<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://strategic-cyber.co.uk/2024/09/03/microsoft-intune-19-add-asr-rule-exclusion/</loc><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2024/09/exclusion9.png</image:loc><image:title>Exclusion9</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2024/09/exclusion8.png</image:loc><image:title>Exclusion8</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2024/09/exclusion7.png</image:loc><image:title>Exclusion7</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2024/09/exclusion5-1.png</image:loc><image:title>Exclusion5</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2024/09/image.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2024/09/exclusion6.png</image:loc><image:title>Exclusion6</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2024/09/exclusion5.png</image:loc><image:title>Exclusion5</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2024/09/exclusion4.png</image:loc><image:title>Exclusion4</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2024/09/exclusion3.png</image:loc><image:title>Exclusion3</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2024/09/exclusion2.png</image:loc><image:title>Exclusion2</image:title></image:image><lastmod>2024-09-04T20:11:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://strategic-cyber.co.uk/2024/05/07/securing-sharepoint-1-block-legacy-authentication/</loc><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2024/05/sharepoint-4.png</image:loc><image:title>sharepoint-4</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2024/05/sharepoint-3.png</image:loc><image:title>sharepoint-3</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2024/05/sharepoint-2.png</image:loc><image:title>sharepoint-2</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2024/05/sharepoint-1.png</image:loc><image:title>sharepoint-1</image:title></image:image><lastmod>2024-09-03T21:13:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://strategic-cyber.co.uk/2024/08/07/microsoft-intune-18-selective-wipe-of-mobile-app-data/</loc><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2024/08/selective-wipe5.png</image:loc><image:title>Selective Wipe5</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2024/08/selective-wipe4.png</image:loc><image:title>Selective Wipe4</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2024/08/selective-wipe3.png</image:loc><image:title>Selective Wipe3</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2024/08/selective-wipe2.png</image:loc><image:title>Selective Wipe2</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2024/08/selective-wipe1.png</image:loc><image:title>Selective Wipe1</image:title></image:image><lastmod>2024-08-07T21:21:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://strategic-cyber.co.uk/2024/07/02/microsoft-intune-17-mobile-application-management-policies-for-ios/</loc><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2024/07/ios-app-protection-11.png</image:loc><image:title>ios app protection 11</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2024/07/ios-app-protection-10.png</image:loc><image:title>ios app protection 10</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2024/07/ios-app-protection-9.png</image:loc><image:title>ios app protection 9</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2024/07/ios-app-protection-8.png</image:loc><image:title>ios app protection 8</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2024/07/ios-app-protection-7.png</image:loc><image:title>ios app protection 7</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2024/07/ios-app-protection-6.png</image:loc><image:title>ios app protection 6</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2024/07/ios-app-protection-5.png</image:loc><image:title>ios app protection 5</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2024/07/ios-app-protection-4.png</image:loc><image:title>ios app protection 4</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2024/07/ios-app-protection-3.png</image:loc><image:title>ios app protection 3</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2024/07/ios-app-protection-2.png</image:loc><image:title>ios app protection 2</image:title></image:image><lastmod>2024-07-02T21:18:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://strategic-cyber.co.uk/2024/06/19/microsoft-sentinel-part-2-deploying-a-sentinel-workspace-and-onboarding-free-data-sources/</loc><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2024/06/sentinel-36.png</image:loc><image:title>sentinel-36</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2024/06/sentinel-35.png</image:loc><image:title>sentinel-35</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2024/06/sentinel-34.png</image:loc><image:title>sentinel-34</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2024/06/sentinel-33.png</image:loc><image:title>sentinel-33</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2024/06/sentinel-32.png</image:loc><image:title>sentinel-32</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2024/06/sentinel-31.png</image:loc><image:title>sentinel-31</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2024/06/sentinel-29.png</image:loc><image:title>sentinel-29</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2024/06/sentinel-28.png</image:loc><image:title>sentinel-28</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2024/06/sentinel-27b.png</image:loc><image:title>sentinel-27b</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2024/06/sentinel-27a.png</image:loc><image:title>sentinel-27a</image:title></image:image><lastmod>2024-06-19T20:52:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://strategic-cyber.co.uk/2024/06/10/microsoft-sentinel-part-1-log-analytics-workspace-budgets-and-action-groups/</loc><lastmod>2024-06-19T20:52:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://strategic-cyber.co.uk/2024/05/16/microsoft-intune-16-windows-and-driver-updates/</loc><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2024/05/update-rings-5.png</image:loc><image:title>update-rings-5</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2024/05/update-rings-4.png</image:loc><image:title>update-rings-4</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2024/05/update-rings-3.png</image:loc><image:title>update-rings-3</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2024/05/update-rings-2.png</image:loc><image:title>update-rings-2</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2024/05/update-rings-1.png</image:loc><image:title>update-rings-1</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2024/05/feature-4.png</image:loc><image:title>feature-4</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2024/05/feature-3.png</image:loc><image:title>feature-3</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2024/05/feature-2.png</image:loc><image:title>feature-2</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2024/05/feature-1.png</image:loc><image:title>feature-1</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2024/05/driver-4.png</image:loc><image:title>driver-4</image:title></image:image><lastmod>2024-05-16T20:24:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://strategic-cyber.co.uk/2024/05/02/microsoft-intune-15-attack-surface-reduction-rules/</loc><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2024/04/asr-policy-5-2.png</image:loc><image:title>asr-policy-5-2</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2024/04/asr-policy-4-1.png</image:loc><image:title>asr-policy-4-1</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2024/04/asr-policy-3a.png</image:loc><image:title>asr-policy-3a</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2024/04/asr-policy-9.png</image:loc><image:title>asr-policy-9</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2024/04/asr-policy-8.png</image:loc><image:title>asr-policy-8</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2024/04/asr-policy-7.png</image:loc><image:title>asr-policy-7</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2024/04/asr-policy-6.png</image:loc><image:title>asr-policy-6</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2024/04/asr-policy-5-1.png</image:loc><image:title>asr-policy-5-1</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2024/04/asr-policy-5.png</image:loc><image:title>asr-policy-5</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2024/04/asr-policy-4.png</image:loc><image:title>asr-policy-4</image:title></image:image><lastmod>2024-05-02T07:55:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://strategic-cyber.co.uk/2024/04/23/microsoft-intune-14-block-and-control-device-enrolment/</loc><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2024/04/screenshot-4.png</image:loc><image:title>screenshot-4</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2024/04/screenshot-3.png</image:loc><image:title>screenshot-3</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2024/04/screenshot-2.png</image:loc><image:title>screenshot-2</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2024/04/screenshot-1.png</image:loc><image:title>screenshot-1</image:title></image:image><lastmod>2024-04-23T20:20:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://strategic-cyber.co.uk/2024/04/10/cyber-security-is-easy-right-say-no-to-old-cheap-microwaves/</loc><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2024/04/microwave-old.jpg</image:loc><image:title>microwave old</image:title></image:image><lastmod>2024-04-10T20:06:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://strategic-cyber.co.uk/2024/03/13/cyber-security-is-easy-right-what-is-secops/</loc><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2024/03/unified.jpg</image:loc><image:title>Illustration includes a white, Bank icon on a black background.</image:title><image:caption>Illustration includes a white, Bank icon on a black background.</image:caption></image:image><lastmod>2024-03-13T21:34:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://strategic-cyber.co.uk/2024/03/07/cyber-security-is-easy-right-understanding-privileged-access/</loc><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2024/03/chess-pieces.jpg</image:loc><image:title>chess pieces</image:title></image:image><lastmod>2024-03-07T12:20:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://strategic-cyber.co.uk/2024/02/26/microsoft-intune-13-configure-local-administrator-password-solution-laps/</loc><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2024/02/laps-13.png</image:loc><image:title>laps-13</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2024/02/laps-9.png</image:loc><image:title>laps-9</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2024/02/laps-10.png</image:loc><image:title>laps-10</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2024/02/laps-11.png</image:loc><image:title>laps-11</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2024/02/laps-12.png</image:loc><image:title>laps-12</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2024/02/image.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2024/02/laps-8.png</image:loc><image:title>laps-8</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2024/02/laps-7.png</image:loc><image:title>laps-7</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2024/02/laps-6.png</image:loc><image:title>laps-6</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2024/02/laps-5.png</image:loc><image:title>laps-5</image:title></image:image><lastmod>2024-02-26T22:02:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://strategic-cyber.co.uk/2024/02/21/cyber-security-is-easy-right-how-soon-is-now/</loc><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2024/02/today.jpg</image:loc><image:title>today</image:title></image:image><lastmod>2024-02-21T11:09:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://strategic-cyber.co.uk/2024/02/08/securing-azure-8-migrating-from-legacy-mfa-and-sspr-policies-to-the-new-unified-authentication-methods-policy/</loc><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2024/02/auth-new-10.png</image:loc><image:title>auth-new-10</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2024/02/auth-new-9.png</image:loc><image:title>auth-new-9</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2024/02/auth-new-8.png</image:loc><image:title>auth-new-8</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2024/02/auth-new-7.png</image:loc><image:title>auth-new-7</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2024/02/auth-new-6.png</image:loc><image:title>auth-new-6</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2024/02/auth-new-5.png</image:loc><image:title>auth-new-5</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2024/02/auth-new-4.png</image:loc><image:title>auth-new-4</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2024/02/auth-new-3.png</image:loc><image:title>auth-new-3</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2024/02/auth-new-2.png</image:loc><image:title>auth-new-2</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2024/02/auth-new-1.png</image:loc><image:title>auth-new-1</image:title></image:image><lastmod>2024-02-08T10:49:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://strategic-cyber.co.uk/2024/01/25/securing-exchange-online-part-2-first-steps-part-2/</loc><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2024/01/image-2.png</image:loc><image:title>image-2</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2024/01/externaltagging-8.png</image:loc><image:title>externaltagging-8</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2024/01/image-1.png</image:loc><image:title>image-1</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2024/01/externaltagging-7.png</image:loc><image:title>externaltagging-7</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2024/01/image.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2024/01/externaltagging-3.png</image:loc><image:title>externaltagging-3</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2024/01/externaltagging-2.png</image:loc><image:title>externaltagging-2</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2024/01/externaltagging-1.png</image:loc><image:title>externaltagging-1</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2024/01/anti-spam-policies-9.png</image:loc><image:title>anti-spam-policies-9</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2024/01/anti-spam-policies-8.png</image:loc><image:title>anti-spam-policies-8</image:title></image:image><lastmod>2024-01-26T08:38:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://strategic-cyber.co.uk/2023/12/05/cyber-security-is-easy-right-its-time-to-walk-upstream/</loc><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/12/istockphoto-180837288-612x612-1.jpg</image:loc><image:title>"Spring run-off, lake Clementine Dam, Northern California."</image:title><image:caption>"Spring run-off, lake Clementine Dam, Northern California."</image:caption></image:image><lastmod>2023-12-08T12:15:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://strategic-cyber.co.uk/2023/12/05/securing-exchange-online-part-1-first-steps/</loc><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/12/email-check-ncsc-2.png</image:loc><image:title>email-check-ncsc-2</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/12/email-check-ncsc-1.png</image:loc><image:title>email-check-ncsc-1</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/12/dmarc-1.png</image:loc><image:title>dmarc-1</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/11/dkim-config-4.png</image:loc><image:title>dkim-config-4</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/11/dkim-config-3.png</image:loc><image:title>dkim-config-3</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/11/dkim-config-2.png</image:loc><image:title>dkim-config-2</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/11/dkim-config-1.png</image:loc><image:title>dkim-config-1</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/11/spf-3.png</image:loc><image:title>spf-3</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/11/spf-2.png</image:loc><image:title>spf-2</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/11/spf-1.png</image:loc><image:title>spf-1</image:title></image:image><lastmod>2023-12-05T20:57:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://strategic-cyber.co.uk/2023/11/14/cyber-security-is-easy-right-what-is-zero-trust/</loc><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/11/palo-alto-zt-image.png</image:loc><image:title>palo-alto-zt-image</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/11/ms-zt-image.png</image:loc><image:title>ms-zt-image</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/11/nist-zt-image.png</image:loc><image:title>nist-zt-image</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/11/cisa-zt-image.png</image:loc><image:title>cisa-zt-image</image:title></image:image><lastmod>2023-11-30T20:21:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://strategic-cyber.co.uk/2023/11/17/securing-azure-7-microsoft-cybersecurity-reference-architecture-mcra-and-microsoft-cloud-security-benchmark-mcsb/</loc><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/11/capture-1.png</image:loc><image:title>capture-1</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/11/capture.png</image:loc><image:title>capture</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/11/mcra-1.png</image:loc><image:title>mcra-1</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/11/mcra-2.png</image:loc><image:title>mcra-2</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/11/mcsb-2.png</image:loc><image:title>mcsb-2</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/11/mcsb-1.png</image:loc><image:title>mcsb-1</image:title></image:image><lastmod>2023-11-17T10:35:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://strategic-cyber.co.uk/2023/11/13/microsoft-intune-12-enrol-and-configure-ios-and-ipados-part-3/</loc><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/11/ios-enrolled-1.png</image:loc><image:title>ios-enrolled-1</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/11/img_0033.png</image:loc><image:title>img_0033</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/11/img_0032.png</image:loc><image:title>img_0032</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/11/img_0031.png</image:loc><image:title>img_0031</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/11/img_0030.png</image:loc><image:title>img_0030</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/11/img_0029.png</image:loc><image:title>img_0029</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/11/img_0028.png</image:loc><image:title>img_0028</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/11/img_0027.png</image:loc><image:title>img_0027</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/11/img_0026.png</image:loc><image:title>img_0026</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/11/img_0025.png</image:loc><image:title>img_0025</image:title></image:image><lastmod>2023-11-13T22:19:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://strategic-cyber.co.uk/2023/11/08/microsoft-intune-10-enrol-ios-and-ipados-part-2/</loc><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/11/config-profile-18-1.png</image:loc><image:title>config-profile-18-1</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/11/config-profile-18.png</image:loc><image:title>config-profile-18</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/11/config-profile-17.png</image:loc><image:title>config-profile-17</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/11/config-profile-16.png</image:loc><image:title>config-profile-16</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/11/config-profile-15.png</image:loc><image:title>config-profile-15</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/11/config-profile-14.png</image:loc><image:title>config-profile-14</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/11/config-profile-13.png</image:loc><image:title>config-profile-13</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/11/config-profile-12.png</image:loc><image:title>config-profile-12</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/11/config-profile-11.png</image:loc><image:title>config-profile-11</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/11/config-profile-10.png</image:loc><image:title>config-profile-10</image:title></image:image><lastmod>2023-11-13T22:02:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://strategic-cyber.co.uk/2023/11/07/microsoft-intune-10-enrol-ios-and-ipados-part-1/</loc><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/11/enrol-7.png</image:loc><image:title>enrol-7</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/11/enrol-6.png</image:loc><image:title>enrol-6</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/11/enrol-5.png</image:loc><image:title>enrol-5</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/11/enrol-4.png</image:loc><image:title>enrol-4</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/11/enrol-3.png</image:loc><image:title>enrol-3</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/11/enrol-2.png</image:loc><image:title>enrol-2</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/11/enrol-1.png</image:loc><image:title>enrol-1</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/11/apple-cert-10.png</image:loc><image:title>apple-cert-10</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/11/apple-cert-9.png</image:loc><image:title>apple-cert-9</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/11/apple-cert-8.png</image:loc><image:title>apple-cert-8</image:title></image:image><lastmod>2023-11-08T21:29:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://strategic-cyber.co.uk/2023/08/31/microsoft-intune-from-scratch-8-deployment-configuration-autopilot/</loc><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/08/enroll-all-devices-1-1.png</image:loc><image:title>enroll-all-devices-1-1</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/08/windows-autopilot-deployment-profiles-4.png</image:loc><image:title>windows-autopilot-deployment-profiles-4</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/08/windows-autopilot-deployment-profiles-5.png</image:loc><image:title>windows-autopilot-deployment-profiles-5</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/08/windows-autopilot-deployment-profiles-3.png</image:loc><image:title>windows-autopilot-deployment-profiles-3</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/08/windows-autopilot-deployment-profiles-2.png</image:loc><image:title>windows-autopilot-deployment-profiles-2</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/08/windows-autopilot-deployment-profiles-1.png</image:loc><image:title>windows-autopilot-deployment-profiles-1</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/08/intune-windows-auto-enrollment-2.png</image:loc><image:title>intune-windows-auto-enrollment-2</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/08/intune-windows-auto-enrollment-1.png</image:loc><image:title>intune-windows-auto-enrollment-1</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/08/image.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/08/intune-auto-enrollment-5.png</image:loc><image:title>intune-auto-enrollment-5</image:title></image:image><lastmod>2023-10-28T18:50:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://strategic-cyber.co.uk/2023/10/24/endpoint-configuration-checks-using-the-microsoft-security-compliance-toolkit/</loc><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/10/policyanalyser-12-1.png</image:loc><image:title>policyanalyser-12-1</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/10/policyanalyser-19-1.png</image:loc><image:title>policyanalyser-19-1</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/10/policyanalyser-19.png</image:loc><image:title>policyanalyser-19</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/10/policyanalyser-18.png</image:loc><image:title>policyanalyser-18</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/10/policyanalyser-17.png</image:loc><image:title>policyanalyser-17</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/10/policyanalyser-16.png</image:loc><image:title>policyanalyser-16</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/10/policyanalyser-15.png</image:loc><image:title>policyanalyser-15</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/10/policyanalyser-14.png</image:loc><image:title>policyanalyser-14</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/10/policyanalyser-13.png</image:loc><image:title>policyanalyser-13</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/10/policyanalyser-12.png</image:loc><image:title>policyanalyser-12</image:title></image:image><lastmod>2023-10-24T21:09:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://strategic-cyber.co.uk/2023/10/16/securing-azure-6-identity-and-access-conditional-access-part-3/</loc><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/10/security-defaults-3.png</image:loc><image:title>security-defaults-3</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/10/security-defaults-2.png</image:loc><image:title>security-defaults-2</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/10/security-defaults-1.png</image:loc><image:title>security-defaults-1</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/10/ca-mfa-reg-3-1.png</image:loc><image:title>ca-mfa-reg-3-1</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/10/ca-mfa-reg-2-1.png</image:loc><image:title>ca-mfa-reg-2-1</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/10/ca-mfa-reg-5.png</image:loc><image:title>ca-mfa-reg-5</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/10/ca-mfa-reg-4.png</image:loc><image:title>ca-mfa-reg-4</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/10/ca-mfa-reg-3.png</image:loc><image:title>ca-mfa-reg-3</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/10/ca-mfa-reg-2.png</image:loc><image:title>ca-mfa-reg-2</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/10/ca-mfa-reg-1.png</image:loc><image:title>ca-mfa-reg-1</image:title></image:image><lastmod>2023-10-16T21:31:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://strategic-cyber.co.uk/2023/10/10/cyber-security-is-easy-right-can-we-buy-our-way-out-of-cyber-security-debt/</loc><lastmod>2023-10-11T09:01:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://strategic-cyber.co.uk/2023/09/16/confusing-compliance-with-security/</loc><lastmod>2023-10-10T21:46:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://strategic-cyber.co.uk/2023/02/18/cyber-security-is-easy-right/</loc><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/02/not-secure-2.png</image:loc><image:title>not-secure-2</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/02/not-secure.png</image:loc><image:title>not-secure</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/02/ppt.png</image:loc><image:title>ppt</image:title></image:image><lastmod>2023-10-10T21:45:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://strategic-cyber.co.uk/2023/04/08/cyber-security-is-easy-right-2/</loc><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/04/pm-categories.png</image:loc><image:title>pm-categories</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/04/9-pm-deployment.png</image:loc><image:title>9-pm-deployment</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/04/8-pm-policies-automation.png</image:loc><image:title>8-pm-policies-automation</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/04/7-pm-testing.png</image:loc><image:title>7-pm-testing</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/04/6-pm-prioritisation.png</image:loc><image:title>6-pm-prioritisation</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/04/5-pm-identification.png</image:loc><image:title>5-pm-identification</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/04/4-pm-lifecycle.png</image:loc><image:title>4-pm-lifecycle</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/04/2-pm-cat.png</image:loc><image:title>2-pm-cat</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/04/3-pm-1.png</image:loc><image:title>3-pm-1</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/04/3-pm.png</image:loc><image:title>3-pm</image:title></image:image><lastmod>2023-10-10T21:45:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://strategic-cyber.co.uk/2023/10/04/securing-azure-5-identity-and-access-conditional-access-part-2/</loc><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/10/conditional-access-policies-13.png</image:loc><image:title>conditional-access-policies-13</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/10/conditional-access-policies-12.png</image:loc><image:title>conditional-access-policies-12</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/10/conditional-access-policies-11.png</image:loc><image:title>conditional-access-policies-11</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/10/conditional-access-policies-10.png</image:loc><image:title>conditional-access-policies-10</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/10/conditional-access-policies-9.png</image:loc><image:title>conditional-access-policies-9</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/10/conditional-access-policies-8.png</image:loc><image:title>conditional-access-policies-8</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/10/conditional-access-policies-7.png</image:loc><image:title>conditional-access-policies-7</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/10/conditional-access-policies-6.png</image:loc><image:title>conditional-access-policies-6</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/10/conditional-access-policies-5.png</image:loc><image:title>conditional-access-policies-5</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/10/conditional-access-policies-4.png</image:loc><image:title>conditional-access-policies-4</image:title></image:image><lastmod>2023-10-04T21:30:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://strategic-cyber.co.uk/2023/09/28/securing-azure-4-identity-and-access-conditional-access-part-1/</loc><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/09/entra-log-integration-6.png</image:loc><image:title>entra-log-integration-6</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/09/entra-log-integration-5.png</image:loc><image:title>entra-log-integration-5</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/09/entra-log-integration-4.png</image:loc><image:title>entra-log-integration-4</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/09/entra-log-integration-3.png</image:loc><image:title>entra-log-integration-3</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/09/entra-log-integration-2.png</image:loc><image:title>entra-log-integration-2</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/09/entra-log-integration-1.png</image:loc><image:title>entra-log-integration-1</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/09/create-action-group-3.png</image:loc><image:title>create-action-group-3</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/09/create-action-group-6.png</image:loc><image:title>create-action-group-6</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/09/create-action-group-5.png</image:loc><image:title>create-action-group-5</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/09/create-action-group-4-1.png</image:loc><image:title>create-action-group-4-1</image:title></image:image><lastmod>2023-09-29T07:29:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://strategic-cyber.co.uk/2023/09/19/securing-azure-3-identity-and-access-securing-privileged-access/</loc><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/09/azure-recommendations-7.png</image:loc><image:title>azure-recommendations-7</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/09/azure-recommendations-6.png</image:loc><image:title>azure-recommendations-6</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/09/azure-recommendations-5.png</image:loc><image:title>azure-recommendations-5</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/09/azure-recommendations-4.png</image:loc><image:title>azure-recommendations-4</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/09/azure-recommendations-3.png</image:loc><image:title>azure-recommendations-3</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/09/azure-recommendations-2.png</image:loc><image:title>azure-recommendations-2</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/09/azure-recommendations-1.png</image:loc><image:title>azure-recommendations-1</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/09/customer-lockbox-screen-1.png</image:loc><image:title>customer-lockbox-screen-1</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/09/customer-lockbox-screen.png</image:loc><image:title>customer-lockbox-screen</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/09/entra-id-risk-activities-3-1.png</image:loc><image:title>entra-id-risk-activities-3-1</image:title></image:image><lastmod>2023-09-20T21:15:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://strategic-cyber.co.uk/2023/09/13/securing-azure-2-identity-and-access-passwords/</loc><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/09/password-reset-8.png</image:loc><image:title>password-reset-8</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/09/password-reset-7.png</image:loc><image:title>password-reset-7</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/09/password-reset-6.png</image:loc><image:title>password-reset-6</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/09/password-reset-5.png</image:loc><image:title>password-reset-5</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/09/password-reset-4.png</image:loc><image:title>password-reset-4</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/09/password-reset-3.png</image:loc><image:title>password-reset-3</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/09/password-reset-2.png</image:loc><image:title>password-reset-2</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/09/password-reset-1.png</image:loc><image:title>password-reset-1</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/09/set-password-expiry-2.png</image:loc><image:title>set-password-expiry-2</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/09/set-password-expiry-1.png</image:loc><image:title>set-password-expiry-1</image:title></image:image><lastmod>2023-09-14T09:39:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://strategic-cyber.co.uk/2023/09/07/securing-azure-1-introduction/</loc><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/09/iam-roadmap-image.png</image:loc><image:title>iam-roadmap-image</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/09/technical-uk-gov-guide-good-better-best.png</image:loc><image:title>technical-uk-gov-guide-good-better-best</image:title></image:image><lastmod>2023-09-07T13:32:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://strategic-cyber.co.uk/2023/08/28/microsoft-intune-from-scratch-7-edge-configuration/</loc><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/08/smartscreen-profile-2a.png</image:loc><image:title>smartscreen-profile-2a</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/08/smartscreen-profile-5.png</image:loc><image:title>smartscreen-profile-5</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/08/smartscreen-profile-4.png</image:loc><image:title>smartscreen-profile-4</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/08/smartscreen-profile-3.png</image:loc><image:title>smartscreen-profile-3</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/08/smartscreen-profile-2.png</image:loc><image:title>smartscreen-profile-2</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/08/smartscreen-profile-1b.png</image:loc><image:title>smartscreen-profile-1b</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/08/smartscreen-profile-1a.png</image:loc><image:title>smartscreen-profile-1a</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/08/smartscreen-profile-1.png</image:loc><image:title>smartscreen-profile-1</image:title></image:image><lastmod>2023-09-06T13:30:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://strategic-cyber.co.uk/2023/08/24/microsoft-intune-from-scratch-6-endpoint-protection/</loc><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/08/intune-endpoint-protection-config-profile-3a.png</image:loc><image:title>intune-endpoint-protection-config-profile-3a</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/08/intune-endpoint-protection-config-profile-19.png</image:loc><image:title>intune-endpoint-protection-config-profile-19</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/08/intune-endpoint-protection-config-profile-18.png</image:loc><image:title>intune-endpoint-protection-config-profile-18</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/08/intune-endpoint-protection-config-profile-17.png</image:loc><image:title>intune-endpoint-protection-config-profile-17</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/08/intune-endpoint-protection-config-profile-15b.png</image:loc><image:title>intune-endpoint-protection-config-profile-15b</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/08/intune-endpoint-protection-config-profile-16.png</image:loc><image:title>intune-endpoint-protection-config-profile-16</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/08/intune-endpoint-protection-config-profile-15a.png</image:loc><image:title>intune-endpoint-protection-config-profile-15a</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/08/intune-endpoint-protection-config-profile-15.png</image:loc><image:title>intune-endpoint-protection-config-profile-15</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/08/intune-endpoint-protection-config-profile-14.png</image:loc><image:title>intune-endpoint-protection-config-profile-14</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/08/intune-endpoint-protection-config-profile-13.png</image:loc><image:title>intune-endpoint-protection-config-profile-13</image:title></image:image><lastmod>2023-09-06T13:28:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://strategic-cyber.co.uk/2023/08/23/microsoft-intune-from-scratch-5-antivirus-policy/</loc><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/08/mde-enrollment-config-6.png</image:loc><image:title>mde-enrollment-config-6</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/08/mde-enrollment-config-5.png</image:loc><image:title>mde-enrollment-config-5</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/08/mde-enrollment-config-4.png</image:loc><image:title>mde-enrollment-config-4</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/08/mde-enrollment-config-3.png</image:loc><image:title>mde-enrollment-config-3</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/08/mde-enrollment-config.png</image:loc><image:title>mde-enrollment-config</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/08/mde-enrollment-config-2.png</image:loc><image:title>mde-enrollment-config-2</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/08/mde-enrollment-config-1.png</image:loc><image:title>mde-enrollment-config-1</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/08/intune-antivirus-policy-13.png</image:loc><image:title>intune-antivirus-policy-13</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/08/intune-antivirus-policy-12.png</image:loc><image:title>intune-antivirus-policy-12</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/08/intune-antivirus-policy-10.png</image:loc><image:title>intune-antivirus-policy-10</image:title></image:image><lastmod>2023-09-06T13:20:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://strategic-cyber.co.uk/2023/08/22/microsoft-intune-from-scratch-4-compliance-policies/</loc><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/08/device-compliance-policy-13.png</image:loc><image:title>device-compliance-policy-13</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/08/device-compliance-policy-12.png</image:loc><image:title>device-compliance-policy-12</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/08/device-compliance-policy-11.png</image:loc><image:title>device-compliance-policy-11</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/08/device-compliance-policy-10.png</image:loc><image:title>device-compliance-policy-10</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/08/device-compliance-policy-9.png</image:loc><image:title>device-compliance-policy-9</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/08/device-compliance-policy-8.png</image:loc><image:title>device-compliance-policy-8</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/08/device-compliance-policy-7.png</image:loc><image:title>device-compliance-policy-7</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/08/device-compliance-policy-6.png</image:loc><image:title>device-compliance-policy-6</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/08/device-compliance-policy-5.png</image:loc><image:title>device-compliance-policy-5</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/08/device-compliance-policy-4.png</image:loc><image:title>device-compliance-policy-4</image:title></image:image><lastmod>2023-09-06T13:18:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://strategic-cyber.co.uk/2023/08/21/microsoft-intune-3-configure-and-control-apps/</loc><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/08/all-intune-sec-baselines.png</image:loc><image:title>all-intune-sec-baselines</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/08/add-configure-and-protect-apps-25.png</image:loc><image:title>add-configure-and-protect-apps-25</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/08/add-configure-and-protect-apps-24.png</image:loc><image:title>add-configure-and-protect-apps-24</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/08/add-configure-and-protect-apps-23.png</image:loc><image:title>add-configure-and-protect-apps-23</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/08/add-configure-and-protect-apps-22.png</image:loc><image:title>add-configure-and-protect-apps-22</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/08/add-configure-and-protect-apps-21.png</image:loc><image:title>add-configure-and-protect-apps-21</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/08/add-configure-and-protect-apps-19.png</image:loc><image:title>add-configure-and-protect-apps-19</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/08/add-configure-and-protect-apps-18.png</image:loc><image:title>add-configure-and-protect-apps-18</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/08/add-configure-and-protect-apps-16.png</image:loc><image:title>add-configure-and-protect-apps-16</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/08/add-configure-and-protect-apps-15.png</image:loc><image:title>add-configure-and-protect-apps-15</image:title></image:image><lastmod>2023-09-06T13:16:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://strategic-cyber.co.uk/2023/08/15/microsoft-intune-from-scratch-1-intro/</loc><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/08/all-intune-documentation.png</image:loc><image:title>all-intune-documentation</image:title></image:image><lastmod>2023-09-06T13:13:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://strategic-cyber.co.uk/2023/08/31/microsoft-intune-9-aad-join-and-intune-onboarding-user-driven-autopilot/</loc><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/08/confirm-intune-policy.png</image:loc><image:title>confirm-intune-policy</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/08/mde-check-enrollment.png</image:loc><image:title>mde-check-enrollment</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/08/confirm-intune-1-1.png</image:loc><image:title>confirm-intune-1-1</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/08/confirm-intune-1.png</image:loc><image:title>confirm-intune-1</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/08/confirm-intune.png</image:loc><image:title>confirm-intune</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/08/add-work-account-3-1.png</image:loc><image:title>add-work-account-3-1</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/08/add-work-account-3.png</image:loc><image:title>add-work-account-3</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/08/add-work-account-2.png</image:loc><image:title>add-work-account-2</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/08/add-work-account-1d.png</image:loc><image:title>add-work-account-1d</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/08/add-work-account-1c.png</image:loc><image:title>add-work-account-1c</image:title></image:image><lastmod>2023-08-31T21:55:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://strategic-cyber.co.uk/2023/08/17/microsoft-intune-from-scratch-2-initial-steps/</loc><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/08/tenant-status.png</image:loc><image:title>tenant-status</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/08/add-user-to-group.png</image:loc><image:title>add-user-to-group</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/08/create-group-2.png</image:loc><image:title>create-group-2</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/08/create-group-1.png</image:loc><image:title>create-group-1</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/08/intune-assign-license-3.png</image:loc><image:title>intune-assign-license-3</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/08/intune-assign-license-2.png</image:loc><image:title>intune-assign-license-2</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/08/intune-assign-license-1.png</image:loc><image:title>intune-assign-license-1</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/08/dns-entry-3-1.png</image:loc><image:title>dns-entry-3-1</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/08/dns-entry-2a.png</image:loc><image:title>dns-entry-2a</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/08/dns-entry-1a.png</image:loc><image:title>dns-entry-1a</image:title></image:image><lastmod>2023-08-23T09:18:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://strategic-cyber.co.uk/2023/08/14/mde-priority-account-protection/</loc><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/08/priority-account-protection-5.png</image:loc><image:title>priority-account-protection-5</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/08/priority-account-protection-4.png</image:loc><image:title>priority-account-protection-4</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/08/priority-account-protection-3.png</image:loc><image:title>priority-account-protection-3</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/08/priority-account-protection-2.png</image:loc><image:title>priority-account-protection-2</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2023/08/priority-account-protection-1.png</image:loc><image:title>priority-account-protection-1</image:title></image:image><lastmod>2023-08-15T08:17:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://strategic-cyber.co.uk/2023/01/02/last-pass-last-chance/</loc><lastmod>2023-01-03T19:35:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://strategic-cyber.co.uk/2022/11/12/how-to-remove-old-kernel-and-header-versions/</loc><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/12/ckvcapture8.png</image:loc><image:title>ckvcapture8</image:title></image:image><lastmod>2022-12-19T16:33:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://strategic-cyber.co.uk/2022/11/01/enable-windows-firewall-logging/</loc><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/12/windowsfwlogging2.png</image:loc><image:title>windowsfwlogging2</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/12/windowsfwlogging1-1.png</image:loc><image:title>windowsfwlogging1-1</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/12/windowsfwlogging1.png</image:loc><image:title>windowsfwlogging1</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/12/windowsfwlogging3.png</image:loc><image:title>windowsfwlogging3</image:title></image:image><lastmod>2022-12-19T14:30:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://strategic-cyber.co.uk/2022/11/01/forward-windows-firewall-log-to-graylog-using-nxlog/</loc><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/12/nxlogconf1.png</image:loc><image:title>nxlogconf1</image:title></image:image><lastmod>2022-12-19T14:27:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://strategic-cyber.co.uk/2022/09/22/upgrading-to-graylog-enterprise-free-siem-part-4/</loc><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/12/installedlicense.png</image:loc><image:title>installedlicense</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/12/licensebox.png</image:loc><image:title>licensebox</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/12/importlicence-1024x94-1.png</image:loc><image:title>importlicence-1024x94-1</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/12/enterprisesignup-1024x539-1.png</image:loc><image:title>enterprisesignup-1024x539-1</image:title></image:image><lastmod>2022-12-19T13:55:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://strategic-cyber.co.uk/2022/09/22/set-up-windows-event-forwarding-with-sysmon-using-group-policy-free-siem-part-3/</loc><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/12/eventforwardinggposysmonevents.png</image:loc><image:title>eventforwardinggposysmonevents</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/12/eventforwardinggposysmonsubsc2.png</image:loc><image:title>eventforwardinggposysmonsubsc2</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/12/eventforwardinggposysmonsubsc1.png</image:loc><image:title>eventforwardinggposysmonsubsc1</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/12/eventforwardinggpo26-1.png</image:loc><image:title>eventforwardinggpo26-1</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/12/eventforwardinggposub2-1.png</image:loc><image:title>eventforwardinggposub2-1</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/12/eventforwardinggposub1.png</image:loc><image:title>eventforwardinggposub1</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/12/eventforwardinggposub.png</image:loc><image:title>eventforwardinggposub</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/12/eventforwardinggpo27.png</image:loc><image:title>eventforwardinggpo27</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/12/eventforwardinggposub2.png</image:loc><image:title>eventforwardinggposub2</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/12/eventforwardinggpo26.png</image:loc><image:title>eventforwardinggpo26</image:title></image:image><lastmod>2022-12-19T08:54:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://strategic-cyber.co.uk/2022/09/22/sysmon-initial-setup-free-siem-part-1/</loc><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/12/eventviewer6.png</image:loc><image:title>eventviewer6</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/12/eventviewer5.png</image:loc><image:title>eventviewer5</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/12/eventviewer4.png</image:loc><image:title>eventviewer4</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/12/eventviewer3.png</image:loc><image:title>eventviewer3</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/12/eventviewer2.png</image:loc><image:title>eventviewer2</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/12/eventviewer1.png</image:loc><image:title>eventviewer1</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/12/winevtlog.png</image:loc><image:title>winevtlog</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/12/powershellinstall.png</image:loc><image:title>powershellinstall</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/12/powershelloptions.png</image:loc><image:title>powershelloptions</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/12/foldercontents.png</image:loc><image:title>foldercontents</image:title></image:image><lastmod>2022-12-19T08:41:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://strategic-cyber.co.uk/2022/12/16/website-migration/</loc><lastmod>2022-12-16T20:30:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://strategic-cyber.co.uk/2022/12/13/were-back-on-youtube/</loc><lastmod>2022-12-13T13:07:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://strategic-cyber.co.uk/2022/11/12/mutillidae-solution-bypass-client-side-validation/</loc><lastmod>2022-11-12T15:21:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://strategic-cyber.co.uk/2022/11/12/iis-crypto-managing-cypher-suites-in-iis-servers/</loc><lastmod>2022-11-12T15:14:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://strategic-cyber.co.uk/2022/11/12/how-to-export-ssl-tls-certificate-from-windows-and-import-to-linux/</loc><lastmod>2022-11-12T15:12:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://strategic-cyber.co.uk/2022/11/12/mutillidae-solution-sql-injection-user-data-dump/</loc><lastmod>2022-11-12T15:06:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://strategic-cyber.co.uk/2022/11/12/mutillidae-solution-login-bypass/</loc><lastmod>2022-11-12T15:01:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://strategic-cyber.co.uk/2022/11/12/pentesterlab-solution-sql-injection-redirect-part-1/</loc><lastmod>2022-11-12T14:56:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://strategic-cyber.co.uk/2022/11/12/pentesterlab-solution-sql-injection-redirect-part-2/</loc><lastmod>2022-11-12T14:56:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://strategic-cyber.co.uk/2022/11/12/pentesterlab-solution-xss-cookie-steal/</loc><lastmod>2022-11-12T14:56:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://strategic-cyber.co.uk/2022/11/12/pentesterlab-solution-for-web-for-pentester-file-upload-1/</loc><lastmod>2022-11-12T14:56:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://strategic-cyber.co.uk/2022/11/12/pentesterlab-solution-for-web-for-pentester-file-upload-2/</loc><lastmod>2022-11-12T14:56:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://strategic-cyber.co.uk/resources-and-links/</loc><lastmod>2022-11-01T23:48:27+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://strategic-cyber.co.uk/2022/11/01/forwarding-windows-event-logs-into-graylog-nxlog/</loc><lastmod>2022-11-01T23:30:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://strategic-cyber.co.uk/2022/11/01/the-importance-of-encryption-simple-demo/</loc><lastmod>2022-11-01T23:25:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://strategic-cyber.co.uk/2022/11/01/dont-ignore-download-warnings/</loc><lastmod>2022-11-01T23:23:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://strategic-cyber.co.uk/2022/11/01/the-importance-of-updating/</loc><lastmod>2022-11-01T23:21:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://strategic-cyber.co.uk/2022/11/01/bypass-client-side-validation-in-a-website-getting-admin/</loc><lastmod>2022-11-01T23:18:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://strategic-cyber.co.uk/2022/11/01/deploying-ransomware-hacking-rdp-servers-part-4/</loc><lastmod>2022-11-01T23:11:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://strategic-cyber.co.uk/2022/11/01/cracking-password-hashes-hacking-rdp-servers-part-3/</loc><lastmod>2022-11-01T23:06:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://strategic-cyber.co.uk/2022/11/01/why-least-privilege-is-important-hacking-rdp-servers-part-1/</loc><lastmod>2022-11-01T23:04:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://strategic-cyber.co.uk/2022/11/01/stealing-credentials-of-all-logged-in-users-hacking-rdp-servers-part-2/</loc><lastmod>2022-11-01T23:04:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://strategic-cyber.co.uk/2022/08/27/creating-a-cyber-attack-part-1-making-a-malicious-word-document-using-dde/</loc><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/ddedoc7.png</image:loc><image:title>ddedoc7</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/ddedoc6.png</image:loc><image:title>ddedoc6</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/ddedoc5.png</image:loc><image:title>ddedoc5</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/ddedoc4.png</image:loc><image:title>ddedoc4</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/ddedoc3.png</image:loc><image:title>ddedoc3</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/ddedoc2.png</image:loc><image:title>ddedoc2</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/ddedoc1-1.png</image:loc><image:title>ddedoc1-1</image:title></image:image><lastmod>2022-11-01T22:33:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://strategic-cyber.co.uk/2022/08/27/creating-a-cyber-attack-part-2-creating-malware-payloads/</loc><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/msfvenom2.png</image:loc><image:title>msfvenom2</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/msfvenom1.png</image:loc><image:title>msfvenom1</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/beefstartweb.png</image:loc><image:title>beefstartweb</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/beefstart1-1.png</image:loc><image:title>beefstart1-1</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/beefstart1.png</image:loc><image:title>beefstart1</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/beefstart-1.png</image:loc><image:title>beefstart-1</image:title></image:image><lastmod>2022-11-01T22:33:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://strategic-cyber.co.uk/2022/08/27/creating-a-cyber-attack-part-3-creating-a-malicious-web-page/</loc><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/cyberattack3_3.png</image:loc><image:title>cyberattack3_3</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/cyberattack3_2.png</image:loc><image:title>cyberattack3_2</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/cyberattack3_1-1.png</image:loc><image:title>cyberattack3_1-1</image:title></image:image><lastmod>2022-11-01T22:33:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://strategic-cyber.co.uk/2022/08/27/creating-a-cyber-attack-part-4-exploiting-getting-access/</loc><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/cyberattack4_11.png</image:loc><image:title>cyberattack4_11</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/cyberattack4_10-1.png</image:loc><image:title>cyberattack4_10-1</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/cyberattack4_13.png</image:loc><image:title>cyberattack4_13</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/cyberattack4_12.png</image:loc><image:title>cyberattack4_12</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/cyberattack4_10.png</image:loc><image:title>cyberattack4_10</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/cyberattack4_9.png</image:loc><image:title>cyberattack4_9</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/cyberattack4_8.png</image:loc><image:title>cyberattack4_8</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/cyberattack4_7.png</image:loc><image:title>cyberattack4_7</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/cyberattack4_6.png</image:loc><image:title>cyberattack4_6</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/cyberattack4_5.png</image:loc><image:title>cyberattack4_5</image:title></image:image><lastmod>2022-11-01T22:33:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://strategic-cyber.co.uk/2022/08/27/creating-a-cyber-attack-part-5-post-exploitation-and-attempting-persistence-with-beef/</loc><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/fakeflashupdate3.png</image:loc><image:title>fakeflashupdate3</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/execute-5.png</image:loc><image:title>execute-5</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/fakeflashupdate2.png</image:loc><image:title>fakeflashupdate2</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/fakeflashupdate1.png</image:loc><image:title>fakeflashupdate1</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/fakenotificationbar7.png</image:loc><image:title>fakenotificationbar7</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/fakenotificationbar6.png</image:loc><image:title>fakenotificationbar6</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/fakenotificationbar5.png</image:loc><image:title>fakenotificationbar5</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/fakenotificationbar4.png</image:loc><image:title>fakenotificationbar4</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/execute-4.png</image:loc><image:title>execute-4</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/fakenotificationbar3.png</image:loc><image:title>fakenotificationbar3</image:title></image:image><lastmod>2022-11-01T22:33:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://strategic-cyber.co.uk/2022/08/29/creating-a-cyber-attack-part-6-post-exploitation-with-msf-console-and-mimikatz/</loc><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/clearev4.png</image:loc><image:title>clearev4</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/clearev3.png</image:loc><image:title>clearev3</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/clearev2.png</image:loc><image:title>clearev2</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/clearev.png</image:loc><image:title>clearev</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/shell4.png</image:loc><image:title>shell4</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/shell3.png</image:loc><image:title>shell3</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/shell2.png</image:loc><image:title>shell2</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/shell-1.png</image:loc><image:title>shell-1</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/ps2-1.png</image:loc><image:title>ps2-1</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/ps.png</image:loc><image:title>ps</image:title></image:image><lastmod>2022-11-01T22:33:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://strategic-cyber.co.uk/2022/08/29/creating-a-cyber-attack-part-7-post-exploitation-gaining-persistence/</loc><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/rdesktop3.png</image:loc><image:title>rdesktop3</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/rdesktop2.png</image:loc><image:title>rdesktop2</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/rdesktop.png</image:loc><image:title>rdesktop</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/reg2.png</image:loc><image:title>reg2</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/netsh.png</image:loc><image:title>netsh</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/reg1.png</image:loc><image:title>reg1</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/newuser4.png</image:loc><image:title>newuser4</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/newuser3.png</image:loc><image:title>newuser3</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/newuser2.png</image:loc><image:title>newuser2</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/newuser.png</image:loc><image:title>newuser</image:title></image:image><lastmod>2022-11-01T22:32:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://strategic-cyber.co.uk/2022/08/29/creating-a-cyber-attack-part-8-post-exploitation-gaining-persistence-2/</loc><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/meterpreter3.png</image:loc><image:title>meterpreter3</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/restart2.png</image:loc><image:title>restart2</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/meterpreter2.png</image:loc><image:title>meterpreter2</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/meterpreter.png</image:loc><image:title>meterpreter</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/restart.png</image:loc><image:title>restart</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/suggester4.png</image:loc><image:title>suggester4</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/suggester3.png</image:loc><image:title>suggester3</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/suggester2-1.png</image:loc><image:title>suggester2-1</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/suggester-2.png</image:loc><image:title>suggester-2</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/suggester-1.png</image:loc><image:title>suggester-1</image:title></image:image><lastmod>2022-11-01T22:32:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://strategic-cyber.co.uk/2022/08/29/creating-a-cyber-attack-part-9-making-a-malicious-word-document-using-dde-and-powershell/</loc><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/12-maliciousworddocdde.png</image:loc><image:title>12-maliciousworddocdde</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/11-maliciousworddocdde.png</image:loc><image:title>11-maliciousworddocdde</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/10-maliciousworddocdde.png</image:loc><image:title>10-maliciousworddocdde</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/9-maliciousworddocdde.png</image:loc><image:title>9-maliciousworddocdde</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/ddedoc9.png</image:loc><image:title>ddedoc9</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/ddedoc8.png</image:loc><image:title>ddedoc8</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/ddedoc7-1.png</image:loc><image:title>ddedoc7-1</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/ddedoc6-1.png</image:loc><image:title>ddedoc6-1</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/ddedoc5-1.png</image:loc><image:title>ddedoc5-1</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/ddedoc4-1.png</image:loc><image:title>ddedoc4-1</image:title></image:image><lastmod>2022-11-01T22:32:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://strategic-cyber.co.uk/2022/08/29/detecting-a-cyber-attack-part-1-sysmon-endpoint-install/</loc><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/firefox_19.png</image:loc><image:title>firefox_19</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/firefox_18.png</image:loc><image:title>firefox_18</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/firefox_17.png</image:loc><image:title>firefox_17</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/firefox_16-1.png</image:loc><image:title>firefox_16-1</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/firefox_16.png</image:loc><image:title>firefox_16</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/eventviewer_15.png</image:loc><image:title>eventviewer_15</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/eventviewer_14.png</image:loc><image:title>eventviewer_14</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/eventviewer_13.png</image:loc><image:title>eventviewer_13</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/cmdinstall_12.png</image:loc><image:title>cmdinstall_12</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/cmdinstall_11.png</image:loc><image:title>cmdinstall_11</image:title></image:image><lastmod>2022-11-01T22:32:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://strategic-cyber.co.uk/2022/08/29/detecting-a-cyber-attack-part-2-sysmon-create-a-verbose-custom-view/</loc><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/10-eventvwrcreateview.png</image:loc><image:title>10-eventvwrcreateview</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/9-eventvwrcreateview.png</image:loc><image:title>9-eventvwrcreateview</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/8-eventvwrcreateview.png</image:loc><image:title>8-eventvwrcreateview</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/6-eventvwrcreateview.png</image:loc><image:title>6-eventvwrcreateview</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/7-eventvwrcreateview-1.png</image:loc><image:title>7-eventvwrcreateview-1</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/7-eventvwrcreateview.png</image:loc><image:title>7-eventvwrcreateview</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/5-eventvwrcreateview.png</image:loc><image:title>5-eventvwrcreateview</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/4-eventvwrcreateview.png</image:loc><image:title>4-eventvwrcreateview</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/3-eventvwr.png</image:loc><image:title>3-eventvwr</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/2-eventvwr.png</image:loc><image:title>2-eventvwr</image:title></image:image><lastmod>2022-11-01T22:32:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://strategic-cyber.co.uk/2022/08/29/detecting-a-cyber-attack-part-3-sysmon-basic-malware-hunting/</loc><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/19-attackerconnection.png</image:loc><image:title>19-attackerconnection</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/22-eventvwrsysmon.png</image:loc><image:title>22-eventvwrsysmon</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/18-cmdnetstat.png</image:loc><image:title>18-cmdnetstat</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/17-cmdnetstat.png</image:loc><image:title>17-cmdnetstat</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/16-cmdnetstat.png</image:loc><image:title>16-cmdnetstat</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/15-eventvwrsysmon.png</image:loc><image:title>15-eventvwrsysmon</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/21-adobe.png</image:loc><image:title>21-adobe</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/20-adobe.png</image:loc><image:title>20-adobe</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/14-taskmanager.png</image:loc><image:title>14-taskmanager</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/13-taskmanager.png</image:loc><image:title>13-taskmanager</image:title></image:image><lastmod>2022-11-01T22:32:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://strategic-cyber.co.uk/2022/08/29/detecting-a-cyber-attack-part-4-sysmon-basic-malware-hunting-2/</loc><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/16-eventvwrsysmon-2.png</image:loc><image:title>16-eventvwrsysmon-2</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/14-eventvwrsysmon-2.png</image:loc><image:title>14-eventvwrsysmon-2</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/15-eventvwrsysmon-2-1.png</image:loc><image:title>15-eventvwrsysmon-2-1</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/15-eventvwrsysmon-2.png</image:loc><image:title>15-eventvwrsysmon-2</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/13-eventvwrsysmon-2.png</image:loc><image:title>13-eventvwrsysmon-2</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/12-eventvwrsysmon-2.png</image:loc><image:title>12-eventvwrsysmon-2</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/11-eventvwrsysmon-2.png</image:loc><image:title>11-eventvwrsysmon-2</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/10-eventvwrsysmon-2.png</image:loc><image:title>10-eventvwrsysmon-2</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/9-eventvwrsysmon.png</image:loc><image:title>9-eventvwrsysmon</image:title></image:image><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/08/8-taskmanager-1.png</image:loc><image:title>8-taskmanager-1</image:title></image:image><lastmod>2022-11-01T22:32:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://strategic-cyber.co.uk/2022/09/22/install-graylog-on-ubuntu-free-siem-part-2/</loc><image:image><image:loc>https://strategic-cyber.co.uk/wp-content/uploads/2022/09/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2022-11-01T22:32:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://strategic-cyber.co.uk/2022/09/22/windows-event-forwarding-additional-configuration-and-fine-tuning-free-siem-part-5/</loc><lastmod>2022-11-01T22:31:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://strategic-cyber.co.uk/2022/09/22/fine-tuning-part-2-free-siem-part-6/</loc><lastmod>2022-11-01T22:31:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://strategic-cyber.co.uk/2022/09/22/certutil-verify-a-file-hash-in-windows/</loc><lastmod>2022-11-01T22:29:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://strategic-cyber.co.uk/2022/09/22/how-to-verify-a-file-hash-in-linux/</loc><lastmod>2022-11-01T22:29:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://strategic-cyber.co.uk</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2024-09-04T20:11:27+00:00</lastmod></url></urlset>
