from-mac-os</loc>
    <lastmod>2023-09-19T10:59:58Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/8278794-how-to-obtain-a-letter-of-completion-for-your-penetration-test</loc>
    <lastmod>2025-08-12T14:31:01Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/8279345-obtaining-logs-from-endpoint-protection-on-mac-os</loc>
    <lastmod>2023-11-08T17:23:02Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/8279842-obtaining-logs-from-endpoint-protection-on-windows</loc>
    <lastmod>2025-08-12T15:36:53Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/8341333-how-to-use-two-factor-authentication-2fa-on-defense-com</loc>
    <lastmod>2025-08-11T17:04:22Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/8380052-generating-a-client-secret-in-microsoft-azure-active-directory-entra-id</loc>
    <lastmod>2026-03-12T11:10:24Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/8420722-onboarding-cisco-meraki-to-defense-com</loc>
    <lastmod>2023-12-29T14:42:48Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/8455833-how-to-troubleshoot-logging-issues-with-auditbeat-on-linux</loc>
    <lastmod>2025-08-12T15:07:21Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/8456086-how-to-troubleshoot-filebeat-on-linux-logging-issues</loc>
    <lastmod>2025-12-12T12:41:03Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/8456622-how-to-troubleshoot-winlogbeat-logging-issues</loc>
    <lastmod>2025-08-12T11:11:08Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/8504821-how-to-integrate-aws-cloudwatch</loc>
    <lastmod>2025-03-10T16:31:39Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/8811767-how-to-integrate-microsoft-365</loc>
    <lastmod>2025-08-11T15:14:37Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/8969326-how-to-add-your-company-logo-to-the-defense-com-navigation-pdf-reports-and-emails</loc>
    <lastmod>2026-01-16T17:13:33Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/9094451-how-to-remove-your-service-provider-s-access</loc>
    <lastmod>2025-08-13T15:53:40Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/9094545-how-to-give-your-service-provider-access-to-your-company</loc>
    <lastmod>2025-08-13T15:53:31Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/9104425-how-to-delete-a-user</loc>
    <lastmod>2025-08-11T07:48:48Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/9158853-how-to-suspend-disable-a-user</loc>
    <lastmod>2025-08-12T11:34:05Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/9158978-how-to-unsuspend-a-user</loc>
    <lastmod>2025-08-12T11:33:55Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/9395687-how-to-bulk-upload-users</loc>
    <lastmod>2025-08-13T16:18:51Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/9413329-how-to-find-your-windows-operating-system-os-build-number-or-version</loc>
    <lastmod>2024-06-03T16:43:38Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/9413553-how-to-find-your-linux-operating-system-os-build-number-or-version</loc>
    <lastmod>2024-06-03T16:43:26Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/9413558-how-to-find-your-apple-mac-operating-system-os-build-number-or-version</loc>
    <lastmod>2024-06-03T16:43:56Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/9766233-how-to-resubmit-rejected-targets</loc>
    <lastmod>2025-08-11T13:49:46Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/9966057-how-to-enable-full-disk-encryption-using-endpoint-protection</loc>
    <lastmod>2025-08-11T16:22:45Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/10165371-how-to-launch-a-training-campaign</loc>
    <lastmod>2025-08-12T13:22:28Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/10165463-how-to-extend-a-training-campaign</loc>
    <lastmod>2025-08-12T13:41:06Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/10165635-how-to-enable-disable-auto-enrol-on-a-training-campaign</loc>
    <lastmod>2025-08-12T13:43:40Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/10165653-how-to-add-a-user-to-a-training-campaign</loc>
    <lastmod>2025-08-12T13:20:05Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/10165814-how-to-complete-a-training-campaign</loc>
    <lastmod>2025-08-12T13:46:26Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/10165925-how-to-track-your-training-campaign-progress</loc>
    <lastmod>2025-08-11T14:57:08Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/10315514-how-to-uninstall-logstash-from-your-ubuntu-collector</loc>
    <lastmod>2024-12-23T09:30:15Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/10365587-how-to-manage-siem-runbook-suppression</loc>
    <lastmod>2025-08-12T15:17:14Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/10370365-how-to-launch-a-phishing-campaign</loc>
    <lastmod>2025-08-13T09:53:21Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/10374695-how-to-extend-a-phishing-campaign</loc>
    <lastmod>2025-08-14T07:51:51Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/10374845-how-to-track-the-progress-of-a-phishing-campaign</loc>
    <lastmod>2025-08-14T08:10:53Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/10420848-how-to-enable-the-users-module-for-your-microsoft-365-integration</loc>
    <lastmod>2025-08-14T11:07:12Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/10449588-how-to-complete-a-phishing-campaign</loc>
    <lastmod>2025-08-14T07:59:34Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/10485277-how-to-manage-your-notification-settings</loc>
    <lastmod>2025-08-13T16:30:51Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/10537673-how-to-update-defense-com-endpoint-protection-on-windows</loc>
    <lastmod>2025-08-13T08:55:51Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/10546928-how-to-use-the-incident-response-panic-button</loc>
    <lastmod>2025-08-11T15:04:36Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/10550530-how-to-view-and-manage-your-customers-threats</loc>
    <lastmod>2025-08-13T09:12:45Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/10577378-how-to-deploy-the-orbital-agent-on-windows</loc>
    <lastmod>2025-08-12T14:15:34Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/10660606-how-to-disable-your-users-in-azure</loc>
    <lastmod>2025-08-21T16:15:21Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/10681838-how-to-create-scheduled-reports</loc>
    <lastmod>2025-08-12T15:21:19Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/10682260-how-to-create-saved-detection-rules</loc>
    <lastmod>2025-08-12T14:35:37Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/10750439-how-to-set-up-a-trial-for-a-new-customer</loc>
    <lastmod>2026-03-03T10:09:11Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/10750686-how-to-resend-invites-to-your-customers</loc>
    <lastmod>2026-03-03T10:13:15Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/10858866-how-to-integrate-aws-guardduty</loc>
    <lastmod>2025-08-13T08:51:14Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/10920336-how-to-set-up-and-manage-webhooks</loc>
    <lastmod>2025-08-13T08:58:25Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/11095601-how-to-grant-an-azure-application-securityalert-read-all-permissions</loc>
    <lastmod>2025-09-15T16:53:49Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/11402850-how-to-set-up-azure-activity-logs-for-defense-com-siem</loc>
    <lastmod>2025-08-12T15:19:26Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/11621583-how-to-use-webhooks-to-create-issues-for-threats-in-jira</loc>
    <lastmod>2025-08-12T14:34:24Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/11782432-how-to-get-started-with-app-scanning</loc>
    <lastmod>2025-08-11T07:36:13Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/12002674-how-to-grant-an-azure-application-directory-read-all-permissions</loc>
    <lastmod>2025-08-13T16:16:30Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/12059054-how-to-run-the-linux-troubleshooting-script</loc>
    <lastmod>2025-09-02T09:34:41Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/12060830-how-to-run-the-windows-troubleshooting-script</loc>
    <lastmod>2025-09-02T09:39:45Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/12097583-how-to-assign-a-threat-remediation-to-a-user</loc>
    <lastmod>2025-09-02T09:00:19Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/12097625-how-to-update-a-remediation-state</loc>
    <lastmod>2025-09-02T09:25:17Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/12097661-how-to-add-a-note-to-a-threat</loc>
    <lastmod>2025-09-02T08:47:14Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/12266396-how-to-integrate-cloudflare</loc>
    <lastmod>2025-11-19T11:35:27Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/12555677-how-to-create-automation-rules</loc>
    <lastmod>2025-10-10T12:19:52Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/12556033-how-to-edit-your-automation-rules</loc>
    <lastmod>2025-10-10T12:45:53Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/12605737-how-to-create-an-api-key</loc>
    <lastmod>2025-10-17T09:23:50Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/12818423-how-to-uninstall-the-orbital-agent</loc>
    <lastmod>2025-12-12T12:45:36Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/12821145-how-to-integrate-aws-cloudtrail</loc>
    <lastmod>2025-11-13T16:41:40Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/12829897-how-to-integrate-azure-event-hubs</loc>
    <lastmod>2025-11-19T11:04:59Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/12830947-how-to-integrate-sentinelone</loc>
    <lastmod>2025-11-21T15:18:32Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/12831307-how-to-integrate-your-sonicwall-firewall</loc>
    <lastmod>2025-11-19T10:37:08Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/12831391-how-to-integrate-your-sophos-firewall</loc>
    <lastmod>2025-11-19T10:36:46Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/12859244-how-to-integrate-your-fortinet-fortigate-firewall-with-defense-com</loc>
    <lastmod>2025-12-15T10:59:13Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/12859258-how-to-integrate-carbon-black-with-defense-com</loc>
    <lastmod>2026-03-26T12:16:31Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/12867484-how-to-integrate-your-watchguard-firewall</loc>
    <lastmod>2025-11-19T11:28:26Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/12878913-how-to-integrate-your-hpe-aruba-switch-with-defense-com</loc>
    <lastmod>2025-12-15T10:56:46Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/12960968-how-to-integrate-your-palo-alto-device</loc>
    <lastmod>2025-12-15T11:06:42Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/12982796-how-to-delete-a-google-cloud-project</loc>
    <lastmod>2025-12-02T14:02:33Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/12995767-how-to-integrate-your-draytek-device</loc>
    <lastmod>2025-12-15T11:03:33Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/13003691-how-to-configure-file-integrity-monitoring-on-windows</loc>
    <lastmod>2026-03-24T13:22:43Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/13160132-how-to-integrate-checkpoint-harmony</loc>
    <lastmod>2025-12-16T13:47:24Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/13161235-how-to-integrate-forcepoint</loc>
    <lastmod>2025-12-16T13:49:06Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/13170267-how-to-install-auditbeat-on-linux</loc>
    <lastmod>2025-12-16T17:03:59Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/13170437-how-to-install-filebeat-on-linux</loc>
    <lastmod>2025-12-16T17:07:12Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/13170518-how-to-install-winlogbeat-on-windows</loc>
    <lastmod>2025-12-16T16:58:15Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/13170573-how-to-install-auditbeat-on-windows</loc>
    <lastmod>2025-12-16T17:00:30Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/13176136-how-to-integrate-crowdstrike</loc>
    <lastmod>2025-12-18T08:49:11Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/13463929-architectural-overview-data-sovereignty-pipeline-security</loc>
    <lastmod>2026-01-22T17:29:15Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/13513544-how-to-close-security-events</loc>
    <lastmod>2026-01-26T09:56:34Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/13600466-how-to-integrate-your-juniper-switch</loc>
    <lastmod>2026-02-02T14:05:35Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/13671982-how-to-integrate-cisco-umbrella</loc>
    <lastmod>2026-02-10T07:50:51Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/13684622-how-to-integrate-hubspot</loc>
    <lastmod>2026-02-11T09:06:11Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/13926718-how-to-use-webhooks-to-create-threat-notifications-in-microsoft-teams</loc>
    <lastmod>2026-03-04T16:52:25Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/14017012-how-to-deploy-the-orbital-agent-on-linux</loc>
    <lastmod>2026-03-12T11:21:08Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/14121149-how-to-isolate-a-device-using-the-orbital-agent</loc>
    <lastmod>2026-03-26T12:23:18Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/14121245-how-to-create-a-new-orbital-agent-group</loc>
    <lastmod>2026-03-26T12:20:48Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/articles/14299330-how-to-integrate-your-esxi-hosts</loc>
    <lastmod>2026-03-27T11:12:03Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/collections/1305684-account-management</loc>
    <lastmod>2024-09-10T08:54:17Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/collections/2798065-asset-profile</loc>
    <lastmod>2024-09-10T08:48:29Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/collections/2798076-siem</loc>
    <lastmod>2024-09-10T09:15:07Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/collections/2798071-vulnerability-scans</loc>
    <lastmod>2024-09-10T09:43:02Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/collections/2798074-penetration-tests</loc>
    <lastmod>2024-09-10T09:43:02Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/collections/2798077-recon</loc>
    <lastmod>2024-09-10T09:43:02Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/collections/2798079-training</loc>
    <lastmod>2024-09-10T09:43:02Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/collections/2798080-threats</loc>
    <lastmod>2024-09-10T09:43:02Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/collections/3035614-endpoint-protection</loc>
    <lastmod>2024-09-10T09:43:02Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/collections/3233790-partners</loc>
    <lastmod>2024-09-10T09:43:02Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/collections/3464331-phishing</loc>
    <lastmod>2024-09-10T09:43:02Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/collections/3508365-remediations</loc>
    <lastmod>2024-09-10T09:43:02Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/collections/3628349-internal</loc>
    <lastmod>2024-09-10T09:43:02Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/collections/3641820-compliance</loc>
    <lastmod>2024-09-10T09:43:02Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/collections/3906855-ce-guides</loc>
    <lastmod>2024-09-10T09:43:02Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/collections/7361978-integrations</loc>
    <lastmod>2024-09-10T09:43:02Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/collections/12153901-orbital-agent</loc>
    <lastmod>2025-03-25T10:58:31Z</lastmod>
  </url>
  <url>
    <loc>https://help.defense.com/en/collections/12806137-support</loc>
    <lastmod>2025-05-07T10:48:20Z</lastmod>
  </url>
</urlset>
