<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>https://securityblogsearch.com/2012/12/27/how-to-add-branding-to-your-os-deployment-in-configmgr-2012-part-2-modify-osdbra.html</loc>
<lastmod>2012-12-27T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2012/12/28/how-to-add-branding-to-your-os-deployment-in-configmgr-2012-part-3-create-compli.html</loc>
<lastmod>2012-12-28T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2013/01/13/best-practices-for-implementing-drivers-in-configmgr.html</loc>
<lastmod>2013-01-13T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2013/01/14/beware-when-installing-configmgr-sp1-when-still-using-vsphere-4-or-running-other.html</loc>
<lastmod>2013-01-14T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2013/03/08/techdays-nl-2013-configmgr-2012-notes-from-the-field.html</loc>
<lastmod>2013-03-08T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2013/03/11/role-based-access-control-in-configmgr-2012-part-1-introduction.html</loc>
<lastmod>2013-03-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2013/03/11/role-based-access-control-in-configmgr-2012-part-2-scenario.html</loc>
<lastmod>2013-03-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2013/03/11/role-based-access-control-in-configmgr-2012-part-3-mapping-opco-roles-to-configm.html</loc>
<lastmod>2013-03-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2013/03/11/role-based-access-control-in-configmgr-2012-part-4-outcome.html</loc>
<lastmod>2013-03-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2013/04/02/introducing-the-windows-management-user-group-netherlands-wmug-nl.html</loc>
<lastmod>2013-04-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2013/08/01/how-to-create-configmgr-2012-boot-images-from-scratch.html</loc>
<lastmod>2013-08-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2013/08/07/windows-management-user-group-netherlands-meeting-on-the-17th-of-september.html</loc>
<lastmod>2013-08-07T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2013/11/22/the-self-signed-certificate-could-not-be-created-successfully-error-in-the-creat.html</loc>
<lastmod>2013-11-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2013/11/27/some-things-to-consider-before-installing-the-configmgr-database-on-a-sql-cluste.html</loc>
<lastmod>2013-11-27T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2013/11/27/system-center-2012-r2-configuration-manager-prerequisite-overview-on-windows-ser.html</loc>
<lastmod>2013-11-27T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2014/01/11/configuring-group-policies-for-your-configmgr-servers.html</loc>
<lastmod>2014-01-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2014/01/31/event-dutch-vmware-user-group-conference-on-march-6th.html</loc>
<lastmod>2014-01-31T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2014/02/03/wmug-nl-meeting-on-subject-monitoring-on-the-12th-of-february.html</loc>
<lastmod>2014-02-03T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2014/03/29/implementing-rbac-in-system-center-2012-r2-service-manager.html</loc>
<lastmod>2014-03-29T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2014/04/14/next-wmug-nl-meeting-announced-with-kent-agerlund-and-brian-mason.html</loc>
<lastmod>2014-04-14T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2014/04/14/next-wmug-nl-webinar-announced-with-johan-arwidmark.html</loc>
<lastmod>2014-04-14T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2014/07/08/service-manager-related-links.html</loc>
<lastmod>2014-07-08T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2014/11/26/scsm-2012-failed-to-execute-submit-operation-event-id-26319.html</loc>
<lastmod>2014-11-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2015/05/21/installing-the-service-manager-self-service-portal-ssp-on-windows-server-2012-r2.html</loc>
<lastmod>2015-05-21T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2015/06/10/distributing-content-to-distribution-points-and-distribution-point-groups-in-con.html</loc>
<lastmod>2015-06-10T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2015/11/12/the-new-self-service-portal-for-system-center-2012-r2-service-manager-and-my-exp.html</loc>
<lastmod>2015-11-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2016/11/11/course-20533c-implementing-microsoft-azure-infrastructure-solutionsstudy-referen.html</loc>
<lastmod>2016-11-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2019/07/26/conditional-access-demystified-part-1-introduction.html</loc>
<lastmod>2019-07-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2019/07/29/conditional-access-demystified-part-2-what-is-conditional-access.html</loc>
<lastmod>2019-07-29T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2019/07/29/conditional-access-demystified-part-3-how-does-conditional-access-work.html</loc>
<lastmod>2019-07-29T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2019/07/30/conditional-access-demystified-part-4-designing-a-conditional-access-strategy.html</loc>
<lastmod>2019-07-30T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2019/07/30/conditional-access-demystified-part-5-implementing-conditional-access.html</loc>
<lastmod>2019-07-30T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2019/07/31/conditional-access-demystified-part-6-troubleshooting-conditional-access.html</loc>
<lastmod>2019-07-31T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2019/07/31/conditional-access-demystified-part-7-modifying-conditional-access-to-suit-your.html</loc>
<lastmod>2019-07-31T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2019/08/01/conditional-access-demystified-part-8-resources-and-further-references.html</loc>
<lastmod>2019-08-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2019/08/05/ask-yourself-if-you-still-really-need-adfs.html</loc>
<lastmod>2019-08-05T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2019/10/21/manage-myanalytics-weekly-insight-digest-emails-and-app-availability.html</loc>
<lastmod>2019-10-21T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2019/10/22/litetouch-deployment-failed-return-code-2147467259-0x80004005-when-installing-su.html</loc>
<lastmod>2019-10-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2019/10/25/extending-conditional-access-to-microsoft-cloud-app-security-using-conditional-a.html</loc>
<lastmod>2019-10-25T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2019/10/25/what-are-intune-policy-sets.html</loc>
<lastmod>2019-10-25T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2019/10/28/ios-restore-behaviour-when-re-enrolling-devices-with-backup-data-into-intune.html</loc>
<lastmod>2019-10-28T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2019/10/29/what-are-guided-scenarios-in-microsoft-365-device-managementintune.html</loc>
<lastmod>2019-10-29T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2019/11/06/report-only-mode-and-some-more-handy-reporting-functionality-for-conditional-acc.html</loc>
<lastmod>2019-11-06T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2019/11/22/intune-choosing-whether-to-assign-to-user-or-device-groups.html</loc>
<lastmod>2019-11-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2019/11/25/did-you-already-enable-dkim-and-dmarc-for-your-office-365-domains.html</loc>
<lastmod>2019-11-25T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2019/12/04/implementing-rbac-and-scoping-in-microsoft-intune.html</loc>
<lastmod>2019-12-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/01/05/prerequisites-and-planning-for-centrally-deploying-office-365-outlook-add-ins.html</loc>
<lastmod>2020-01-05T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/01/10/deploy-microsoft-store-apps-using-intune-with-configuration-manager-sccm-co-mana.html</loc>
<lastmod>2020-01-10T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/01/12/microsoft-deprecates-conditional-access-baseline-policies-in-favour-of-security.html</loc>
<lastmod>2020-01-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/01/17/blocking-access-to-cloud-apps-by-integrating-microsoft-cloud-app-security-with-m.html</loc>
<lastmod>2020-01-17T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/01/18/using-intune-to-deploy-the-azure-information-protection-aip-unified-labeling-cli.html</loc>
<lastmod>2020-01-18T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/02/09/did-you-already-modify-your-azure-ad-consent-defaults-settings-here-is-why-you-s.html</loc>
<lastmod>2020-02-09T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/02/11/challenges-while-managing-administrative-privileges-on-your-azure-ad-joined-wind.html</loc>
<lastmod>2020-02-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/02/16/secure-your-azure-management-portal.html</loc>
<lastmod>2020-02-16T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/02/20/stopping-automatic-email-forwarding-in-your-exchange-online-environment-in-a-con.html</loc>
<lastmod>2020-02-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/02/21/windows-update-for-business-just-a-free-cloud-service.html</loc>
<lastmod>2020-02-21T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/02/22/require-trusted-location-for-mfa-and-sspr-registration.html</loc>
<lastmod>2020-02-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/02/23/get-started-with-web-content-filtering-in-mdatp.html</loc>
<lastmod>2020-02-23T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/02/24/a-guide-to-implementing-applocker-on-your-modern-workplace.html</loc>
<lastmod>2020-02-24T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/02/26/azure-ad-tenant-branding-size-does-matter.html</loc>
<lastmod>2020-02-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/03/01/microsoft-is-going-to-disable-basiclegacy-authentication-for-exchange-online-wha.html</loc>
<lastmod>2020-03-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/03/02/license-requirements-for-administering-microsoft-365-services.html</loc>
<lastmod>2020-03-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/03/04/microsoft-secure-score-series-01-what-is-microsoft-secure-score.html</loc>
<lastmod>2020-03-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/03/05/announcing-wmug_nl-saturday-on-march-28-2020.html</loc>
<lastmod>2020-03-05T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/03/05/speaking-at-rdw-techday-on-april-1st-2020.html</loc>
<lastmod>2020-03-05T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/03/11/microsoft-secure-score-series-02-require-mfa-for-administrative-roles.html</loc>
<lastmod>2020-03-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/03/13/how-to-publish-on-premises-applications-and-protect-them-with-mfa.html</loc>
<lastmod>2020-03-13T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/03/23/microsoft-secure-score-series-03-enable-password-hash-sync-if-hybrid.html</loc>
<lastmod>2020-03-23T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/03/25/lessons-learned-while-implementing-azure-ad-privileged-identity-management-pim.html</loc>
<lastmod>2020-03-25T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/03/27/microsoft-secure-score-series-04-ensure-all-users-can-complete-multi-factor-auth.html</loc>
<lastmod>2020-03-27T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/03/30/microsoft-secure-score-series-05-enable-self-service-password-reset.html</loc>
<lastmod>2020-03-30T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/04/01/use-power-automate-for-your-custom-dynamic-groups.html</loc>
<lastmod>2020-04-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/04/07/azure-ad-identity-protection-deep-dive.html</loc>
<lastmod>2020-04-07T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/04/08/microsoft-secure-score-series-06-enable-policy-to-block-legacy-authentication.html</loc>
<lastmod>2020-04-08T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/04/13/microsoft-secure-score-series-07-turn-on-sign-in-risk-policy.html</loc>
<lastmod>2020-04-13T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/04/16/manage-teams-custom-backgrounds-using-intune.html</loc>
<lastmod>2020-04-16T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/04/17/announcing-the-wmug_nl-tuesday-webinars.html</loc>
<lastmod>2020-04-17T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/04/19/activity-policy-templates-for-teams-in-microsoft-cloud-app-security.html</loc>
<lastmod>2020-04-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/04/26/how-to-keep-an-eye-on-your-teams-with-log-analytics-and-azure-monitor.html</loc>
<lastmod>2020-04-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/04/29/office-365-advanced-threat-protection-atp-deep-dive.html</loc>
<lastmod>2020-04-29T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/04/30/announcing-wmug_nl-tuesdays-webinar-2-featuring-michael-van-horenbeeck.html</loc>
<lastmod>2020-04-30T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/05/01/microsoft-secure-score-series-08-use-cloud-app-security-to-detect-anomalous-beha.html</loc>
<lastmod>2020-05-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/05/02/what-admins-should-know-about-the-combined-registration-portal-for-azure-mfa-and.html</loc>
<lastmod>2020-05-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/05/05/speaking-at-workplace-ninja-virtual-edition-2020.html</loc>
<lastmod>2020-05-05T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/05/06/announcing-wmug_nl-tuesdays-webinar-3-featuring-mirko-colemberg.html</loc>
<lastmod>2020-05-06T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/05/09/use-graph-api-data-in-power-bi-using-logic-apps.html</loc>
<lastmod>2020-05-09T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/05/13/announcing-wmug_nl-tuesdays-webinar-4-featuring-wim-matthyssen.html</loc>
<lastmod>2020-05-13T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/05/14/windows-information-protection-wip-app-protection-policies-protected-and-exempt.html</loc>
<lastmod>2020-05-14T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/05/16/connect-a-work-or-school-account-mdm-vs-mam-in-self-enrolment.html</loc>
<lastmod>2020-05-16T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/05/17/going-passwordless-with-the-feitian-fingerprint-card.html</loc>
<lastmod>2020-05-17T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/05/19/register-domain-joined-computers-as-devices-the-redundant-and-broken-hybrid-azur.html</loc>
<lastmod>2020-05-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/05/20/5-manieren-om-azure-active-directory-accounts-veiliger-te-maken.html</loc>
<lastmod>2020-05-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/05/20/aanmelden-zonder-wachtwoord-via-phone-sign-in-zo-gebruik-je-het.html</loc>
<lastmod>2020-05-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/05/20/android-enterprise-fully-managed-beschikbaar-in-microsoft-intune-voor-zakelijke.html</loc>
<lastmod>2020-05-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/05/20/azure-active-directory-password-protection-hoe-werkt-deze-extra-beveiliging.html</loc>
<lastmod>2020-05-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/05/20/azure-ad-aanmelden-via-een-fido2-security-key-zo-werkt-het.html</loc>
<lastmod>2020-05-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/05/20/azure-ad-sign-in-risk-policy-zo-werkt-deze-functionaliteit.html</loc>
<lastmod>2020-05-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/05/20/azure-sentinel-wat-kan-je-met-de-nieuwe-security-oplossing-van-microsoft.html</loc>
<lastmod>2020-05-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/05/20/completed-the-microsoft-365-certified-enterprise-administrator-expert-certificat.html</loc>
<lastmod>2020-05-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/05/20/intune-2005-aanpassen-van-self-service-acties-in-company-portal.html</loc>
<lastmod>2020-05-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/05/20/password-less-werken-is-het-de-toekomst-via-yubikey-windows-hello-en-authenticat.html</loc>
<lastmod>2020-05-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/05/20/veilig-werken-met-teams-en-office365-dit-zijn-quick-wins-vanuit-office365-en-azu.html</loc>
<lastmod>2020-05-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/05/20/windows-10-co-management-flexibel-naar-de-cloud.html</loc>
<lastmod>2020-05-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/05/21/microsoft-365-updates-from-build-2020.html</loc>
<lastmod>2020-05-21T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/05/22/announcing-wmug_nl-tuesdays-webinar-5-featuring-alexander-benoit.html</loc>
<lastmod>2020-05-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/05/22/some-welcome-additions-to-the-admin-consent-workflow-in-azure-ad.html</loc>
<lastmod>2020-05-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/05/22/sure-keep-me-signed-in-and-dont-prompt-for-mfa.html</loc>
<lastmod>2020-05-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/05/23/install-windows-package-manager-winget-using-intune.html</loc>
<lastmod>2020-05-23T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/05/25/hybrid-azure-ad-join-intune-enrollment-prerequisites-checklist-and-process-flow.html</loc>
<lastmod>2020-05-25T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/05/25/may-2020-update-of-the-conditional-access-demystified-whitepaper-workflow-cheat.html</loc>
<lastmod>2020-05-25T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/05/28/announcing-wmug_nl-tuesdays-webinar-6-featuring-bob-cornelissen.html</loc>
<lastmod>2020-05-28T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/05/28/legacy-authentication-zo-blokkeer-je-legacy-authentication-voordat-microsoft-het.html</loc>
<lastmod>2020-05-28T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/05/30/microsoft-secure-score-series-09-do-not-allow-users-to-grant-consent-to-unmanage.html</loc>
<lastmod>2020-05-30T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/06/01/set-additional-clocks-to-windows-10-using-intune.html</loc>
<lastmod>2020-06-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/06/01/the-differences-between-and-history-of-the-microsoft-365-security-centre-complia.html</loc>
<lastmod>2020-06-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/06/04/announcing-wmug_nl-tuesdays-webinar-7-featuring-j%C3%B6rgen-nilsson.html</loc>
<lastmod>2020-06-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/06/06/edge-chromium-zo-configureer-je-beheerde-favorieten-via-microsoft-endpoint-manag.html</loc>
<lastmod>2020-06-06T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/06/06/microsoft-secure-score-series-10-discover-trends-in-shadow-it-application-usage.html</loc>
<lastmod>2020-06-06T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/06/07/controle-op-azure-ad-machtigingen-met-de-admin-consent-workflow-zo-werkt-het.html</loc>
<lastmod>2020-06-07T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/06/07/sign-in-to-azure-ad-using-google-with-azure-ad-external-identities.html</loc>
<lastmod>2020-06-07T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/06/08/android-enterprise-via-microsoft-endpoint-manager-als-vervanger-van-android-devi.html</loc>
<lastmod>2020-06-08T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/06/08/microsoft-secure-score-series-11-turn-on-user-risk-policy.html</loc>
<lastmod>2020-06-08T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/06/14/microsoft-secure-score-series-12-turn-on-customer-lockbox-feature.html</loc>
<lastmod>2020-06-14T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/06/19/automatisch-contacten-synchroniseren-vanaf-microsoft-outlook-naar-native-contact.html</loc>
<lastmod>2020-06-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/06/20/a-first-look-at-administrative-units-and-my-staff-in-azure-active-directory.html</loc>
<lastmod>2020-06-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/06/23/announcing-wmug_nl-tuesdays-webinar-8-featuring-tim-de-keukelaere-on-tuesday-jun.html</loc>
<lastmod>2020-06-23T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/06/24/completed-the-azure-solution-architect-expert-certification.html</loc>
<lastmod>2020-06-24T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/06/25/microsoft-defender-atp-voor-android-zo-werkt-de-configuratie-en-gebruikerservari.html</loc>
<lastmod>2020-06-25T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/06/26/limit-access-to-outlook-web-access-sharepoint-online-and-onedrive-using-conditio.html</loc>
<lastmod>2020-06-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/06/27/use-power-automate-or-logic-apps-to-keep-an-eye-on-your-licenses.html</loc>
<lastmod>2020-06-27T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/06/28/microsoft-defender-for-endpoint-web-content-filtering-administration-limitations.html</loc>
<lastmod>2020-06-28T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/06/30/monitor-teams-activiteiten-via-microsoft-cloud-app-security-activity-templates.html</loc>
<lastmod>2020-06-30T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/07/01/announcing-wmug_nl-tuesdays-webinar-9-featuring-derk-van-der-woude-on-tuesday-ju.html</loc>
<lastmod>2020-07-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/07/02/microsoft-secure-score-series-13-set-automated-notifications-for-new-and-trendin.html</loc>
<lastmod>2020-07-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/07/03/microsoft-secure-score-series-14-designate-more-than-one-global-admin.html</loc>
<lastmod>2020-07-03T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/07/04/microsoft-defender-for-endpoint-web-content-filtering-migrate-rules-from-existin.html</loc>
<lastmod>2020-07-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/07/04/use-power-automate-as-your-conditional-access-police-department.html</loc>
<lastmod>2020-07-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/07/05/edge-chromium-zo-configureer-je-de-tracking-prevention-functionaliteit-vanuit-mi.html</loc>
<lastmod>2020-07-05T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/07/06/microsoft-defender-atp-web-content-filtering-zo-werkt-deze-functionaliteit.html</loc>
<lastmod>2020-07-06T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/07/08/apps-vanuit-cloud-app-security-blokkeren-via-microsoft-defender-atp-microsoft-en.html</loc>
<lastmod>2020-07-08T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/07/10/downloads-blokkeren-via-conditional-access-app-control-vanuit-microsoft-endpoint.html</loc>
<lastmod>2020-07-10T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/07/14/close-the-gap-azure-ad-identity-protection-conditional-access.html</loc>
<lastmod>2020-07-14T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/07/26/getting-started-with-azure-ad-identity-governance-part-1-entitlement-management.html</loc>
<lastmod>2020-07-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/07/30/prepopulate-phone-methods-for-mfa-and-sspr-using-graph-api.html</loc>
<lastmod>2020-07-30T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/07/30/prepopulate-phone-methods-using-a-custom-connector-in-power-automate.html</loc>
<lastmod>2020-07-30T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/08/02/getting-started-with-azure-ad-identity-governance-part-2-access-reviews.html</loc>
<lastmod>2020-08-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/08/06/bulk-dismiss-risky-users-with-power-automate-or-logic-apps.html</loc>
<lastmod>2020-08-06T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/08/13/office-365-templated-policies-and-preset-security-policies-in-exchange-online-pr.html</loc>
<lastmod>2020-08-13T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/08/16/getting-started-with-azure-ad-identity-governance-part-3-privileged-identity-man.html</loc>
<lastmod>2020-08-16T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/08/17/inzage-in-malware-via-cloud-app-security-en-acties-via-de-microsoft-threat-intel.html</loc>
<lastmod>2020-08-17T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/08/17/self-service-purchasing-for-power-platform-visio-and-project-should-you-keep-it.html</loc>
<lastmod>2020-08-17T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/08/19/use-microsoft-graph-security-for-end-user-notifications.html</loc>
<lastmod>2020-08-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/08/20/assigning-groups-to-azure-ad-roles-and-privileged-access-groups-a-first-look.html</loc>
<lastmod>2020-08-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/08/25/how-to-prevent-your-users-from-downloading-and-installing-office-via-the-office.html</loc>
<lastmod>2020-08-25T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/08/25/microsoft-is-making-changes-related-to-automatic-email-forwarding-for-atp-custom.html</loc>
<lastmod>2020-08-25T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/08/31/are-you-already-synchronizing-your-message-center-messages-to-planner-here-is-wh.html</loc>
<lastmod>2020-08-31T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/09/05/control-access-from-unmanaged-devices-with-cloud-app-security.html</loc>
<lastmod>2020-09-05T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/09/06/microsoft-secure-score-series-15-do-not-expire-passwords.html</loc>
<lastmod>2020-09-06T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/09/07/the-difference-between-cloud-app-security-discovery-cad-office-365-cloud-app-sec.html</loc>
<lastmod>2020-09-07T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/09/08/azure-mfa-authentication-method-analysis-share-the-results-with-power-automate.html</loc>
<lastmod>2020-09-08T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/09/10/inzicht-in-brute-force-password-spray-attack-via-azure-sentinel.html</loc>
<lastmod>2020-09-10T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/09/14/announcing-wmug_nl-tuesdays-webinar-10-featuring-ronny-de-jong-on-tuesday-septem.html</loc>
<lastmod>2020-09-14T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/09/20/block-outdated-operating-systems-with-cloud-app-security.html</loc>
<lastmod>2020-09-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/09/22/announcing-wmug_nl-tuesdays-webinar-11-featuring-tim-hermie-jasper-bernaers-on-t.html</loc>
<lastmod>2020-09-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/09/23/microsoft-endpoint-data-loss-prevention-blokkeren-van-usb-bestandstransfers.html</loc>
<lastmod>2020-09-23T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/09/28/food-for-thought-bring-your-own-disaster.html</loc>
<lastmod>2020-09-28T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/09/29/collect-microsoft-teams-activity-in-azure-sentinel-and-start-hunting.html</loc>
<lastmod>2020-09-29T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/09/29/enabling-plus-addressing-in-office-365-exchange-online.html</loc>
<lastmod>2020-09-29T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/10/01/announcing-wmug_nl-tuesdays-webinar-12-featuring-thijs-lecomte.html</loc>
<lastmod>2020-10-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/10/10/azure-ad-continuous-access-evaluation-cae-a-first-look.html</loc>
<lastmod>2020-10-10T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/10/13/mobile-application-management-for-mobile-devices-with-microsoft-endpoint-manager.html</loc>
<lastmod>2020-10-13T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/10/15/block-low-reputation-apps-or-newly-detected-cloud-apps-with-microsoft-defender-f.html</loc>
<lastmod>2020-10-15T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/10/18/license-on-demand-with-power-automate-and-azure-ad.html</loc>
<lastmod>2020-10-18T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/10/20/announcing-wmug_nl-tuesdays-webinar-13-on-october-27th-featuring-erik-loef-and-k.html</loc>
<lastmod>2020-10-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/10/20/microsoft-defender-for-office-365-check-protection-policies-with-configuration-a.html</loc>
<lastmod>2020-10-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/10/22/fast-response-with-azure-ad-continuous-access-evaluation-cae-and-conditional-acc.html</loc>
<lastmod>2020-10-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/10/22/understanding-and-governing-reauthentication-settings-in-azure-active-directory.html</loc>
<lastmod>2020-10-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/10/23/powershell-run-cmdlet-if-another-was-successful-and-keep-trying-until-it-is.html</loc>
<lastmod>2020-10-23T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/10/28/the-10-technical-it-books-of-most-influence-on-me.html</loc>
<lastmod>2020-10-28T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/10/30/protect-files-on-download-using-cloud-app-security-and-azure-information-protect.html</loc>
<lastmod>2020-10-30T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/11/05/announcing-wmug_nl-tuesdays-webinar-14-on-november-10-2020-featuring-ronni-peder.html</loc>
<lastmod>2020-11-05T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/11/12/get-all-conditional-access-querys-with-a-single-click-using-graph-api.html</loc>
<lastmod>2020-11-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/11/17/endpoint-data-loss-prevention-dlp-protect-cloud-uploads-and-printing.html</loc>
<lastmod>2020-11-17T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/11/18/conditional-access-demystified-my-recommended-default-set-of-policies.html</loc>
<lastmod>2020-11-18T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/11/23/azure-active-directory-identity-governance-access-reviews.html</loc>
<lastmod>2020-11-23T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/11/25/announcing-wmug_nl-tuesdays-webinar-15-on-december-1st-2020-featuring-alex-verbo.html</loc>
<lastmod>2020-11-25T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/11/29/designing-and-building-your-microsoft-endpoint-managerintune-environment-for-ope.html</loc>
<lastmod>2020-11-29T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/12/04/defining-more-granularity-for-your-conditional-access-app-enforced-restrictions.html</loc>
<lastmod>2020-12-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/12/08/deploy-and-configure-microsoft-defender-for-endpoint-on-ios-devices.html</loc>
<lastmod>2020-12-08T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/12/09/azure-active-directory-identity-governance-privileged-identity-management.html</loc>
<lastmod>2020-12-09T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/12/16/use-microsoft-technology-for-the-detection-and-prevention-of-the-solarwinds-chai.html</loc>
<lastmod>2020-12-16T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2020/12/20/azure-active-directory-identity-governance-azure-ad-entitlement-management.html</loc>
<lastmod>2020-12-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/01/04/rebranding-the-windows-management-user-group-netherlands-to-workplace-ninja-user.html</loc>
<lastmod>2021-01-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/01/05/speaking-about-conditional-access-at-the-workplace-ninja-usergroup-m%C3%BCnchen-on-th.html</loc>
<lastmod>2021-01-05T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/01/06/your-road-to-become-a-kusto-knight-starts-here.html</loc>
<lastmod>2021-01-06T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/01/08/enrich-microsoft-365-profile-card-with-extensions-and-custom-attributes.html</loc>
<lastmod>2021-01-08T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/01/15/store-bitlocker-recovery-keys-in-azure-ad-for-devices-already-encrypted.html</loc>
<lastmod>2021-01-15T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/01/16/self-service-in-microsoft-365.html</loc>
<lastmod>2021-01-16T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/01/19/announcing-wpninjasnl-tuesdays-webinar-1-january-19-2021-featuring-adnan-hendric.html</loc>
<lastmod>2021-01-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/01/19/enable-automatic-access-reviews-for-guest-users-in-teams-and-microsoft-365-group.html</loc>
<lastmod>2021-01-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/01/22/announcing-wpninjasnl-live-ask-us-anything-1-on-tuesday-january-26-about-securit.html</loc>
<lastmod>2021-01-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/01/22/my-presentation-about-conditional-access-at-the-workplace-ninja-user-group-m%C3%BCnch.html</loc>
<lastmod>2021-01-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/01/24/understanding-modern-vs-legacy-authentication-in-microsoft-365.html</loc>
<lastmod>2021-01-24T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/01/26/enabling-self-service-password-reset-sspr-for-your-modern-workplace-users.html</loc>
<lastmod>2021-01-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/01/27/announcing-wpninjasnl-tuesdays-webinar-2-tuesday-february-2nd-featuring-kenny-bu.html</loc>
<lastmod>2021-01-27T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/01/27/browser-restrictions-and-configuration-when-using-conditional-access-on-your-mod.html</loc>
<lastmod>2021-01-27T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/01/28/speaking-at-the-nordic-virtual-summit-2021-about-conditional-access.html</loc>
<lastmod>2021-01-28T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/01/30/understanding-application-guard-for-office-now-generally-available.html</loc>
<lastmod>2021-01-30T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/02/02/where-do-we-store-the-data-in-kusto.html</loc>
<lastmod>2021-02-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/02/03/kusto-gym.html</loc>
<lastmod>2021-02-03T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/02/03/speaking-at-the-workplace-ninja-user-group-netherlands-meetup-webinar-on-februar.html</loc>
<lastmod>2021-02-03T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/02/04/updating-your-security-baselines-in-microsoft-endpoint-manager-to-a-newer-versio.html</loc>
<lastmod>2021-02-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/02/04/which-data-types-do-we-have.html</loc>
<lastmod>2021-02-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/02/05/demystifying-windows-10-in-cloud-configuration.html</loc>
<lastmod>2021-02-05T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/02/06/speaking-at-global-automation-bootcamp-2021.html</loc>
<lastmod>2021-02-06T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/02/06/turn-existing-azure-ad-devices-into-windows-autopilot-devices.html</loc>
<lastmod>2021-02-06T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/02/07/one-year-anniversary-janbakkertech.html</loc>
<lastmod>2021-02-07T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/02/09/first-look-at-access-reviews-for-guests-in-all-teams-and-microsoft-365-groups.html</loc>
<lastmod>2021-02-09T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/02/09/number-matching-with-microsoft-authenticator-app-in-azure-mfa.html</loc>
<lastmod>2021-02-09T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/02/11/my-presentation-about-conditional-access-at-the-nordic-virtual-summit-2021.html</loc>
<lastmod>2021-02-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/02/11/use-intune-to-manage-microsoft-defender-for-endpoint-tags-and-device-groups.html</loc>
<lastmod>2021-02-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/02/12/privileged-identity-management-discovery-and-insights.html</loc>
<lastmod>2021-02-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/02/16/february-2021-update-of-the-azure-ad-conditional-access-demystified-whitepaper-a.html</loc>
<lastmod>2021-02-16T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/02/16/go-fully-passwordless-with-the-new-azure-ad-temporary-access-pass-feature.html</loc>
<lastmod>2021-02-16T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/02/17/my-presentation-about-conditional-access-at-the-workplace-ninja-user-group-nethe.html</loc>
<lastmod>2021-02-17T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/02/18/a-first-look-at-the-settings-catalog-in-microsoft-endpoint-manager.html</loc>
<lastmod>2021-02-18T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/02/18/microsoft-defender-for-endpoint-offline-onboarding-for-windows-10-via-a-proxy.html</loc>
<lastmod>2021-02-18T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/02/21/azure-active-directory-temporary-access-pass.html</loc>
<lastmod>2021-02-21T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/02/24/announcing-wpninjasnl-tuesdays-webinar-20-tuesday-march-2nd-featuring-thomas-mau.html</loc>
<lastmod>2021-02-24T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/02/25/microsoft-information-protection-sensitivity-labels-custom-user-permissions-and.html</loc>
<lastmod>2021-02-25T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/03/01/get-insights-into-device-restart-frequency-with-endpoint-analytics.html</loc>
<lastmod>2021-03-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/03/01/speaking-at-the-workplace-ninja-user-group-switzerland-2103-virtual-meetup-on-ma.html</loc>
<lastmod>2021-03-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/03/02/detect-critical-0-day-exploits-with-defender-for-endpoint.html</loc>
<lastmod>2021-03-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/03/03/modern-workplace-management-key-takeaways-from-the-microsoft-ignite-march-2021-a.html</loc>
<lastmod>2021-03-03T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/03/07/microsoft-defender-network-protection-not-enabling-via-intune-troubleshooting-fi.html</loc>
<lastmod>2021-03-07T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/03/07/review-guest-access-across-microsoft-365-groups-teams.html</loc>
<lastmod>2021-03-07T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/03/08/track-the-registration-and-usage-of-all-authentications-methods-with-azuread.html</loc>
<lastmod>2021-03-08T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/03/09/a-first-look-at-the-microsoft-365-apps-admin-center.html</loc>
<lastmod>2021-03-09T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/03/09/announcing-wpninjasnl-tuesdays-webinar-21-tuesday-march-16-featuring-patrick-van.html</loc>
<lastmod>2021-03-09T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/03/11/create-powershell-session-is-failed-using-oauth-when-using-the-exchange-online-v.html</loc>
<lastmod>2021-03-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/03/12/enable-external-sender-identification-in-exchange-online.html</loc>
<lastmod>2021-03-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/03/13/microsoft-defender-antivirus-schedule-install-updates-via-network-shares.html</loc>
<lastmod>2021-03-13T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/03/15/block-legacy-authentication-now-and-dont-wait-for-microsoft.html</loc>
<lastmod>2021-03-15T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/03/16/have-you-already-started-your-journey-towards-passwordless-authentication-on-you.html</loc>
<lastmod>2021-03-16T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/03/19/my-presentations-at-the-workplace-ninja-user-group-switzerland-2103-virtual-meet.html</loc>
<lastmod>2021-03-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/03/20/azure-active-directory-connect-cloud-sync.html</loc>
<lastmod>2021-03-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/03/22/announcing-wpninjasnl-live-ask-us-anything-3-on-tuesday-march-23-about-microsoft.html</loc>
<lastmod>2021-03-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/03/22/update-bitlocker-unique-identifiers-with-intune.html</loc>
<lastmod>2021-03-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/03/24/announcing-wpninjasnl-tuesdays-webinar-22-tuesday-march-30-featuring-dirk-jan-mo.html</loc>
<lastmod>2021-03-24T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/03/29/defender-for-endpoint-on-linux-onboarding-and-behavior-monitoring-detection.html</loc>
<lastmod>2021-03-29T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/03/30/configuring-windows-update-for-business-settings-for-your-microsoft-endpoint-man.html</loc>
<lastmod>2021-03-30T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/03/31/conditional-access-skip-mfa-for-company-devices-on-the-company-network.html</loc>
<lastmod>2021-03-31T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/04/04/require-mfa-for-azure-ad-domain-join-and-device-registration.html</loc>
<lastmod>2021-04-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/04/06/announcing-wpninjasnl-tuesdays-webinar-23-tuesday-april-13-featuring-greg-ramsey.html</loc>
<lastmod>2021-04-06T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/04/07/designing-and-configuring-compliance-policies-for-your-windows-modern-workplace.html</loc>
<lastmod>2021-04-07T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/04/08/revoke-access-to-office-files-with-sensitivity-labels-and-azure-information-prot.html</loc>
<lastmod>2021-04-08T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/04/09/using-conditional-access-to-provide-more-granularity-when-registering-or-joining.html</loc>
<lastmod>2021-04-09T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/04/16/announcing-wpninjasnl-live-ask-us-anything-4-on-tuesday-april-20-about-expeditin.html</loc>
<lastmod>2021-04-16T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/04/19/time-is-of-the-essence.html</loc>
<lastmod>2021-04-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/04/19/troubleshooting-hybrid-azure-ad-intune-automatic-enrollment.html</loc>
<lastmod>2021-04-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/04/20/customizing-the-microsoft-endpoint-manager-company-portal-and-my-experiences-doi.html</loc>
<lastmod>2021-04-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/05/03/automatically-hide-ip-addresses-when-recording-demos-or-screen-sharing.html</loc>
<lastmod>2021-05-03T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/05/03/defender-for-endpoint-device-discovery-discover-the-unmanaged-part-of-the-corpor.html</loc>
<lastmod>2021-05-03T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/05/04/announcing-wpninjasnl-tuesdays-webinar-24-tuesday-may-11-featuring-nico-zieck.html</loc>
<lastmod>2021-05-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/05/06/speaking-about-modern-authentication-at-the-may-2021-meetup-of-the-microsoft-clo.html</loc>
<lastmod>2021-05-06T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/05/11/a-first-look-at-expediting-windows-10-quality-updates-when-using-windows-update.html</loc>
<lastmod>2021-05-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/05/11/a-first-look-at-filtering-when-assigning-apps-compliance-policies-and-configurat.html</loc>
<lastmod>2021-05-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/05/11/use-azure-security-center-workbooks-for-detailed-information-dashboards.html</loc>
<lastmod>2021-05-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/05/15/three-considerations-for-azure-information-protection-deployments.html</loc>
<lastmod>2021-05-15T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/05/17/announcing-wpninjasnl-live-ask-us-anything-5-on-tuesday-may-18-2021-tomorrow-abo.html</loc>
<lastmod>2021-05-17T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/05/18/integrate-azure-sentinel-with-microsoft-teams-for-seamlessly-collaboration.html</loc>
<lastmod>2021-05-18T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/05/20/announcing-wpninjasnl-tuesdays-webinar-25-tuesday-may-25-featuring-jan-bakker.html</loc>
<lastmod>2021-05-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/05/25/mdm-policy-processing-on-windows-10-with-microsoft-endpoint-manager-a-closer-loo.html</loc>
<lastmod>2021-05-25T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/05/27/a-first-look-at-using-filters-for-devices-as-conditions-in-azure-ad-conditional.html</loc>
<lastmod>2021-05-27T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/05/28/our-session-about-modern-authentication-at-the-may-2021-meetup-of-the-microsoft.html</loc>
<lastmod>2021-05-28T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/05/31/endpoint-manager-filters-use-filtering-for-assigning-policies-profiles-and-apps.html</loc>
<lastmod>2021-05-31T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/06/02/enroll-android-smartphones-into-microsoft-defender-for-endpoint-for-blocking-flu.html</loc>
<lastmod>2021-06-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/06/03/announcing-wpninjasnl-tuesdays-webinar-26-tuesday-june-8th-featuring-thorsten-pi.html</loc>
<lastmod>2021-06-03T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/06/03/received-the-microsoft-most-valuable-professional-mvp-award-in-enterprise-mobili.html</loc>
<lastmod>2021-06-03T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/06/07/export-microsoft-365-defender-security-events-with-the-streaming-api.html</loc>
<lastmod>2021-06-07T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/06/10/speaking-about-conditional-access-at-the-microsoft-365-security-compliance-user.html</loc>
<lastmod>2021-06-10T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/06/13/three-cool-things-to-do-with-azure-information-protection.html</loc>
<lastmod>2021-06-13T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/06/14/monitor-azure-ad-break-glass-accounts-with-microsoft-sentinel.html</loc>
<lastmod>2021-06-14T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/06/15/deploying-office-365-with-intune-as-a-win32-app-and-why-youd-want-to.html</loc>
<lastmod>2021-06-15T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/06/16/change-billing-model-for-azure-ad-guest-users.html</loc>
<lastmod>2021-06-16T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/06/16/power-automate-not-your-daddys-rss-reader.html</loc>
<lastmod>2021-06-16T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/06/18/review-service-principals-with-azure-ad-access-reviews-and-monitor-with-azure-se.html</loc>
<lastmod>2021-06-18T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/06/21/announcing-wpninjasnl-tuesdays-webinar-27-tomorrow-tuesday-june-22-featuring-pet.html</loc>
<lastmod>2021-06-21T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/06/23/a-first-look-at-azure-ad-conditional-access-authentication-context.html</loc>
<lastmod>2021-06-23T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/06/23/monitor-rdp-brute-force-attack-with-azure-sentinel-azure-security-center.html</loc>
<lastmod>2021-06-23T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/06/26/reauthorise-windows-server-dhcp-with-one-line-of-powershell.html</loc>
<lastmod>2021-06-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/07/01/announcing-wpninjasnl-tuesdays-webinar-28-tuesday-july-6-featuring-jeremy-moskow.html</loc>
<lastmod>2021-07-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/07/01/getting-everyone-enrolled-for-azure-mfa-and-sspr-how-hard-can-it-be.html</loc>
<lastmod>2021-07-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/07/01/my-session-about-conditional-access-at-the-microsoft-365-security-compliance-use.html</loc>
<lastmod>2021-07-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/07/01/printnightmare-use-microsoft-defender-sentinel-toolings-to-get-insights.html</loc>
<lastmod>2021-07-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/07/07/using-the-azure-sentinel-windows-security-events-connector-for-getting-custom-ev.html</loc>
<lastmod>2021-07-07T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/07/11/the-big-comparison-of-defender-for-endpoint-features-by-operating-system.html</loc>
<lastmod>2021-07-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/07/12/azure-ad-identity-protection-user-risk-and-sign-in-risk-protection-with-automati.html</loc>
<lastmod>2021-07-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/07/15/using-defender-for-endpoint-live-response-api-with-sentinel-playbooks-automation.html</loc>
<lastmod>2021-07-15T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/07/26/speaking-at-the-workplace-ninja-virtual-edition-2021-about-designing-and-buildin.html</loc>
<lastmod>2021-07-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/07/27/use-sysmon-for-monitoring-servers-with-microsoft-sentinel.html</loc>
<lastmod>2021-07-27T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/08/01/security-hygiene-azure-security-center-and-secure-score.html</loc>
<lastmod>2021-08-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/08/02/hunting-for-unsigned-drivers-like-printer-nightmare.html</loc>
<lastmod>2021-08-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/08/04/protecting-against-password-spray-attacks-with-azure-sentinel-and-azure-ad.html</loc>
<lastmod>2021-08-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/08/08/bonus-how-to-build-a-powerapp-temporary-access-pass-manager-part-6.html</loc>
<lastmod>2021-08-08T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/08/09/how-to-build-a-powerapp-temporary-access-pass-manager-part-1.html</loc>
<lastmod>2021-08-09T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/08/09/how-to-build-a-powerapp-temporary-access-pass-manager-part-2.html</loc>
<lastmod>2021-08-09T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/08/09/how-to-build-a-powerapp-temporary-access-pass-manager-part-3.html</loc>
<lastmod>2021-08-09T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/08/09/how-to-build-a-powerapp-temporary-access-pass-manager-part-4.html</loc>
<lastmod>2021-08-09T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/08/09/how-to-build-a-powerapp-temporary-access-pass-manager-part-5.html</loc>
<lastmod>2021-08-09T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/08/09/searching-and-finding-data.html</loc>
<lastmod>2021-08-09T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/08/11/protecting-against-lateral-movement-with-defender-for-identity-and-monitor-with.html</loc>
<lastmod>2021-08-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/08/19/this-might-be-the-fido2-key-for-you-authentrend-atkeypro.html</loc>
<lastmod>2021-08-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/09/10/onedrive-client-sign-in-issues-due-to-conditional-access-policies-in-azure-ad-te.html</loc>
<lastmod>2021-09-10T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/09/13/cloud-app-discovery-with-mcas-mde-for-shadow-it-monitoring-and-integration-with.html</loc>
<lastmod>2021-09-13T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/09/17/preventing-account-breaches-leveraging-sim-swapping-techniques-by-nudging-your-u.html</loc>
<lastmod>2021-09-17T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/09/21/stream-azure-ad-identity-protection-events-to-microsoft-sentinel-log-analytics.html</loc>
<lastmod>2021-09-21T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/10/01/role-assignable-groups-and-privileged-identity-management.html</loc>
<lastmod>2021-10-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/10/02/kb-add-account-operation-is-blocked-by-policy-on-the-device.html</loc>
<lastmod>2021-10-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/10/02/using-mozilla-firefox-as-a-browser-when-using-azure-ad-conditional-access-on-you.html</loc>
<lastmod>2021-10-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/10/04/warnmonitor-users-for-shadow-it-usage-with-microsoft-cloud-app-security.html</loc>
<lastmod>2021-10-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/10/04/with-windows-update-for-business-configured-will-my-devices-automagically-start.html</loc>
<lastmod>2021-10-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/10/06/customize-the-mfa-registration-policy-in-azure-ad-identity-protection.html</loc>
<lastmod>2021-10-06T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/10/07/control-azure-ad-conditional-access-policy-behavior-during-an-azure-ad-outage.html</loc>
<lastmod>2021-10-07T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/10/08/speaking-about-conditional-access-at-the-centric-craft-webinar-on-wednesday-octo.html</loc>
<lastmod>2021-10-08T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/10/11/install-the-new-unified-microsoft-defender-for-endpoint-agent-on-server-2012r2-a.html</loc>
<lastmod>2021-10-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/10/14/october-2021-update-of-the-conditional-access-demystified-whitepaper-and-workflo.html</loc>
<lastmod>2021-10-14T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/10/19/updated-october-2021-availability-of-defender-for-endpoint-features-by-operating.html</loc>
<lastmod>2021-10-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/10/22/announcing-wpninjasnl-tuesdays-webinar-32-tuesday-october-26-featuring-isidora-k.html</loc>
<lastmod>2021-10-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/10/23/10-productivity-tips-for-m365-administrators.html</loc>
<lastmod>2021-10-23T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/10/25/enabling-and-configuring-web-content-filtering-in-microsoft-defender-for-endpoin.html</loc>
<lastmod>2021-10-25T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/10/27/create-role-assignable-groups-based-on-existing-groups.html</loc>
<lastmod>2021-10-27T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/10/28/enable-location-information-and-code-match-for-azure-mfa.html</loc>
<lastmod>2021-10-28T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/10/29/announcing-wpninjasnl-meetup-1-thursday-november-4th-microsoft-ignite-edition.html</loc>
<lastmod>2021-10-29T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/10/29/speaking-at-the-appmanagevent-2021-about-designing-and-building-microsoft-endpoi.html</loc>
<lastmod>2021-10-29T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/10/30/continuous-access-evaluation-configuration-is-now-part-of-conditional-access.html</loc>
<lastmod>2021-10-30T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/11/01/azure-ad-conditional-access-sign-in-troubleshooting-tip-flag-sign-in-errors-for.html</loc>
<lastmod>2021-11-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/11/10/manage-device-control-with-microsoft-defender-for-endpoint-and-endpoint-manager.html</loc>
<lastmod>2021-11-10T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/11/16/my-appearance-in-the-cloud-conversations-podcast-32.html</loc>
<lastmod>2021-11-16T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/11/16/speaking-at-the-htmd-conference-2021-about-designing-and-building-microsoft-endp.html</loc>
<lastmod>2021-11-16T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/11/17/conditional-access-announcements-from-ignite-november-2021-reviewed.html</loc>
<lastmod>2021-11-17T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/11/17/the-day-i-bought-my-winrar-license.html</loc>
<lastmod>2021-11-17T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/11/18/microsoft-endpoint-manager-and-the-issue-of-the-tattooing-block-write-access-to.html</loc>
<lastmod>2021-11-18T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/11/18/microsoft-sentinel-content-hub-using-solutions-and-start-with-the-training-lab-c.html</loc>
<lastmod>2021-11-18T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/11/22/identity-protection-risk-analysis-workbook-get-more-azure-ad-identity-protection.html</loc>
<lastmod>2021-11-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/11/25/gradual-rollout-options-for-upgrading-to-windows-11-are-now-available-in-microso.html</loc>
<lastmod>2021-11-25T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/11/28/use-registration-campaign-to-promote-microsoft-authenticator-app.html</loc>
<lastmod>2021-11-28T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/12/13/onboard-fido2-keys-using-temporary-access-pass-in-azure-ad.html</loc>
<lastmod>2021-12-13T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/12/14/log4j-and-cve-2021-44228-use-microsoft-defender-for-endpoint-for-software-threat.html</loc>
<lastmod>2021-12-14T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/12/14/speaking-at-the-december-2021-mc2mc-evening-event-about-designing-and-building-m.html</loc>
<lastmod>2021-12-14T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2021/12/24/exploring-microsoft-365s-nobelium-defence-capabilities.html</loc>
<lastmod>2021-12-24T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/01/04/deploying-defender-for-endpoint-on-ios-with-zero-touch-onboarding.html</loc>
<lastmod>2022-01-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/01/04/speaking-about-conditional-access-at-the-m365-chicago-virtual-event-on-january-1.html</loc>
<lastmod>2022-01-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/01/10/act-on-group-membership-changes-in-azure-active-directory.html</loc>
<lastmod>2022-01-10T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/01/11/onboard-microsoft-defender-for-endpoint-using-azure-arc-for-non-azure-devices.html</loc>
<lastmod>2022-01-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/01/12/microsoft-365-self-service-using-power-apps.html</loc>
<lastmod>2022-01-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/01/15/tag-domain-controllers-automatically-in-defender-for-endpoint-using-kql-logic-ap.html</loc>
<lastmod>2022-01-15T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/01/19/deploy-oob-update-with-powershell.html</loc>
<lastmod>2022-01-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/01/22/how-i-fell-in-love-with-app-updates.html</loc>
<lastmod>2022-01-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/01/27/monitor-microsoft-sentinel-data-connectors-using-health-monitoring-and-logic-app.html</loc>
<lastmod>2022-01-27T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/01/27/updating-apps-a-new-era.html</loc>
<lastmod>2022-01-27T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/01/28/pause-update-rings-no-way-home.html</loc>
<lastmod>2022-01-28T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/01/28/proactive-remediatons-the-hidden-world.html</loc>
<lastmod>2022-01-28T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/02/01/escape-from-windows-probusiness.html</loc>
<lastmod>2022-02-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/02/02/protect-against-azuread-oauth-consent-phishing-attempts-illicit-consent-attack.html</loc>
<lastmod>2022-02-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/02/08/setting-up-apple-business-manager-for-use-with-azure-active-directory.html</loc>
<lastmod>2022-02-08T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/02/09/azure-ad-connect-escape-to-proxy-addresses.html</loc>
<lastmod>2022-02-09T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/02/10/access-reviews-for-azure-ad-directory-roles.html</loc>
<lastmod>2022-02-10T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/02/11/autopilot-across-the-timeout-verse.html</loc>
<lastmod>2022-02-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/02/15/connecting-microsoft-endpoint-manager-to-apple-business-manager.html</loc>
<lastmod>2022-02-15T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/02/17/the-dark-and-the-windows-remotelocal-wipe.html</loc>
<lastmod>2022-02-17T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/02/20/admx-ingestion-for-centero-agent-and-carillon-client-using-intune.html</loc>
<lastmod>2022-02-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/02/21/collect-security-events-in-microsoft-sentinel-with-the-new-ama-agent-and-dcr.html</loc>
<lastmod>2022-02-21T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/02/21/kb-selfservicepasswordreset-write-back-problem-error-hr80230818.html</loc>
<lastmod>2022-02-21T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/02/22/apple-business-manager-device-import-options-for-later-use-within-microsoft-endp.html</loc>
<lastmod>2022-02-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/03/01/silence-of-the-microsoft-teams-notifications.html</loc>
<lastmod>2022-03-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/03/02/protecting-microsoft-teams-with-microsoft-sentinel.html</loc>
<lastmod>2022-03-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/03/03/ill-always-know-what-you-did-last-wipe.html</loc>
<lastmod>2022-03-03T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/03/09/the-intune-remotewipe-fix.html</loc>
<lastmod>2022-03-09T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/03/13/get-started-with-multi-stage-access-reviews-in-azure-ad.html</loc>
<lastmod>2022-03-13T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/03/16/office-templates-the-rise-of-gru.html</loc>
<lastmod>2022-03-16T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/03/17/2022-03-update-the-search-for-sp-uhh-shiftf10.html</loc>
<lastmod>2022-03-17T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/03/21/10-tips-to-secure-your-identities-in-microsoft-365.html</loc>
<lastmod>2022-03-21T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/03/23/honest-win32app-thief.html</loc>
<lastmod>2022-03-23T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/03/23/what-happens-without-rdp-protection-after-24-hours-in-microsoft-sentinel-microso.html</loc>
<lastmod>2022-03-23T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/03/29/updated-march-2022-ultimate-comparison-of-defender-for-endpoint-features-by-oper.html</loc>
<lastmod>2022-03-29T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/04/02/wrath-of-the-0x81036501-mdm-error.html</loc>
<lastmod>2022-04-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/04/04/forgive-us-our-bitlocker-suspension.html</loc>
<lastmod>2022-04-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/04/04/mamma-mia-here-we-wipe-again.html</loc>
<lastmod>2022-04-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/04/05/download-intune-powershell-scripts-with-graph-explorer.html</loc>
<lastmod>2022-04-05T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/04/07/use-microsoft-defender-for-identity-response-actions-for-on-premises-ad-accounts.html</loc>
<lastmod>2022-04-07T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/04/20/dont-be-a-menace-to-autopilot-while-configuring-your-wufb-in-the-hood.html</loc>
<lastmod>2022-04-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/04/21/mfa-prompt-spamming-mfa-fatigue-what-can-you-do-to-prevent-detect-attacks.html</loc>
<lastmod>2022-04-21T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/05/01/kb-mobile-phone-number-not-in-sync-azure-ad-connect.html</loc>
<lastmod>2022-05-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/05/02/detect-and-block-credential-dumps-with-defender-for-endpoint-attack-surface-redu.html</loc>
<lastmod>2022-05-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/05/03/speaking-about-implementing-microsoft-endpoint-manager-for-operations-and-mobile.html</loc>
<lastmod>2022-05-03T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/05/04/defender-for-endpoint-removable-storage-access-control.html</loc>
<lastmod>2022-05-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/05/10/microsoft-defender-for-endpoint-the-ultimate-blog-series-for-windows-intro-p0.html</loc>
<lastmod>2022-05-10T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/05/11/the-41-year-old-hardware-hash-who-knocked-up-autopilot-and-felt-superbad-about-i.html</loc>
<lastmod>2022-05-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/05/15/defender-av-improving-windows-defender-update-efficacy.html</loc>
<lastmod>2022-05-15T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/05/15/multi-stage-approval-for-privileged-roles-using-azure-ad-identity-governance.html</loc>
<lastmod>2022-05-15T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/05/15/mystaff-simplified-administrative-password-reset.html</loc>
<lastmod>2022-05-15T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/05/15/osint-using-shodanio-to-protect-your-school-district.html</loc>
<lastmod>2022-05-15T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/05/17/esp-cultural-learnings-of-online-microsoft-store-apps-for-make-benefit-glorious.html</loc>
<lastmod>2022-05-17T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/05/18/microsoft-defender-for-endpoint-troubleshooting-mode-how-to-use-it.html</loc>
<lastmod>2022-05-18T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/05/18/speaking-about-mobile-application-management-at-the-techorama-belgium-2022-event.html</loc>
<lastmod>2022-05-18T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/05/19/azure-ad-integrating-azure-ad-logs-with-azure-monitor.html</loc>
<lastmod>2022-05-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/05/19/the-100-year-old-quick-assist-tool-who-climbed-out-the-window-and-disappeared.html</loc>
<lastmod>2022-05-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/05/20/kb-reset-cross-tenant-access-policies-back-to-the-system-default.html</loc>
<lastmod>2022-05-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/05/24/intune-edge-in-ios-kiosk-mode.html</loc>
<lastmod>2022-05-24T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/05/24/managing-microsoft-defender-for-endpoint-with-the-new-security-management-featur.html</loc>
<lastmod>2022-05-24T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/05/25/night-at-the-windows-store-api-service-secret-of-the-subscription-activation.html</loc>
<lastmod>2022-05-25T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/05/28/get-started-with-azure-ad-b2b-direct-connect.html</loc>
<lastmod>2022-05-28T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/05/30/0x80073cfb-the-company-portal-awakens.html</loc>
<lastmod>2022-05-30T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/05/31/dynamic-administrative-units-using-on-prem-organizational-units.html</loc>
<lastmod>2022-05-31T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/06/01/use-automationplaybooks-in-microsoft-sentinel-during-incident-update-activity-us.html</loc>
<lastmod>2022-06-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/06/03/bill-ted-face-the-nce.html</loc>
<lastmod>2022-06-03T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/06/03/protocol-nightmare-on-elmstreet-the-dream-cve-2022-30190.html</loc>
<lastmod>2022-06-03T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/06/05/how-to-manage-m365-portal-directly-from-microsoft-teams.html</loc>
<lastmod>2022-06-05T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/06/09/lob-apps-win32-apps-the-intune-lightning-thief.html</loc>
<lastmod>2022-06-09T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/06/14/the-microsoft-store-for-business-the-curse-of-the-retirement.html</loc>
<lastmod>2022-06-14T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/06/17/microsoft-defender-for-endpoint-can-now-isolates-hacked-unmanaged-windows-device.html</loc>
<lastmod>2022-06-17T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/06/17/microsoft-windows-update-to-permanently-disable-internet-explorer.html</loc>
<lastmod>2022-06-17T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/06/17/the-microsoft-store-apps-and-the-city-of-a-thousand-missing-frameworks.html</loc>
<lastmod>2022-06-17T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/06/21/detecting-the-dfscoerce-attack.html</loc>
<lastmod>2022-06-21T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/06/22/microsoft-defender-for-business-how-to-use-it-and-what-are-the-differences-with.html</loc>
<lastmod>2022-06-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/06/22/the-adventures-of-the-broken-store-apps-across-the-8th-s-1-15-2-1.html</loc>
<lastmod>2022-06-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/06/23/retirement-of-superseded-microsoft-entra-connect-connect-sync-versions.html</loc>
<lastmod>2022-06-23T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/06/28/how-to-upgrade-from-mma-based-defender-for-endpoint-to-mde-unified-solution-in-d.html</loc>
<lastmod>2022-06-28T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/06/29/troubleshooting-intune-mdm-device-enrollment-errors.html</loc>
<lastmod>2022-06-29T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/06/30/get-alerts-on-azure-resource-assignments-made-outside-pim.html</loc>
<lastmod>2022-06-30T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/07/01/office-csp-dns-and-the-journey-to-autopilot.html</loc>
<lastmod>2022-07-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/07/04/use-a-fido2-security-key-as-azure-mfa-verification-method.html</loc>
<lastmod>2022-07-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/07/06/night-of-the-autopilot-of-the-dawn-of-the-temporary-access-pass-of-the-mfa-of-th.html</loc>
<lastmod>2022-07-06T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/07/07/microsoft-defender-for-endpoint-series-what-is-defender-for-endpoint-part1.html</loc>
<lastmod>2022-07-07T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/07/11/block-internet-macros-in-office-and-dont-wait-for-microsoft.html</loc>
<lastmod>2022-07-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/07/13/the-incredibly-strange-device-who-stopped-syncing-and-became-certificate-zombies.html</loc>
<lastmod>2022-07-13T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/07/15/how-to-deal-with-orphaned-objects-in-azure-ad-connect.html</loc>
<lastmod>2022-07-15T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/07/19/fantastic-apps-the-secrets-of-updating-them.html</loc>
<lastmod>2022-07-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/07/20/oobeaadv10-return-of-the-502-autopilot-error.html</loc>
<lastmod>2022-07-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/07/21/the-tenantid-from-toronto.html</loc>
<lastmod>2022-07-21T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/07/22/how-to-set-up-evilginx-to-phish-office-365-credentials.html</loc>
<lastmod>2022-07-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/07/25/retry-win32-app-lola-retry.html</loc>
<lastmod>2022-07-25T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/07/26/microsoft-defender-for-endpoint-series-configure-defender-for-endpoint-part2.html</loc>
<lastmod>2022-07-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/07/27/defender-for-servers-defender-for-endpoint-onboarding-behind-the-scenes.html</loc>
<lastmod>2022-07-27T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/07/28/a-babysitters-troubleshooting-guide-to-breaking-autopilot.html</loc>
<lastmod>2022-07-28T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/08/01/the-ballad-of-buster-exit-codes.html</loc>
<lastmod>2022-08-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/08/08/protect-against-aitm-mfa-phishing-attacks-using-microsoft-technology.html</loc>
<lastmod>2022-08-08T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/08/09/autopilot-delay-win32-app-installation.html</loc>
<lastmod>2022-08-09T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/08/15/the-last-thing-edge-wanted.html</loc>
<lastmod>2022-08-15T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/08/15/use-the-azure-monitor-agent-ama-for-defender-for-cloud-and-migrate-from-mma-agen.html</loc>
<lastmod>2022-08-15T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/08/16/block-users-from-viewing-their-bitlocker-keys.html</loc>
<lastmod>2022-08-16T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/08/17/ready-for-attestation-a-true-underdog-story.html</loc>
<lastmod>2022-08-17T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/08/17/speaking-about-conditional-access-at-the-workplace-ninja-summit-2022-on-septembe.html</loc>
<lastmod>2022-08-17T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/08/26/ultimate-comparison-of-defender-for-endpoint-features-by-os-updated-august-2022.html</loc>
<lastmod>2022-08-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/08/30/microsoft-defender-for-endpoint-series-onboard-defender-for-endpoint-part3.html</loc>
<lastmod>2022-08-30T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/08/30/the-last-tpm-attestation-script-from-your-lover.html</loc>
<lastmod>2022-08-30T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/08/31/tips-for-preventing-against-new-modern-identity-attacks-aitm-mfa-fatigue-prt-oau.html</loc>
<lastmod>2022-08-31T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/09/07/intune-the-legend-of-the-certificate.html</loc>
<lastmod>2022-09-07T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/09/08/choosing-a-fido2-security-key.html</loc>
<lastmod>2022-09-08T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/09/08/microsoft-defender-for-endpoint-series-onboard-using-microsoft-intune-part3a.html</loc>
<lastmod>2022-09-08T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/09/11/how-to-make-a-team-or-microsoft-365-group-calendar-accessible-in-outlook.html</loc>
<lastmod>2022-09-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/09/12/microsoft-defender-for-endpoint-series-onboard-using-defender-for-cloud-part3b.html</loc>
<lastmod>2022-09-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/09/15/microsoft-defender-for-endpoint-series-onboard-using-azure-arc-or-direct-onboard.html</loc>
<lastmod>2022-09-15T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/09/16/blocking-web-push-notifications-with-endpoint-manager-and-why-you-should.html</loc>
<lastmod>2022-09-16T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/09/20/configure-file-integrity-monitoring-fim-using-defender-for-cloud-and-ama-agent.html</loc>
<lastmod>2022-09-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/09/20/take-control-of-your-guests-with-the-external-identities-policy.html</loc>
<lastmod>2022-09-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/09/21/autopilot-pre-provisionings-infinite-playuhwaiting-list.html</loc>
<lastmod>2022-09-21T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/09/21/kb-write-requests-excluding-delete-must-contain-the-content-type-header-declarat.html</loc>
<lastmod>2022-09-21T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/09/22/how-to-mitigate-mfa-fatigue-and-learn-from-the-uber-breach-for-additional-protec.html</loc>
<lastmod>2022-09-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/09/25/deploying-winget-apps-with-microsoft-endpoint-manager-and-auto-update.html</loc>
<lastmod>2022-09-25T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/09/26/speaking-about-conditional-access-at-experts-live-netherlands-2022-on-september.html</loc>
<lastmod>2022-09-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/09/27/microsoft-defender-for-endpoint-series-onboard-using-configuration-manager-gpo-p.html</loc>
<lastmod>2022-09-27T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/09/27/the-man-who-knew-autopilot.html</loc>
<lastmod>2022-09-27T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/10/03/automate-issuing-temporary-access-pass-for-joiners-with-lifecycle-workflows.html</loc>
<lastmod>2022-10-03T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/10/03/speaking-about-mobile-application-management-at-the-appmanagevent-2022-on-octobe.html</loc>
<lastmod>2022-10-03T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/10/04/convert-registry-settings-to-admx.html</loc>
<lastmod>2022-10-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/10/04/how-to-implement-defender-for-identity-and-configure-all-prerequisites.html</loc>
<lastmod>2022-10-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/10/05/azure-ad-new-controls-for-authentication-strength.html</loc>
<lastmod>2022-10-05T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/10/05/the-road-to-microsoft-mvp-and-beyond.html</loc>
<lastmod>2022-10-05T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/10/07/setting-up-azure-mfa-for-vpn-and-remote-desktop-gateway.html</loc>
<lastmod>2022-10-07T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/10/09/how-to-keep-track-of-changes-on-microsoft-docs-learn.html</loc>
<lastmod>2022-10-09T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/10/11/fullmetal-certificate-the-intune-revenge-of-renewal.html</loc>
<lastmod>2022-10-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/10/12/vm-contributor-to-domain-admin-in-60-seconds.html</loc>
<lastmod>2022-10-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/10/13/how-to-use-microsoft-defender-easm-external-attack-surface-management.html</loc>
<lastmod>2022-10-13T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/10/16/cisa-scuba-diving-into-the-azure-ad-baseline.html</loc>
<lastmod>2022-10-16T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/10/18/intune-sync-debug-tool-the-last-royal-treasure.html</loc>
<lastmod>2022-10-18T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/10/19/admx-when-nature-calls.html</loc>
<lastmod>2022-10-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/10/26/microsoft-defender-for-endpoint-series-configure-av-next-generation-protection-p.html</loc>
<lastmod>2022-10-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/10/26/the-school-for-admx-upload-and-evil.html</loc>
<lastmod>2022-10-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/11/01/microsoft-defender-for-endpoint-series-define-the-av-policy-baseline-part4a.html</loc>
<lastmod>2022-11-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/11/03/the-device-with-a-clock-in-its-service.html</loc>
<lastmod>2022-11-03T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/11/03/which-data-connector-and-activity-is-free-in-microsoft-sentinel.html</loc>
<lastmod>2022-11-03T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/11/08/autopilot-convert-your-devices.html</loc>
<lastmod>2022-11-08T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/11/08/microsoft-defender-for-endpoint-series-attack-surface-reduction-and-additional-p.html</loc>
<lastmod>2022-11-08T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/11/09/defender-for-endpoint-implementing-asr-rules.html</loc>
<lastmod>2022-11-09T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/11/14/automated-lifecycle-workflows-for-privileged-identities-with-azure-ad-identity-g.html</loc>
<lastmod>2022-11-14T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/11/14/intune-using-access-packages-to-enable-user-device-enrollment.html</loc>
<lastmod>2022-11-14T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/11/14/synchronize-attributes-for-lifecycle-workflows-azure-ad-connect-sync.html</loc>
<lastmod>2022-11-14T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/11/16/microsoft-store-the-movie-hoopa-and-the-clash-of-winget.html</loc>
<lastmod>2022-11-16T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/11/18/goodbye-legacy-sspr-and-mfa-settings-hello-authentication-methods-policies.html</loc>
<lastmod>2022-11-18T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/11/21/conditional-access-public-preview-functionality-reviewed-22h2-part-1-authenticat.html</loc>
<lastmod>2022-11-21T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/11/21/microsoft-defender-for-endpoint-series-defender-vulnerability-management-part5.html</loc>
<lastmod>2022-11-21T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/11/22/operationalizing-mitre-attck-to-support-microsoft-sentinel-deployments-and-detec.html</loc>
<lastmod>2022-11-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/11/23/all-quiet-on-the-intune-detection-rules.html</loc>
<lastmod>2022-11-23T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/11/23/conditional-access-public-preview-functionality-reviewed-22h2-part-2-conditional.html</loc>
<lastmod>2022-11-23T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/11/25/conditional-access-public-preview-functionality-reviewed-22h2-part-3-granular-co.html</loc>
<lastmod>2022-11-25T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/11/30/windows-autopilot-and-the-autopilot_marker.html</loc>
<lastmod>2022-11-30T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/12/01/how-to-manage-your-microsoft-edge-enterprise-cloud-site-list-like-a-boss.html</loc>
<lastmod>2022-12-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/12/02/field-notes-migration-from-federation-to-cloud-authentication.html</loc>
<lastmod>2022-12-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/12/05/hotel-microsoft-store-apps-transformania.html</loc>
<lastmod>2022-12-05T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/12/06/secret-society-of-second-born-desktopappinstaller-csps.html</loc>
<lastmod>2022-12-06T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/12/13/step-by-step-how-windows-retrieves-the-autopilot-profile.html</loc>
<lastmod>2022-12-13T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/12/15/december-2022-update-of-the-conditional-access-demystified-whitepaper-and-workfl.html</loc>
<lastmod>2022-12-15T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/12/19/securing-privileged-user-access-with-azure-ad-conditional-access-and-identity-go.html</loc>
<lastmod>2022-12-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/12/19/spaml-spoofing-users-in-azure-ad-with-saml-claims-transformations.html</loc>
<lastmod>2022-12-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/12/20/the-kid-who-would-remediate-hardware-data.html</loc>
<lastmod>2022-12-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/12/21/break-glass-accounts-and-azure-ad-security-defaults.html</loc>
<lastmod>2022-12-21T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/12/23/how-to-detect-file-deletions-using-audit-data-securityevent-azure-loganalytics.html</loc>
<lastmod>2022-12-23T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/12/23/how-to-detect-impacted-files-by-controlled-folder-access-and-attack-surface-redu.html</loc>
<lastmod>2022-12-23T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/12/23/how-to-do-data-transformation-with-azure-loganalytics-to-enrich-information-opti.html</loc>
<lastmod>2022-12-23T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/12/23/how-to-manually-remove-a-malfunctioning-mdi-sensor-which-cannot-be-removed-throu.html</loc>
<lastmod>2022-12-23T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/12/23/meet-me-in-microsoft-security-insights-show-episode-132-security-private-preview.html</loc>
<lastmod>2022-12-23T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/12/24/how-to-migrate-from-qualys-and-enable-microsoft-defender-vulnerability-managemen.html</loc>
<lastmod>2022-12-24T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/12/27/how-to-do-a-password-audit-of-your-active-directory-passwords-using-dsinternals.html</loc>
<lastmod>2022-12-27T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/12/27/how-to-run-custom-scripts-on-thousands-of-servers-within-a-few-minutes-using-azu.html</loc>
<lastmod>2022-12-27T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/12/28/microsoft-defender-antivirus-performance-analyzer-understand-which-files-file-ex.html</loc>
<lastmod>2022-12-28T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/12/29/mailbox-usage-reports-graph-api-and-logic-apps-whats-not-to-like.html</loc>
<lastmod>2022-12-29T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2022/12/29/real-example-with-43-cost-savings-on-sentinel-log-costs-how-to-exclude-syslog-lo.html</loc>
<lastmod>2022-12-29T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/01/03/microsoft-defender-for-endpoint-series-validate-defender-protection-and-addition.html</loc>
<lastmod>2023-01-03T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/01/04/offlinedeviceid-multiverse-of-madness.html</loc>
<lastmod>2023-01-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/01/09/sentinel-alert-rules-management-with-add-update-remove-alert-rule-action-automat.html</loc>
<lastmod>2023-01-09T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/01/11/the-school-for-autopilot-and-deviceaddrequest.html</loc>
<lastmod>2023-01-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/01/12/how-to-save-by-storing-your-syslog-and-defender-for-endpoint-long-term-logs-in-a.html</loc>
<lastmod>2023-01-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/01/12/microsoft-defender-for-endpoint-series-integrations-with-other-products-part7.html</loc>
<lastmod>2023-01-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/01/15/how-to-implement-a-gradual-ring-rollout-process-for-microsoft-defender-updates.html</loc>
<lastmod>2023-01-15T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/01/16/cloud-identity-is-still-the-future.html</loc>
<lastmod>2023-01-16T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/01/17/something-went-wrong-fury-of-the-gods.html</loc>
<lastmod>2023-01-17T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/01/21/using-transport-rules-as-a-security-tool.html</loc>
<lastmod>2023-01-21T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/01/22/lab-server-build.html</loc>
<lastmod>2023-01-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/01/23/microsoft-defender-for-endpoint-series-advanced-hunting-and-custom-detections-pa.html</loc>
<lastmod>2023-01-23T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/01/26/deploy-sysmon-and-collect-additional-data-with-sentinel-and-the-ama-agent.html</loc>
<lastmod>2023-01-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/01/29/azure-ad-101-azure-subscription-relationship.html</loc>
<lastmod>2023-01-29T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/01/29/azure-automation-advanced-auditing.html</loc>
<lastmod>2023-01-29T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/01/29/ghost-blogging-on-azure-container-apps.html</loc>
<lastmod>2023-01-29T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/02/01/automate-reporting-of-defender-for-cloud-recommendations-role-assignments-with-3.html</loc>
<lastmod>2023-02-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/02/01/block-the-automated-onboarding-of-defender-for-endpoint-without-disabling-the-in.html</loc>
<lastmod>2023-02-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/02/05/getting-started-with-azure-ad-cross-tenant-synchronisation.html</loc>
<lastmod>2023-02-05T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/02/06/dont-let-dns-be-your-azure-ad-recovery-downfall.html</loc>
<lastmod>2023-02-06T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/02/06/orphaned-azure-security-principals-clean-up-azure-policy-managed-identity-role-a.html</loc>
<lastmod>2023-02-06T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/02/08/microsoft-defender-for-endpoint-series-automation-via-logic-apps-and-sentinel-pa.html</loc>
<lastmod>2023-02-08T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/02/09/deploy-sentinel-analytic-rules-with-bicep-and-powershell.html</loc>
<lastmod>2023-02-09T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/02/13/the-importance-of-identity-in-microsoft-certifications.html</loc>
<lastmod>2023-02-13T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/02/14/azure-arc-onboarding-servers-with-group-policy.html</loc>
<lastmod>2023-02-14T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/02/14/microsoft-defender-for-endpoint-series-tips-and-tricks-common-mistakes-part10.html</loc>
<lastmod>2023-02-14T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/02/15/how-msa-tickets-are-used-during-autopilot.html</loc>
<lastmod>2023-02-15T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/02/19/feb-2023-ultimate-comparison-of-defender-for-endpoint-features-by-os.html</loc>
<lastmod>2023-02-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/02/20/azure-ad-conditional-access-authentication-context-now-also-available-for-azure.html</loc>
<lastmod>2023-02-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/02/20/duplicate-azure-active-directory-conditional-access-policies.html</loc>
<lastmod>2023-02-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/02/22/deploy-microsoft-defender-for-endpoint-on-ios-using-intunemem.html</loc>
<lastmod>2023-02-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/02/22/only-autopilot-whiteglove-in-the-building.html</loc>
<lastmod>2023-02-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/03/01/are-proactive-remediations-run-during-autopilot.html</loc>
<lastmod>2023-03-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/03/02/microsoft-defender-smartscreen-how-to-use-smartscreen-and-phishing-protection.html</loc>
<lastmod>2023-03-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/03/03/system-preferred-multifactor-authentication-in-azure-ad-dont-settle-for-less.html</loc>
<lastmod>2023-03-03T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/03/08/the-yin-yang-store-apps-vpn-of-eternity.html</loc>
<lastmod>2023-03-08T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/03/09/azure-securing-subscriptions.html</loc>
<lastmod>2023-03-09T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/03/11/entra-app-registrations-and-enterprise-applications-the-definitive-guide.html</loc>
<lastmod>2023-03-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/03/14/authenticator-lite-approve-azure-mfa-prompts-with-the-outlook-app.html</loc>
<lastmod>2023-03-14T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/03/15/dont-tell-mom-the-pre-provisioned-autopilot-device-is-compliant.html</loc>
<lastmod>2023-03-15T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/03/19/abuse-and-detection-of-m365d-live-response-for-privilege-escalation-on-control-p.html</loc>
<lastmod>2023-03-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/03/25/mapping-mde-and-windows-security-events-overlap.html</loc>
<lastmod>2023-03-25T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/03/27/tutorial-change-the-workspace-destination-of-your-already-provisioned-data-colle.html</loc>
<lastmod>2023-03-27T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/03/28/march-23rd-2023-the-day-everyone-came-from-uzbekistan.html</loc>
<lastmod>2023-03-28T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/03/29/triangle-of-tpm-attestation-sadness.html</loc>
<lastmod>2023-03-29T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/03/30/aws-integrating-pim-with-azure-ad-sso-for-aws-iam-identity-center.html</loc>
<lastmod>2023-03-30T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/04/01/aws-integrating-pim-with-azure-ad-sso-for-aws-single-account-access.html</loc>
<lastmod>2023-04-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/04/01/welcome.html</loc>
<lastmod>2023-04-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/04/02/anyconnector-azlogdcringestps-your-helper-to-send-data-via-azure-pipeline-azure.html</loc>
<lastmod>2023-04-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/04/02/clientinspector-a-cool-showcase-to-demonstrate-log-ingestion-api-azure-log-inges.html</loc>
<lastmod>2023-04-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/04/02/collecting-cef-syslogs-using-azure-monitor-agent.html</loc>
<lastmod>2023-04-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/04/02/collecting-iis-logs-using-azure-monitor-agent.html</loc>
<lastmod>2023-04-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/04/02/collecting-performance-data-using-azure-monitor-agent-vminsights-and-servicemap.html</loc>
<lastmod>2023-04-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/04/02/collecting-security-events-using-azure-monitor-agent.html</loc>
<lastmod>2023-04-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/04/02/collecting-syslogs-using-azure-monitor-agent.html</loc>
<lastmod>2023-04-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/04/02/collecting-system-application-events-using-azure-monitor-agent.html</loc>
<lastmod>2023-04-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/04/02/collecting-text-logs-using-azure-monitor-agent.html</loc>
<lastmod>2023-04-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/04/02/how-to-do-data-transformation-using-workspace-transformation-for-legacy-upload-m.html</loc>
<lastmod>2023-04-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/04/02/master-azure-logging-in-depth.html</loc>
<lastmod>2023-04-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/04/02/tutorial-how-to-make-data-transformations-using-data-collection-rules.html</loc>
<lastmod>2023-04-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/04/02/understanding-azure-data-collection-endpoint.html</loc>
<lastmod>2023-04-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/04/02/understanding-azure-logging-capabilities-in-depth.html</loc>
<lastmod>2023-04-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/04/02/understanding-the-fundamentals-of-log-collection-with-azure-monitor-agent-azure.html</loc>
<lastmod>2023-04-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/04/03/intune-block-mounting-of-iso-files.html</loc>
<lastmod>2023-04-03T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/04/04/microsoft-defender-for-identity-deployment-guide.html</loc>
<lastmod>2023-04-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/04/05/block-vulnerableunwanted-applications-with-defender-for-endpoint-and-vulnerabili.html</loc>
<lastmod>2023-04-05T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/04/05/deploy-microsoft-teams-on-azure-virtual-desktop-using-intune.html</loc>
<lastmod>2023-04-05T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/04/05/intune-discover-defender-av-exclusions-using-proactive-remediation.html</loc>
<lastmod>2023-04-05T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/04/06/microsoft-defender-for-cloud-the-ultimate-blog-series-intro-p0.html</loc>
<lastmod>2023-04-06T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/04/07/azlogdcringestps-how-to-do-data-manipulation-before-sending-data-via-azure-pipel.html</loc>
<lastmod>2023-04-07T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/04/07/azlogdcringestps-tips-tricks-sending-data-via-azure-pipeline-azure-log-ingestion.html</loc>
<lastmod>2023-04-07T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/04/07/unleash-the-power-of-defender-for-servers-plan-2-the-intro-part-0.html</loc>
<lastmod>2023-04-07T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/04/08/configure-azure-ad-connect-health-email-notifications-to-continue-to-receive-not.html</loc>
<lastmod>2023-04-08T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/04/19/are-you-there-intune-its-me-health-attestation-certificate.html</loc>
<lastmod>2023-04-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/04/19/unleash-the-power-of-defender-for-servers-plan-2-file-integrity-monitoring-part.html</loc>
<lastmod>2023-04-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/04/20/securing-your-azuremicrosoft-365-environment-with-principle-of-least-privilege-a.html</loc>
<lastmod>2023-04-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/04/22/azure-automation-device-cleanup-v2.html</loc>
<lastmod>2023-04-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/04/22/self-service-password-reset-write-back-problem-error-hr80230818.html</loc>
<lastmod>2023-04-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/04/23/the-microsoft-defender-for-office-365-recommended-configuration-analyzer-orca.html</loc>
<lastmod>2023-04-23T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/04/23/windows-laps-and-management-through-microsoft-intune.html</loc>
<lastmod>2023-04-23T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/04/27/microsoft-365-what-is-and-how-to-set-up-idle-session-timeout.html</loc>
<lastmod>2023-04-27T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/04/28/find-active-directory-accounts-configured-to-use-des-and-rc4-kerberos-encryption.html</loc>
<lastmod>2023-04-28T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/04/29/how-to-use-windows-laps-powershell.html</loc>
<lastmod>2023-04-29T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/04/29/i-killed-my-endpoint-privilege-management-enrollment-hung-her-on-a-meathook-and.html</loc>
<lastmod>2023-04-29T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/04/30/configure-exchange-online-certificate-based-authentication-for-unattended-script.html</loc>
<lastmod>2023-04-30T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/05/01/block-c2-communication-with-defender-for-endpoint.html</loc>
<lastmod>2023-05-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/05/01/intune-microsoft-tunnel-vpn-gateway.html</loc>
<lastmod>2023-05-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/05/02/endpoint-privilege-management-and-the-device-health-monitoring-reports-quantuman.html</loc>
<lastmod>2023-05-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/05/02/how-to-disable-automapping-for-a-shared-mailbox-in-outlook-for-office-365.html</loc>
<lastmod>2023-05-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/05/02/the-war-of-the-endpoint-privilege-management-enrollment.html</loc>
<lastmod>2023-05-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/05/03/how-works-microsoft-defender-threat-intelligence-defender-ti-and-what-is-the-dif.html</loc>
<lastmod>2023-05-03T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/05/04/break-glass-account-and-how-to-get-notified-when-a-break-glass-account-is-used.html</loc>
<lastmod>2023-05-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/05/04/how-to-work-around-the-azure-security-agent-extension-not-deploying-by-default-o.html</loc>
<lastmod>2023-05-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/05/04/lab-certificate-authority-setup.html</loc>
<lastmod>2023-05-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/05/04/report-suspicious-activity-fraud-alert-for-azure-mfa.html</loc>
<lastmod>2023-05-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/05/04/set-up-a-free-microsoft-intune-lab-tenant-with-microsoft-365-developer-subscript.html</loc>
<lastmod>2023-05-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/05/04/veeam-backup-for-microsoft-365-why-you-need-to-back-up-your-microsoft-365-data.html</loc>
<lastmod>2023-05-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/05/06/azure-devops-get-a-local-backup-of-your-code-repositories.html</loc>
<lastmod>2023-05-06T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/05/07/secure-authentication-method-provisioning-with-temporary-access-pass.html</loc>
<lastmod>2023-05-07T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/05/08/network-device-discovery-vulnerability-management-with-microsoft-365-defender.html</loc>
<lastmod>2023-05-08T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/05/12/azure-ad-admin-and-use-of-pim-email-forwarding-for-your-admin-accounts-notificat.html</loc>
<lastmod>2023-05-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/05/13/azure-devops-use-azure-key-vauls-for-secrets-in-your-pipelines.html</loc>
<lastmod>2023-05-13T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/05/15/block-gtld-zip-fqdn-domains-with-windows-firewall-and-defender-for-endpoint.html</loc>
<lastmod>2023-05-15T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/05/16/building-an-active-directorywindows-server-lab.html</loc>
<lastmod>2023-05-16T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/05/17/unleash-the-power-of-defender-for-servers-plan-2-adaptive-application-controls-p.html</loc>
<lastmod>2023-05-17T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/05/18/easy-riders-intune-bulls-how-the-defender-for-endpoint-live-response-and-rock-n.html</loc>
<lastmod>2023-05-18T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/05/19/microsoft-icons.html</loc>
<lastmod>2023-05-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/05/21/demystifying-data-collection-rules-and-transformations.html</loc>
<lastmod>2023-05-21T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/05/31/the-virtual-account-that-rocks-the-epm.html</loc>
<lastmod>2023-05-31T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/06/01/microsoft-defender-threat-intelligence-defender-ti-integrations-with-microsoft-s.html</loc>
<lastmod>2023-06-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/06/02/send-an-email-on-a-new-azure-mfa-method-registration.html</loc>
<lastmod>2023-06-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/06/05/direct-on-board-your-non-azure-servers-to-defender-for-cloud-without-azure-arc.html</loc>
<lastmod>2023-06-05T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/06/05/evaluation-center-was-unavailable-where-do-i-download-isos-now-if-this-happen-ag.html</loc>
<lastmod>2023-06-05T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/06/05/exchange-online-block-sign-in-from-shared-mailboxes.html</loc>
<lastmod>2023-06-05T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/06/05/onboard-defender-for-endpoint-without-azure-arc-via-direct-onboarding.html</loc>
<lastmod>2023-06-05T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/06/06/the-password-rotation-the-ballad-of-windows-laps-and-threadpools.html</loc>
<lastmod>2023-06-06T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/06/07/step-up-authentication-with-defender-for-cloud-apps-and-authentication-context.html</loc>
<lastmod>2023-06-07T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/06/08/what-is-customer-lockbox-in-microsoft-365-and-how-to-use-it.html</loc>
<lastmod>2023-06-08T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/06/12/protection-of-privileged-users-and-groups-by-azure-ad-restricted-management-admi.html</loc>
<lastmod>2023-06-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/06/13/loganalytics-table-migration-from-classic-v1-to-data-collector-rule-based-v2-vid.html</loc>
<lastmod>2023-06-13T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/06/13/running-evilginx-30-on-windows.html</loc>
<lastmod>2023-06-13T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/06/14/unleash-the-power-of-defender-for-servers-plan-2-agentless-scanning-part-3.html</loc>
<lastmod>2023-06-14T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/06/15/microsoft-defender-for-endpoint-settings-management-enhancements.html</loc>
<lastmod>2023-06-15T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/06/16/the-infernal-mmp-c-discovery.html</loc>
<lastmod>2023-06-16T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/06/16/what-is-customer-lockbox-in-azure-and-how-to-use-it.html</loc>
<lastmod>2023-06-16T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/06/17/12-quick-tips-to-secure-your-identities-in-microsoft-365.html</loc>
<lastmod>2023-06-17T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/06/19/azure-ad-application-activity-report-analysis.html</loc>
<lastmod>2023-06-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/06/19/sending-email-with-azure-automation-and-managed-identity.html</loc>
<lastmod>2023-06-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/06/20/a-guide-to-recognizing-your-post-authentication-actions.html</loc>
<lastmod>2023-06-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/06/20/identiverse-2023-recap-and-highlights.html</loc>
<lastmod>2023-06-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/06/21/company-branding-and-custom-css-in-azure-active-directory.html</loc>
<lastmod>2023-06-21T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/06/21/the-noauth-flaw-is-a-symptom-of-industry-antipatterns.html</loc>
<lastmod>2023-06-21T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/06/22/mc2mc.html</loc>
<lastmod>2023-06-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/06/23/your-isolated-device-stuck-in-defender-for-endpoint-isolation-mode-not-anymore.html</loc>
<lastmod>2023-06-23T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/06/25/secure-your-azure-management-portal.html</loc>
<lastmod>2023-06-25T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/06/28/the-0x800705b4-error-in-our-stars.html</loc>
<lastmod>2023-06-28T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/06/29/the-importance-of-updating-installed-powershell-modules-and-automate-it-too-with.html</loc>
<lastmod>2023-06-29T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/06/30/tool-mde-troubleshooter-is-born.html</loc>
<lastmod>2023-06-30T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/07/03/how-to-use-managed-identities-with-microsoft-graph-powershell.html</loc>
<lastmod>2023-07-03T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/07/04/azure-ad-why-use-cloud-only-administrativenormal-accounts-and-how-to-protect-the.html</loc>
<lastmod>2023-07-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/07/05/how-to-protect-azure-storage-accounts-blob-using-defender-for-storage.html</loc>
<lastmod>2023-07-05T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/07/05/lets-create-a-free-lab-with-microsoft-defender-for-endpoint-and-simulate-some-ra.html</loc>
<lastmod>2023-07-05T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/07/09/how-to-monitor-for-application-admin-permission-consent-in-microsoft-entra.html</loc>
<lastmod>2023-07-09T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/07/10/how-to-use-the-microsoft-graph-explorer-tool.html</loc>
<lastmod>2023-07-10T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/07/10/microsoft-improves-and-simplifies-defender-for-endpoint-management-capabilities.html</loc>
<lastmod>2023-07-10T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/07/11/manage-user-preferred-multi-factor-authentication-method-in-microsoft-entra-id.html</loc>
<lastmod>2023-07-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/07/11/the-windc-refresh-schedule-and-the-dudes.html</loc>
<lastmod>2023-07-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/07/12/how-to-setup-microsoft-entra-internet-access.html</loc>
<lastmod>2023-07-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/07/17/protect-your-privilege-with-paw.html</loc>
<lastmod>2023-07-17T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/07/18/manage-defender-for-endpoint-for-windows-macos-and-linux-via-security-settings-m.html</loc>
<lastmod>2023-07-18T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/07/18/under-the-hood-of-mde-attach-v2-security-settings-management.html</loc>
<lastmod>2023-07-18T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/07/20/unleash-the-power-of-defender-plan-2-just-in-time-vm-access-part-4.html</loc>
<lastmod>2023-07-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/07/23/protect-microsoft-graph-powershell-logins-with-conditional-access.html</loc>
<lastmod>2023-07-23T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/07/23/the-treasure-of-the-mmp-c-madre.html</loc>
<lastmod>2023-07-23T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/07/24/how-is-it-now-you-get-a-refund-for-microsoft-365-and-azure-downtime-and-see-serv.html</loc>
<lastmod>2023-07-24T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/07/25/0x80072f8f-a-bitlocker-odyssey.html</loc>
<lastmod>2023-07-25T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/07/25/block-apps-discovered-shadow-it-with-defender-for-cloud-apps-and-defender-for-en.html</loc>
<lastmod>2023-07-25T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/07/26/azure-backup-do-i-have-resources-not-protected-by-backup.html</loc>
<lastmod>2023-07-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/07/27/how-to-use-defender-for-iot-firmware-scanning-for-checking-potential-security-vu.html</loc>
<lastmod>2023-07-27T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/07/30/how-to-fix-error-550-57509-access-denied-in-exchange-online.html</loc>
<lastmod>2023-07-30T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/08/01/error-could-not-load-type-microsoftgraphauthenticationazureidentityaccesstokenpr.html</loc>
<lastmod>2023-08-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/08/01/how-to-setup-registration-campaigns-for-mfa-in-microsoft-entra.html</loc>
<lastmod>2023-08-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/08/01/pnppowershell-important-changes-to-powershell-version-requirement.html</loc>
<lastmod>2023-08-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/08/01/refreshing-the-declared-configuration-policies.html</loc>
<lastmod>2023-08-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/08/02/in-the-name-of-mmp-c.html</loc>
<lastmod>2023-08-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/08/02/microsoft-entra-workload-id-introduction-and-delegated-permissions.html</loc>
<lastmod>2023-08-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/08/03/using-managed-identities-in-logic-app-http-triggers.html</loc>
<lastmod>2023-08-03T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/08/04/microsoft-defender-for-endpoint-security-management-mde-attach-v2-on-linux-a-dee.html</loc>
<lastmod>2023-08-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/08/07/how-to-modify-dmarc-policies-in-microsoft-365-for-inbound-mail.html</loc>
<lastmod>2023-08-07T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/08/08/onboard-and-configure-defender-for-endpoint-for-non-persistent-vdi-environments.html</loc>
<lastmod>2023-08-08T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/08/09/how-to-apply-conditional-access-to-protected-actions-in-microsoft-entra.html</loc>
<lastmod>2023-08-09T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/08/10/collecting-dns-events-using-azure-monitor-agent.html</loc>
<lastmod>2023-08-10T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/08/10/turn-off-directory-synchronization-with-microsoft-graph-powershell.html</loc>
<lastmod>2023-08-10T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/08/11/entra-registered-devices-in-intune-what-you-need-to-know.html</loc>
<lastmod>2023-08-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/08/11/issue-connect-mggraph-method-not-found-systemaction1-azureidentityimsalpubliccli.html</loc>
<lastmod>2023-08-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/08/14/how-to-setup-user-risk-reports-to-email-in-microsoft-entra.html</loc>
<lastmod>2023-08-14T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/08/15/how-to-create-conditional-access-policies-with-microsoft-graph-powershell.html</loc>
<lastmod>2023-08-15T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/08/15/how-to-revoke-application-api-permissions-with-microsoft-graph-powershell.html</loc>
<lastmod>2023-08-15T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/08/15/how-to-troubleshoot-live-response-in-defender-for-endpoint.html</loc>
<lastmod>2023-08-15T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/08/17/enabling-time-based-restrictions-in-conditional-access.html</loc>
<lastmod>2023-08-17T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/08/17/windows-autopilot-profile-resiliency.html</loc>
<lastmod>2023-08-17T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/08/20/how-to-block-a-domain-or-email-address-in-exchange-online.html</loc>
<lastmod>2023-08-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/08/21/microsoft-entra-workload-id-lifecycle-management-and-operational-monitoring.html</loc>
<lastmod>2023-08-21T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/08/23/the-adventures-of-windc-queen-of-the-mmp-c.html</loc>
<lastmod>2023-08-23T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/08/24/how-to-use-strictly-enforce-location-policies-in-conditional-access.html</loc>
<lastmod>2023-08-24T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/08/24/speaking-at-the-cloud-identity-summit-2023-on-september-7th-2023.html</loc>
<lastmod>2023-08-24T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/08/26/how-to-report-all-users-and-group-membership-with-microsoft-graph-powershell.html</loc>
<lastmod>2023-08-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/08/28/defender-for-endpoint-for-linux-new-capabilities-and-enhancements.html</loc>
<lastmod>2023-08-28T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/08/29/dude-wheres-my-audit-logs.html</loc>
<lastmod>2023-08-29T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/08/29/how-to-use-automatic-attack-disruption-in-microsoft-365-defender-bec-aitm-humor.html</loc>
<lastmod>2023-08-29T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/08/30/close-encounters-of-the-microsoft-azure-attestation.html</loc>
<lastmod>2023-08-30T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/08/30/how-to-setup-multi-tenant-organisation-in-microsoft-365.html</loc>
<lastmod>2023-08-30T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/08/31/how-to-add-users-to-groups-with-microsoft-graph-powershell.html</loc>
<lastmod>2023-08-31T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/09/03/how-to-target-specific-tenants-with-conditional-access.html</loc>
<lastmod>2023-09-03T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/09/06/enforce-fido2-pin-complexity-with-microsoft-entra-conditional-access-authenticat.html</loc>
<lastmod>2023-09-06T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/09/06/how-to-enable-enterprise-voice-with-microsoft-teams-powershell.html</loc>
<lastmod>2023-09-06T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/09/07/how-to-deploy-conditional-access-templates-with-graph-powershell.html</loc>
<lastmod>2023-09-07T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/09/10/messed-up-ntfs-permissions-how-to-cleanup-and-remove-usersgroups-there-should-no.html</loc>
<lastmod>2023-09-10T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/09/14/speaking-at-the-workplace-ninja-summit-september-27-29-2023.html</loc>
<lastmod>2023-09-14T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/09/18/easily-import-export-and-document-intune-configurations.html</loc>
<lastmod>2023-09-18T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/09/19/deploying-mde-to-macos.html</loc>
<lastmod>2023-09-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/09/19/how-to-restrict-guest-user-invites-in-microsoft-entra.html</loc>
<lastmod>2023-09-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/09/20/reconstructqueueandexecute-the-last-crusade-for-declared-configuration-recovery.html</loc>
<lastmod>2023-09-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/09/22/10-great-tips-for-admins-working-with-microsoft-graph-powershell.html</loc>
<lastmod>2023-09-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/09/23/how-to-modify-security-defaults-with-microsoft-graph-powershell.html</loc>
<lastmod>2023-09-23T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/09/26/along-with-the-gods-the-two-pushlaunch-tasks.html</loc>
<lastmod>2023-09-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/09/27/how-to-block-user-access-to-bitlocker-keys-in-microsoft-entra.html</loc>
<lastmod>2023-09-27T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/09/29/allow-on-premise-password-change-to-reset-user-risk-in-microsoft-entra.html</loc>
<lastmod>2023-09-29T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/10/02/declared-configurations-and-the-mi-provider.html</loc>
<lastmod>2023-10-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/10/02/sentinel-soar-part-4-error-handling.html</loc>
<lastmod>2023-10-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/10/05/conditional-access-common-microsoft-365-security-mistakes-series.html</loc>
<lastmod>2023-10-05T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/10/05/how-to-update-user-photos-with-microsoft-graph-powershell.html</loc>
<lastmod>2023-10-05T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/10/05/lenovo-bios-dead-of-autopilot-marker.html</loc>
<lastmod>2023-10-05T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/10/07/microsoft-entra-mfa-fraud-deep-dive.html</loc>
<lastmod>2023-10-07T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/10/10/hunting-for-the-curl-vulnerability.html</loc>
<lastmod>2023-10-10T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/10/10/issue-connect-azaccount-method-not-found-systemthreadingtaskstask.html</loc>
<lastmod>2023-10-10T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/10/11/how-to-output-invoke-mggraphrequest-responses-as-a-powershell-object.html</loc>
<lastmod>2023-10-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/10/13/how-to-bulk-update-microsoft-365-groups-owners-with-powershell.html</loc>
<lastmod>2023-10-13T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/10/15/allow-unlimited-snoozes-for-microsoft-authenticator-registration.html</loc>
<lastmod>2023-10-15T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/10/16/the-positively-true-adventures-of-the-alleged-migraterefreshtask.html</loc>
<lastmod>2023-10-16T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/10/17/assign-permissions-to-a-managed-identity-with-graph-powershell.html</loc>
<lastmod>2023-10-17T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/10/18/how-to-apply-conditional-access-to-pim-activation-in-microsoft-entra.html</loc>
<lastmod>2023-10-18T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/10/20/get-ahead-of-microsofts-new-free-purview-discovery-plan.html</loc>
<lastmod>2023-10-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/10/20/take-advantage-of-new-exchange-and-sharepoint-audit-logs-for-standard-users.html</loc>
<lastmod>2023-10-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/10/21/how-to-create-a-temporary-access-pass-using-logic-apps.html</loc>
<lastmod>2023-10-21T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/10/22/microsoft-global-secure-access-empowering-secure-and-seamless-connectivity.html</loc>
<lastmod>2023-10-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/10/22/prepare-for-passkeys-in-entra-id.html</loc>
<lastmod>2023-10-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/10/23/microsoft-365-ends-support-for-office-2016-and-office-2019-clients.html</loc>
<lastmod>2023-10-23T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/10/24/there-will-beautopilot-version-2-apv2.html</loc>
<lastmod>2023-10-24T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/10/25/entra-id-comming-auto-rollout-of-basic-conditional-access-policies-to-protect-yo.html</loc>
<lastmod>2023-10-25T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/10/25/what-are-microsoft-applied-skills-microsofts-new-free-certification.html</loc>
<lastmod>2023-10-25T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/10/26/microsoft-sentinel-user-forum.html</loc>
<lastmod>2023-10-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/10/26/protect-microsoft-365-break-glass-accounts-with-azure-automation.html</loc>
<lastmod>2023-10-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/10/27/how-to-change-the-default-mfa-method-for-microsoft-365-users.html</loc>
<lastmod>2023-10-27T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/10/29/how-to-forward-messages-in-microsoft-teams-chats.html</loc>
<lastmod>2023-10-29T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/10/29/microsoft-defender-for-endpoint-new-and-more-streamlined-device-connectivity-on.html</loc>
<lastmod>2023-10-29T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/11/01/how-to-simplify-using-microsoft-graph-powershell-with-pim.html</loc>
<lastmod>2023-11-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/11/01/in-the-shadow-of-the-discoveryendpoint.html</loc>
<lastmod>2023-11-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/11/02/new-experience-for-resetting-your-microsoft-365-password-online.html</loc>
<lastmod>2023-11-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/11/02/you-can-now-finally-upgrade-to-windows-11-23h2.html</loc>
<lastmod>2023-11-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/11/06/customise-or-disable-microsoft-managed-conditional-access-policies.html</loc>
<lastmod>2023-11-06T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/11/12/how-to-force-a-password-change-in-microsoft-365-without-password-reset.html</loc>
<lastmod>2023-11-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/11/13/sslclientcertreference-without-a-cause.html</loc>
<lastmod>2023-11-13T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/11/15/a-love-story-about-role-based-access-control-for-applications-in-exchange-online.html</loc>
<lastmod>2023-11-15T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/11/16/microsoft-intune-application-deployment-best-practices.html</loc>
<lastmod>2023-11-16T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/11/18/microsoft-error-codes.html</loc>
<lastmod>2023-11-18T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/11/19/privileged-identity-management-pim-common-microsoft-365-security-mistakes-series.html</loc>
<lastmod>2023-11-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/11/20/generate-mailbox-usage-reports-with-microsoft-graph-powershell.html</loc>
<lastmod>2023-11-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/11/23/evilginx-resources-for-microsoft-365.html</loc>
<lastmod>2023-11-23T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/11/24/the-wonderful-story-of-apv2-device-preparation.html</loc>
<lastmod>2023-11-24T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/11/27/speaking-at-the-european-sharepoint-conference-espc-about-microsoft-entra-id-con.html</loc>
<lastmod>2023-11-27T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/11/29/prevent-aitm-with-microsoft-entra-global-secure-access-and-conditional-access.html</loc>
<lastmod>2023-11-29T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/11/29/use-dictation-to-compose-outlook-messages.html</loc>
<lastmod>2023-11-29T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/11/30/belgium-microsoft-cloud-security-community.html</loc>
<lastmod>2023-11-30T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/11/30/declined-meetings-show-up-in-owa-and-monarch.html</loc>
<lastmod>2023-11-30T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/12/01/december-2023-update-for-office-365-for-it-pros-ebook-is-available.html</loc>
<lastmod>2023-12-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/12/02/how-to-deploy-the-global-secure-access-client-with-intune.html</loc>
<lastmod>2023-12-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/12/02/microsoft-entra-workload-id-threat-detection-with-microsoft-defender-xdr-and-sen.html</loc>
<lastmod>2023-12-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/12/04/sharepoint-online-powers-ahead-with-embedded-service.html</loc>
<lastmod>2023-12-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/12/05/checking-exchange-online-distribution-list-activity-over-90-days.html</loc>
<lastmod>2023-12-05T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/12/05/configuring-even-better-windows-update-for-business-settings-for-your-microsoft.html</loc>
<lastmod>2023-12-05T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/12/06/how-the-auto-label-policy-for-cloudy-attachments-works.html</loc>
<lastmod>2023-12-06T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/12/06/how-to-find-os-details-from-an-iso-file.html</loc>
<lastmod>2023-12-06T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/12/06/how-to-prevent-users-from-accessing-the-microsoft-entra-portal.html</loc>
<lastmod>2023-12-06T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/12/07/exclude-breakglass-accounts-from-conditional-access-policies-with-powershell.html</loc>
<lastmod>2023-12-07T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/12/07/get-email-notifications-for-actions-performed-in-defender-xdr-defender-for-endpo.html</loc>
<lastmod>2023-12-07T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/12/07/the-day-that-the-microsoft-teams-group-chats-stood-still.html</loc>
<lastmod>2023-12-07T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/12/07/what-problem-do-passkeys-solve.html</loc>
<lastmod>2023-12-07T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/12/08/entra-id-captures-timestamp-for-last-successful-sign-in-for-user-accounts.html</loc>
<lastmod>2023-12-08T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/12/11/entra-id-improves-registered-app-security.html</loc>
<lastmod>2023-12-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/12/11/how-to-create-and-manage-access-reviews-for-group-owners.html</loc>
<lastmod>2023-12-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/12/11/microsoft-defender-for-endpoint-plug-in-for-windows-subsystem-for-linux-wsl-fina.html</loc>
<lastmod>2023-12-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/12/11/what-is-this-microsoft-sse-solution-that-everyone-is-talking-about.html</loc>
<lastmod>2023-12-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/12/12/exchange-online-retention-policies-and-the-deleted-items-folder.html</loc>
<lastmod>2023-12-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/12/12/the-0xd000000d-job-2-nutty-by-intune.html</loc>
<lastmod>2023-12-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/12/13/how-to-create-a-local-admin-account-on-windows-devices-with-intune.html</loc>
<lastmod>2023-12-13T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/12/13/microsofts-ai-strategy-for-security-depends-on-data.html</loc>
<lastmod>2023-12-13T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/12/14/using-microsoft-365-copilot-for-word.html</loc>
<lastmod>2023-12-14T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/12/15/perform-bulk-on-demand-remediation-with-microsoft-intune.html</loc>
<lastmod>2023-12-15T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/12/15/threat-actors-increase-misuse-of-oauth-applications.html</loc>
<lastmod>2023-12-15T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/12/17/microsoft-entra-workload-id-advanced-detections-and-enrichment-in-microsoft-sent.html</loc>
<lastmod>2023-12-17T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/12/18/how-to-configure-web-content-filtering-with-global-secure-acess.html</loc>
<lastmod>2023-12-18T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/12/18/the-demise-of-office-delve.html</loc>
<lastmod>2023-12-18T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/12/19/creating-a-hold-report-for-purview-ediscovery-cases.html</loc>
<lastmod>2023-12-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/12/19/exchange-online-protection-defender-for-office-365-common-microsoft-365-security.html</loc>
<lastmod>2023-12-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/12/20/how-to-enable-defender-for-endpoint-in-microsoft-intune.html</loc>
<lastmod>2023-12-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/12/20/using-the-sharepoint-online-sensitive-by-default-control.html</loc>
<lastmod>2023-12-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/12/21/blocking-the-welcome-message-for-microsoft-365-groups.html</loc>
<lastmod>2023-12-21T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/12/21/entra-id-quota-limit-learn-to-manage-your-usage-to-avoid-maxing-it-out-and-exten.html</loc>
<lastmod>2023-12-21T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/12/21/from-hybrid-fully-joined-devices-to-entra-id.html</loc>
<lastmod>2023-12-21T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/12/22/reporting-entra-id-admin-consent-requests.html</loc>
<lastmod>2023-12-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/12/28/obtain-an-access-token-for-graph-api-powershell-using-a-device-code.html</loc>
<lastmod>2023-12-28T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2023/12/31/reflecting-on-2023-a-year-of-achievements-growth-and-gratitude.html</loc>
<lastmod>2023-12-31T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/01/01/office-365-for-it-pros-january-2024-update.html</loc>
<lastmod>2024-01-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/01/02/dont-feed-large-reference-documents-to-copilot-for-word.html</loc>
<lastmod>2024-01-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/01/02/epm-and-the-flights-of-support-approved.html</loc>
<lastmod>2024-01-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/01/03/creating-viva-engage-communities-with-the-graph-api.html</loc>
<lastmod>2024-01-03T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/01/03/getting-started-with-microsoft-entra-private-access.html</loc>
<lastmod>2024-01-03T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/01/04/how-to-use-sharepoint-metadata-with-word-documents.html</loc>
<lastmod>2024-01-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/01/05/microsoft-attempts-to-retire-search-mailbox-again.html</loc>
<lastmod>2024-01-05T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/01/07/microsoft-defender-xdr-experience-improvements-for-advanced-hunting.html</loc>
<lastmod>2024-01-07T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/01/08/how-to-install-and-use-winget-during-autopilot.html</loc>
<lastmod>2024-01-08T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/01/08/how-to-report-user-consented-permissions-on-applications-in-microsoft-entra.html</loc>
<lastmod>2024-01-08T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/01/08/managing-passwords-for-entra-id-accounts-with-powershell.html</loc>
<lastmod>2024-01-08T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/01/09/how-to-share-contact-information-in-teams-chat.html</loc>
<lastmod>2024-01-09T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/01/09/microsoft-defender-xdr-activity-log-and-change-incident-severity.html</loc>
<lastmod>2024-01-09T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/01/10/how-to-protect-microsoft-teams-with-microsoft-365-defender.html</loc>
<lastmod>2024-01-10T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/01/10/recent-stream-updates-enhance-video-functionality.html</loc>
<lastmod>2024-01-10T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/01/10/speaking-at-the-mct-summit-europe-2024.html</loc>
<lastmod>2024-01-10T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/01/11/interpreting-audit-events-for-the-new-stream.html</loc>
<lastmod>2024-01-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/01/11/microsoft-entra-workload-id-incident-response-with-microsoft-sentinel-playbooks.html</loc>
<lastmod>2024-01-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/01/12/connect-to-microsoft-graph-powershell-using-certificates-with-azure-automation.html</loc>
<lastmod>2024-01-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/01/12/how-to-deploy-microsoft-365-apps-with-intune.html</loc>
<lastmod>2024-01-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/01/12/mastering-microsoft-graph-powershell-sdk-foibles.html</loc>
<lastmod>2024-01-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/01/12/race-for-experiments-epm-vs-ecs.html</loc>
<lastmod>2024-01-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/01/14/entra-id-stale-application-analysis-with-powershell.html</loc>
<lastmod>2024-01-14T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/01/14/export-microsoft-365-mailboxes-with-microsoft-graph-powershell.html</loc>
<lastmod>2024-01-14T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/01/15/how-to-stop-users-receiving-document-mismatch-notifications.html</loc>
<lastmod>2024-01-15T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/01/15/powershell-automatically-retrieve-download-links-from-microsoft-evaluation-cente.html</loc>
<lastmod>2024-01-15T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/01/15/report-all-application-owners-in-microsoft-entra-with-powershell.html</loc>
<lastmod>2024-01-15T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/01/16/how-to-report-expiring-credentials-for-entra-id-apps.html</loc>
<lastmod>2024-01-16T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/01/16/how-to-use-deception-in-microsoft-defender-for-endpoint-defender-xdr.html</loc>
<lastmod>2024-01-16T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/01/17/teams-naming-should-be-clear-and-simple.html</loc>
<lastmod>2024-01-17T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/01/18/a-winget-match-made-in-heaven.html</loc>
<lastmod>2024-01-18T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/01/18/ignore-the-hype-surrounding-the-copilot-announcement.html</loc>
<lastmod>2024-01-18T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/01/19/microsoft-encourages-more-performant-membership-rules-for-dynamic-groups.html</loc>
<lastmod>2024-01-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/01/20/microsoft-defender-for-identity-what-is-it-how-to-install-it-and-setup-requireme.html</loc>
<lastmod>2024-01-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/01/21/configure-laps-in-intune-using-microsoft-graph-powershell.html</loc>
<lastmod>2024-01-21T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/01/22/copilot-for-teams-extracts-real-value-from-meeting-transcripts.html</loc>
<lastmod>2024-01-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/01/23/teams-retires-client-ability-to-load-websites-from-channel-tabs.html</loc>
<lastmod>2024-01-23T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/01/24/how-to-use-powershell-to-retrieve-permissions-for-entra-id-apps.html</loc>
<lastmod>2024-01-24T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/01/24/speaking-at-the-cloud-guardians-unleashed-event-of-the-microsoft-cloud-and-clien.html</loc>
<lastmod>2024-01-24T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/01/25/how-to-update-tenant-corporate-branding-for-the-entra-id-sign-in-screen-with-pow.html</loc>
<lastmod>2024-01-25T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/01/25/protect-against-qr-code-phishing-with-microsoft-defender-products.html</loc>
<lastmod>2024-01-25T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/01/25/windows-laps-the-desolation-of-paa-reboots.html</loc>
<lastmod>2024-01-25T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/01/26/exchange-online-optimizes-online-address-book-lookups.html</loc>
<lastmod>2024-01-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/01/26/improve-microsoft-graph-powershell-performance-with-batching.html</loc>
<lastmod>2024-01-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/01/27/how-to-enable-automatic-account-creation-for-laps-in-intune.html</loc>
<lastmod>2024-01-27T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/01/29/microsoft-deprecates-old-exchange-audit-search-cmdlets.html</loc>
<lastmod>2024-01-29T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/01/30/global-reader-in-microsoft-entra-to-allow-access-to-teams-devices.html</loc>
<lastmod>2024-01-30T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/01/30/graph-userreadbasicall-application-permission-available.html</loc>
<lastmod>2024-01-30T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/01/31/microsoft-cloud-revenues-powered-by-office-365.html</loc>
<lastmod>2024-01-31T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/01/31/pivot-via-oauth-applications-across-tenants-and-how-to-protectdetect-with-micros.html</loc>
<lastmod>2024-01-31T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/01/31/windows-laps-under-the-hood-automatic-account-management.html</loc>
<lastmod>2024-01-31T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/02/01/aitm-detection-with-sentinel-via-custom-css.html</loc>
<lastmod>2024-02-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/02/01/device-query-a-mad-max-intune-suite-feature.html</loc>
<lastmod>2024-02-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/02/01/how-to-deploy-apps-from-the-enterprise-app-catalog-in-intune.html</loc>
<lastmod>2024-02-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/02/01/office-365-for-it-pros-february-2024-update.html</loc>
<lastmod>2024-02-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/02/02/five-push-notifications-at-device-query.html</loc>
<lastmod>2024-02-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/02/02/how-to-hide-individual-distribution-list-members.html</loc>
<lastmod>2024-02-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/02/03/a-thread-on-frosty-fiascos-delving-into-the-microsoft-midnight-blizzard-hack.html</loc>
<lastmod>2024-02-03T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/02/03/device-query-dead-of-64-bit.html</loc>
<lastmod>2024-02-03T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/02/03/microsoft-defender-vulnerability-management-common-microsoft-365-security-mistak.html</loc>
<lastmod>2024-02-03T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/02/04/anonymous-ip-address-involving-apple-icloud-private-relay.html</loc>
<lastmod>2024-02-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/02/05/new-msidentitytools-cmdlet-to-report-oauth-permissions.html</loc>
<lastmod>2024-02-05T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/02/06/defender-for-cloud-permissions-management-new-features-added-to-cloud-infrastruc.html</loc>
<lastmod>2024-02-06T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/02/06/register-new-applications-with-microsoft-graph-powershell.html</loc>
<lastmod>2024-02-06T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/02/06/reporting-app-permissions-used-by-managed-identities.html</loc>
<lastmod>2024-02-06T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/02/07/entra-id-protection-common-microsoft-365-security-mistakes-series.html</loc>
<lastmod>2024-02-07T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/02/07/list-all-available-apps-in-the-intune-enterprise-app-catalog.html</loc>
<lastmod>2024-02-07T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/02/07/use-the-graph-sdk-to-access-microsoft-365-service-health-information.html</loc>
<lastmod>2024-02-07T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/02/08/im-gonna-config-refresh-you-so-hard.html</loc>
<lastmod>2024-02-08T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/02/08/teams-users-can-hide-the-general-channel.html</loc>
<lastmod>2024-02-08T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/02/09/how-many-message-center-announcements-end-up-being-delayed.html</loc>
<lastmod>2024-02-09T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/02/12/configure-email-authentication-for-domains-you-own-in-exchange-online-spf-dkim-d.html</loc>
<lastmod>2024-02-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/02/12/viewing-changes-to-conditional-access-policies-just-became-easier.html</loc>
<lastmod>2024-02-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/02/12/why-mfa-conditional-access-and-sensitivity-labels-can-combine-to-give-outlook-a.html</loc>
<lastmod>2024-02-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/02/13/checking-out-entra-identity-secure-score.html</loc>
<lastmod>2024-02-13T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/02/13/new-teams-telephony-admin-role-in-teams-admin-center.html</loc>
<lastmod>2024-02-13T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/02/13/send-high-volume-email-in-microsoft-365.html</loc>
<lastmod>2024-02-13T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/02/14/migrate-identity-protection-risk-policies-to-conditional-access.html</loc>
<lastmod>2024-02-14T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/02/14/tracking-licensing-costs-for-microsoft-365-tenants.html</loc>
<lastmod>2024-02-14T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/02/15/copilot-for-microsoft-365-to-support-outlook-classic.html</loc>
<lastmod>2024-02-15T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/02/15/logging-into-the-future-smart-strategies-for-storing-microsoft-entra-logs-in-azu.html</loc>
<lastmod>2024-02-15T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/02/16/office-365-for-it-pros-ebook-team-welcomes-michel-de-rooij.html</loc>
<lastmod>2024-02-16T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/02/16/updated-feb-2024-ultimate-comparison-of-defender-for-endpoint-features-by-os.html</loc>
<lastmod>2024-02-16T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/02/17/entra-id-global-secure-access-client-what-it-is-about-part-1.html</loc>
<lastmod>2024-02-17T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/02/17/microsoft-maked-the-source-code-for-ms-dos-and-word-for-windows-available-to-the.html</loc>
<lastmod>2024-02-17T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/02/19/microsoft-defender-xdr-offboarding-scripts-will-now-expire-in-3-days-and-not-30.html</loc>
<lastmod>2024-02-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/02/19/problems-retrieving-sharepoint-online-usage-data-with-graph-apis.html</loc>
<lastmod>2024-02-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/02/20/automatic-attack-disruption-in-microsoft-defender-xdr-and-containing-users-durin.html</loc>
<lastmod>2024-02-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/02/20/why-you-should-not-upgrade-to-microsoft-graph-powershell-sdk-v214.html</loc>
<lastmod>2024-02-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/02/21/entra-id-global-secure-access-client-installation-of-the-agent-on-windows-part-2.html</loc>
<lastmod>2024-02-21T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/02/21/microsoft-365-end-user-notifications-for-changes-in-authentication-methods.html</loc>
<lastmod>2024-02-21T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/02/21/report-microsoft-entra-license-utilisation-with-powershell.html</loc>
<lastmod>2024-02-21T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/02/21/stopping-copilot-access-to-sharepoint-online-sites-and-document-libraries.html</loc>
<lastmod>2024-02-21T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/02/21/windows-laps-under-the-hood-part-2-defuncted.html</loc>
<lastmod>2024-02-21T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/02/22/teams-private-and-shared-channels-get-support-for-tags.html</loc>
<lastmod>2024-02-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/02/23/microsoft-kills-viva-topics-to-focus-on-copilot.html</loc>
<lastmod>2024-02-23T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/02/23/the-lord-of-compliance-the-war-of-the-check-access-button.html</loc>
<lastmod>2024-02-23T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/02/24/microsoft-defender-for-identity-updated-advanced-settings-page.html</loc>
<lastmod>2024-02-24T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/02/24/protect-the-device-code-authorisation-flow-with-conditional-access.html</loc>
<lastmod>2024-02-24T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/02/25/powershell-code-sign-and-validate-files-in-a-folder-with-optimized-logic.html</loc>
<lastmod>2024-02-25T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/02/26/microsoft-releases-entra-id-license-utilization-insights.html</loc>
<lastmod>2024-02-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/02/27/autopilot-only-fail-selected-blocking-apps-in-technician-phase.html</loc>
<lastmod>2024-02-27T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/02/27/how-to-setup-cloud-pki-in-microsoft-intune-step-by-step.html</loc>
<lastmod>2024-02-27T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/02/27/protect-your-users-from-device-code-flow-abuse.html</loc>
<lastmod>2024-02-27T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/02/27/report-onedrive-for-business-storage-based-on-usage-data.html</loc>
<lastmod>2024-02-27T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/02/27/speaking-at-the-february-2024-azure-ape-meetup.html</loc>
<lastmod>2024-02-27T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/02/28/reporting-soft-deleted-entra-id-objects.html</loc>
<lastmod>2024-02-28T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/02/29/honored-to-receive-the-microsoft-mvp-award-in-security-febuary-2024.html</loc>
<lastmod>2024-02-29T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/02/29/restoring-data-with-microsoft-365-backup-preview.html</loc>
<lastmod>2024-02-29T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/03/01/office-365-for-it-pros-march-2024-update.html</loc>
<lastmod>2024-03-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/03/01/using-wdac-to-ingest-missing-mde-events-and-detect-token-stealing.html</loc>
<lastmod>2024-03-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/03/04/microsoft-releases-view-another-mailbox-for-the-new-eac.html</loc>
<lastmod>2024-03-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/03/05/autopilot-escape-the-administrator.html</loc>
<lastmod>2024-03-05T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/03/05/entra-private-access-windows-hello-for-business-kerberos-trust-network-drive-fai.html</loc>
<lastmod>2024-03-05T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/03/05/github-get-a-local-backup-of-your-code-repositories-v-1-of-the-tool.html</loc>
<lastmod>2024-03-05T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/03/05/under-the-hood-preparing-your-device-for-mobile-device-management.html</loc>
<lastmod>2024-03-05T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/03/05/why-its-a-good-idea-to-archive-teams-channels.html</loc>
<lastmod>2024-03-05T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/03/06/entra-id-global-secure-access-client-setup-of-the-microsoft-365-profile-part-3.html</loc>
<lastmod>2024-03-06T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/03/06/secure-boot-what-it-is-and-how-to-update-secure-boot-keys.html</loc>
<lastmod>2024-03-06T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/03/06/the-question-of-information-protection-sublabels.html</loc>
<lastmod>2024-03-06T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/03/06/tutorial-how-to-enabledisable-defender-for-servers-plans-at-resources-level.html</loc>
<lastmod>2024-03-06T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/03/07/microsoft-announces-restricted-sharepoint-search.html</loc>
<lastmod>2024-03-07T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/03/08/despite-the-doubters-microsoft-365-administrators-should-continue-using-powershe.html</loc>
<lastmod>2024-03-08T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/03/08/houston-we-have-a-tpm-attestation-problem.html</loc>
<lastmod>2024-03-08T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/03/08/setup-cloud-based-radius-for-entra-joined-devices-using-cloud-pki.html</loc>
<lastmod>2024-03-08T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/03/11/outlook-classic-support-until-at-least-2029.html</loc>
<lastmod>2024-03-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/03/12/can-copilot-for-microsoft-365-save-users-14-hours-a-month.html</loc>
<lastmod>2024-03-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/03/13/customizing-quarantine-notification-messages.html</loc>
<lastmod>2024-03-13T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/03/14/finding-devices-used-for-multifactor-authentication.html</loc>
<lastmod>2024-03-14T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/03/14/microsoft-365-developer-program-attention-to-all-microsoft-365-developers-and-le.html</loc>
<lastmod>2024-03-14T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/03/15/how-to-a-find-microsoft-365-tenant-id-without-tenant-access.html</loc>
<lastmod>2024-03-15T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/03/15/introducing-github-backup-tool-1200-enhanced-security-and-customization.html</loc>
<lastmod>2024-03-15T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/03/15/microsoft-lifts-external-sharing-restriction-for-loop-app.html</loc>
<lastmod>2024-03-15T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/03/17/convert-external-users-to-internal-users-in-microsoft-entra.html</loc>
<lastmod>2024-03-17T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/03/18/infusing-sensitivity-labels-with-vibrant-colors.html</loc>
<lastmod>2024-03-18T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/03/18/p1-microsoft-defender-for-endpoint-architecture.html</loc>
<lastmod>2024-03-18T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/03/18/the-abuse-of-teams-inbound-webhook-connectors-and-channel-email-addresses.html</loc>
<lastmod>2024-03-18T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/03/19/does-microsoft-care-about-sharepoint-online-powershell.html</loc>
<lastmod>2024-03-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/03/19/how-to-simulate-risk-in-microsoft-entra-id-protection.html</loc>
<lastmod>2024-03-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/03/20/microsoft-entra-app-registration-exploitation.html</loc>
<lastmod>2024-03-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/03/20/understanding-how-much-microsoft-365-backup-charges-to-protect-data.html</loc>
<lastmod>2024-03-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/03/21/how-to-convert-an-entra-id-external-account-to-internal.html</loc>
<lastmod>2024-03-21T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/03/21/restrict-windows-registry-access-with-intune-policy.html</loc>
<lastmod>2024-03-21T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/03/22/demystifying-microsoft-entra-workload-id-licensing.html</loc>
<lastmod>2024-03-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/03/22/graph-and-powershell-hiccups-for-the-groups-and-teams-report-script.html</loc>
<lastmod>2024-03-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/03/23/azure-automating-management-group-removal-in-azure-with-powershell.html</loc>
<lastmod>2024-03-23T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/03/25/microsoft-grounds-copilot-apps-with-graph-and-web-content.html</loc>
<lastmod>2024-03-25T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/03/25/re-onboard-loganalytics-to-sentinel-if-securityinsights-solution-is-deleted-by-m.html</loc>
<lastmod>2024-03-25T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/03/26/p2-securing-with-intelligence-role-of-ai-in-defender.html</loc>
<lastmod>2024-03-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/03/26/p3-attack-surface-reduction-asr-deployment-using-mde.html</loc>
<lastmod>2024-03-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/03/26/search-unifiedauditlog-gets-high-completeness-capability.html</loc>
<lastmod>2024-03-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/03/26/the-intersection-of-graph-and-entra-id-application-permissions-and-roles.html</loc>
<lastmod>2024-03-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/03/27/do-not-try-and-bend-the-epm-thats-impossible-instead-only-try-to-use-support-app.html</loc>
<lastmod>2024-03-27T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/03/27/how-many-licensed-microsoft-365-accounts-use-the-loop-app.html</loc>
<lastmod>2024-03-27T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/03/28/all-about-microsoft-365-tenant-identifiers.html</loc>
<lastmod>2024-03-28T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/03/28/demystifying-security-copilot-features-licensing.html</loc>
<lastmod>2024-03-28T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/03/29/limit-local-administrators-on-microsoft-entra-joined-devices.html</loc>
<lastmod>2024-03-29T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/03/29/local-administrator-and-autopilot-settings-and-entra-settings-oh-my.html</loc>
<lastmod>2024-03-29T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/03/29/sharepoint-marks-its-23rd-anniversary.html</loc>
<lastmod>2024-03-29T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/03/29/trimarc-happy-hour.html</loc>
<lastmod>2024-03-29T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/03/30/introducing-github-backup-tool-1300-enhanced-customization-security-and-bug-fixe.html</loc>
<lastmod>2024-03-30T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/03/31/update-branding-with-the-organizational-branding-administrator-role.html</loc>
<lastmod>2024-03-31T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/04/01/laps-unleashed-navigating-the-future-of-windows-admin-security.html</loc>
<lastmod>2024-04-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/04/01/office-365-for-it-pros-april-2024-update.html</loc>
<lastmod>2024-04-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/04/01/when-and-how-does-a-device-sync-with-mmp-c-next-gen-intune.html</loc>
<lastmod>2024-04-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/04/02/keeping-up-with-the-emmdeviceid-and-config-refresh-bug.html</loc>
<lastmod>2024-04-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/04/02/the-new-manage-distribution-groups-owa-component-has-a-problem-with-role-assignm.html</loc>
<lastmod>2024-04-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/04/03/defender-for-office-365-hunting-and-responding-to-qr-code-based-phishing-attacks.html</loc>
<lastmod>2024-04-03T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/04/03/enable-high-volume-email-for-microsoft-365.html</loc>
<lastmod>2024-04-03T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/04/03/interpreting-audit-events-for-microsoft-365-copilot.html</loc>
<lastmod>2024-04-03T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/04/04/microsoft-defender-xdr-unified-security-operations-platform-sentinel-and-defende.html</loc>
<lastmod>2024-04-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/04/04/microsoft-increases-number-of-self-purchase-product-licenses-to-25.html</loc>
<lastmod>2024-04-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/04/05/microsoft-toughens-premium-sensitivity-label-license-requirements.html</loc>
<lastmod>2024-04-05T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/04/05/security-copilot-scalable-capacity-management-for-non-247-soc-scenario.html</loc>
<lastmod>2024-04-05T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/04/06/p4-hidden-gems-least-used-features.html</loc>
<lastmod>2024-04-06T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/04/06/p5-live-response-in-mde.html</loc>
<lastmod>2024-04-06T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/04/06/protecting-against-qr-code-phishing-in-defender-for-office-365.html</loc>
<lastmod>2024-04-06T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/04/06/security-copilot-cost-management-for-soc.html</loc>
<lastmod>2024-04-06T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/04/08/how-to-retrieve-loop-workspaces-data-with-powershell.html</loc>
<lastmod>2024-04-08T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/04/08/i-have-the-2024-03-update-microsoft-could-you-config-refresh-me.html</loc>
<lastmod>2024-04-08T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/04/08/use-certificate-based-authentication-in-entra-with-cloud-pki.html</loc>
<lastmod>2024-04-08T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/04/09/modifying-the-teams-tenant-federation-configuration-with-powershell.html</loc>
<lastmod>2024-04-09T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/04/10/i-can-only-show-you-the-programs-entity-youre-the-one-that-has-to-device-query-i.html</loc>
<lastmod>2024-04-10T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/04/10/upgrade-classic-azure-administrator-roles-by-august-2024.html</loc>
<lastmod>2024-04-10T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/04/11/automated-microsoft-365-security-posture-monitoring-with-maester.html</loc>
<lastmod>2024-04-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/04/11/how-to-enable-passkeys-for-the-microsoft-authenticator-app.html</loc>
<lastmod>2024-04-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/04/11/security-and-privacy-concerns-continue-swirling-around-the-new-outlook-for-windo.html</loc>
<lastmod>2024-04-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/04/12/teams-adds-support-for-customizable-group-chat-pictures.html</loc>
<lastmod>2024-04-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/04/13/get-started-with-passkeys-in-microsoft-365.html</loc>
<lastmod>2024-04-13T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/04/13/introducing-azure-devops-backup-tool-1058-enhanced-security-optimization-and-bug.html</loc>
<lastmod>2024-04-13T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/04/13/passkey-public-preview-for-entra-id.html</loc>
<lastmod>2024-04-13T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/04/14/get-control-over-corporate-networks-with-device-discovery.html</loc>
<lastmod>2024-04-14T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/04/15/list-all-passkeys-and-aaguids-in-microsoft-entra-with-powershell.html</loc>
<lastmod>2024-04-15T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/04/15/maester-microsoft-security-test-automation-framework.html</loc>
<lastmod>2024-04-15T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/04/15/prepare-for-exchange-online-basic-auth-permanent-retirement.html</loc>
<lastmod>2024-04-15T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/04/16/authenticate-to-azure-devops-using-managed-identity-and-rest-api.html</loc>
<lastmod>2024-04-16T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/04/16/download-azure-devops-repositories-using-a-managed-identity-and-rest-api.html</loc>
<lastmod>2024-04-16T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/04/16/exchange-online-moves-to-tighten-platform-security.html</loc>
<lastmod>2024-04-16T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/04/17/how-to-create-a-password-expiration-report.html</loc>
<lastmod>2024-04-17T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/04/18/microsoft-graph-activity-logs-hit-general-availability.html</loc>
<lastmod>2024-04-18T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/04/19/removing-licenses-from-entra-id-accounts-when-a-replacement-license-exists.html</loc>
<lastmod>2024-04-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/04/20/microsoft-purview-series-part-1.html</loc>
<lastmod>2024-04-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/04/22/disappointing-session-schedule-for-m365-conference.html</loc>
<lastmod>2024-04-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/04/22/microsoft-fix-intune-personal-device-enrollment-restriction-bypass.html</loc>
<lastmod>2024-04-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/04/23/conditional-access-policies-an-in-depth-guide.html</loc>
<lastmod>2024-04-23T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/04/23/how-to-auto-update-apps-assigned-as-available-in-microsoft-intune.html</loc>
<lastmod>2024-04-23T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/04/23/how-to-remove-a-single-service-plan-from-user-accounts-with-powershell.html</loc>
<lastmod>2024-04-23T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/04/23/may-the-intune-suite-be-with-you.html</loc>
<lastmod>2024-04-23T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/04/24/mfa-issues-for-invited-guest-cause-cross-tenant-access-due-to-partner-relationsh.html</loc>
<lastmod>2024-04-24T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/04/24/sending-urgent-teams-chats-with-powershell.html</loc>
<lastmod>2024-04-24T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/04/25/defender-for-endpoint-status-report-with-microsoft-graph-powershell.html</loc>
<lastmod>2024-04-25T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/04/25/teams-meet-now-feature-gets-a-makeover-for-group-chats.html</loc>
<lastmod>2024-04-25T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/04/26/create-client-secrets-during-app-registration-in-microsoft-entra.html</loc>
<lastmod>2024-04-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/04/26/microsoft-cloud-exceeds-50-of-microsoft-total-revenues.html</loc>
<lastmod>2024-04-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/04/27/analyzing-mde-network-inspections.html</loc>
<lastmod>2024-04-27T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/04/28/microsoft-defender-for-endpoint-security-settings-management-internals-0x1.html</loc>
<lastmod>2024-04-28T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/04/29/find-all-license-enabled-groups-in-microsoft-entra-with-powershell.html</loc>
<lastmod>2024-04-29T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/04/29/teams-classic-client-slipping-away.html</loc>
<lastmod>2024-04-29T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/04/30/disabling-bits-of-copilot-for-microsoft-365.html</loc>
<lastmod>2024-04-30T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/05/01/office-365-for-it-pros-may-2024-update-available.html</loc>
<lastmod>2024-05-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/05/01/report-assigned-autopilot-profiles-with-microsoft-graph-powershell.html</loc>
<lastmod>2024-05-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/05/02/defender-for-cloud-reset-to-free-tier-via-powershell.html</loc>
<lastmod>2024-05-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/05/02/removing-outlook-add-ins-from-mailboxes-with-powershell.html</loc>
<lastmod>2024-05-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/05/03/kb5036980-breaks-the-windows-11-enterprise-subscription-activation.html</loc>
<lastmod>2024-05-03T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/05/03/microsoft-retires-stream-mobile-app.html</loc>
<lastmod>2024-05-03T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/05/03/setup-external-authentication-methods-in-microsoft-entra-id.html</loc>
<lastmod>2024-05-03T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/05/06/more-microsoft-graph-powershell-sdk-problems.html</loc>
<lastmod>2024-05-06T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/05/07/teams-adds-background-effects-for-mobile-video-messages.html</loc>
<lastmod>2024-05-07T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/05/08/microsoft-launches-support-for-entra-id-external-authentication-methods.html</loc>
<lastmod>2024-05-08T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/05/08/remember-remember-the-hybrid-device-the-mdm-only-enrollment-treason-and-the-epm.html</loc>
<lastmod>2024-05-08T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/05/09/update-entra-id-user-role-permissions-to-secure-your-tenant.html</loc>
<lastmod>2024-05-09T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/05/10/entra-id-exploring-the-new-feature-whats-new.html</loc>
<lastmod>2024-05-10T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/05/10/team-and-channel-creation-simplified-in-new-design.html</loc>
<lastmod>2024-05-10T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/05/13/block-device-code-authentication-requests-with-conditional-access.html</loc>
<lastmod>2024-05-13T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/05/13/thoughts-on-copilot-for-securitys-early-days.html</loc>
<lastmod>2024-05-13T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/05/14/configure-external-authentication-methods-in-entra-id-with-duo-security.html</loc>
<lastmod>2024-05-14T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/05/14/the-extremely-useful-meeting-follow-response.html</loc>
<lastmod>2024-05-14T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/05/15/sharepoint-online-deletion-of-non-empty-folders.html</loc>
<lastmod>2024-05-15T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/05/16/teams-adds-slash-commands-to-the-message-compose-box.html</loc>
<lastmod>2024-05-16T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/05/17/microsoft-causes-fuss-around-azure-mfa-announcement.html</loc>
<lastmod>2024-05-17T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/05/20/european-union-lines-up-anti-trust-charges-against-microsoft-over-teams.html</loc>
<lastmod>2024-05-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/05/21/big-change-coming-in-authentication-for-outlook-add-ins.html</loc>
<lastmod>2024-05-21T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/05/22/autopilot-device-preparation-first-contact.html</loc>
<lastmod>2024-05-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/05/22/new-granular-security-policy-permissions-in-microsoft-intune.html</loc>
<lastmod>2024-05-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/05/22/nobody-makes-me-config-refresh-my-own-provider-nobody.html</loc>
<lastmod>2024-05-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/05/22/organizers-of-teams-recurring-meetings-can-create-loop-workspaces-for-shared-con.html</loc>
<lastmod>2024-05-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/05/23/microsoft-finally-delivers-promised-audit-events-to-purview-audit-standard-tenan.html</loc>
<lastmod>2024-05-23T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/05/24/stream-development-presses-ahead-after-migration-finishes.html</loc>
<lastmod>2024-05-24T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/05/25/introducing-a-new-tool-lookup-ip-to-dns-tool-v-1003.html</loc>
<lastmod>2024-05-25T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/05/26/guided-application-upgrades-announced-for-microsoft-intune.html</loc>
<lastmod>2024-05-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/05/27/entra-id-dynamic-groups-direct-reports-of-a-manager.html</loc>
<lastmod>2024-05-27T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/05/27/teams-changes-location-for-meeting-transcripts.html</loc>
<lastmod>2024-05-27T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/05/28/reporting-mailbox-audit-configurations.html</loc>
<lastmod>2024-05-28T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/05/29/how-to-manage-microsoft-entra-sign-in-logs-with-powershell.html</loc>
<lastmod>2024-05-29T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/05/29/teams-adjusts-the-activity-feed.html</loc>
<lastmod>2024-05-29T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/05/30/teams-meeting-audit-events-available-to-purview-audit-standard-customers.html</loc>
<lastmod>2024-05-30T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/05/31/better-copilot-audit-records-and-copilot-chat-appears-in-classic-outlook.html</loc>
<lastmod>2024-05-31T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/06/01/autopilot-device-preparation-the-hardware-hash-voyage-home.html</loc>
<lastmod>2024-06-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/06/01/entra-private-accessgsa-automatic-network-detection.html</loc>
<lastmod>2024-06-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/06/01/office-365-for-it-pros-june-2024-update.html</loc>
<lastmod>2024-06-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/06/03/notify-when-available-comes-to-teams-21.html</loc>
<lastmod>2024-06-03T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/06/04/experts-live-netherlands.html</loc>
<lastmod>2024-06-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/06/04/teams-custom-emojis-arrive-in-june-2024.html</loc>
<lastmod>2024-06-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/06/05/autopilot-and-the-sundance-device-preparation.html</loc>
<lastmod>2024-06-05T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/06/05/choosing-between-graph-api-requests-or-graph-sdk-cmdlets.html</loc>
<lastmod>2024-06-05T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/06/05/entra-id-global-secure-access-client-assign-users-and-groups-to-forwarding-profi.html</loc>
<lastmod>2024-06-05T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/06/05/how-to-deploy-autopilot-device-preparation-policies-with-powershell.html</loc>
<lastmod>2024-06-05T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/06/05/understanding-primary-refresh-tokens-in-the-entra-id-sign-in-logs.html</loc>
<lastmod>2024-06-05T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/06/06/report-delegated-permission-assignments-for-users-and-apps.html</loc>
<lastmod>2024-06-06T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/06/07/interpreting-audit-records-for-teams-meeting-recordings-again.html</loc>
<lastmod>2024-06-07T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/06/10/understanding-sharepoint-online-storage.html</loc>
<lastmod>2024-06-10T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/06/11/azure-monitor-alerting-with-azure-resource-graph-data-using-azure-loganalytics-i.html</loc>
<lastmod>2024-06-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/06/11/platform-level-device-cleanup-rules-added-to-microsoft-intune.html</loc>
<lastmod>2024-06-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/06/11/the-battle-of-the-local-administrator-and-autopilot-device-preparation.html</loc>
<lastmod>2024-06-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/06/11/the-end-for-office-365-connectors-comes-into-sight.html</loc>
<lastmod>2024-06-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/06/12/report-per-user-mfa-status-in-entra-using-microsoft-graph-powershell.html</loc>
<lastmod>2024-06-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/06/12/to-splat-or-not-to-splat-thats-the-question.html</loc>
<lastmod>2024-06-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/06/13/blocking-download-access-to-teams-channel-meeting-recordings.html</loc>
<lastmod>2024-06-13T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/06/13/debugging-the-autopilot-device-preparation-profile.html</loc>
<lastmod>2024-06-13T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/06/14/how-to-disable-per-user-mfa-using-microsoft-graph-powershell.html</loc>
<lastmod>2024-06-14T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/06/14/per-user-mfa-state-added-to-tenant-passwords-and-mfa-report.html</loc>
<lastmod>2024-06-14T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/06/17/using-powershell-to-post-channel-messages-with-teams-workflows.html</loc>
<lastmod>2024-06-17T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/06/18/working-with-calendar-permissions-using-the-microsoft-graph-powershell-sdk.html</loc>
<lastmod>2024-06-18T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/06/19/data-protection-made-a-breeze-mda-integration-in-edge-for-business.html</loc>
<lastmod>2024-06-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/06/19/microsoft-intune-to-require-ios-16-and-macos-13.html</loc>
<lastmod>2024-06-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/06/19/microsoft-urges-consumer-and-enterprise-users-to-move-to-newer-outlook-versions.html</loc>
<lastmod>2024-06-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/06/20/autopilot-device-preparation-and-the-enrollment-time-grouping.html</loc>
<lastmod>2024-06-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/06/20/how-to-onboard-and-getting-started-with-copilot-for-security.html</loc>
<lastmod>2024-06-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/06/20/test-yourself-the-prelude.html</loc>
<lastmod>2024-06-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/06/20/version-19-of-the-microsoft-365-licensing-report.html</loc>
<lastmod>2024-06-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/06/21/planner-user-policy-stops-task-and-plan-deletions.html</loc>
<lastmod>2024-06-21T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/06/22/authorization-code-flow.html</loc>
<lastmod>2024-06-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/06/24/how-to-find-specific-permissions-assigned-to-applications-in-entra.html</loc>
<lastmod>2024-06-24T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/06/24/outlook-win32-becomes-outlook-classic.html</loc>
<lastmod>2024-06-24T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/06/25/adding-details-of-authentication-methods-to-the-tenant-passwords-and-mfa-report.html</loc>
<lastmod>2024-06-25T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/06/25/microsoft-graph-command-line-tools-to-become-verified-in-entra.html</loc>
<lastmod>2024-06-25T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/06/26/i-was-msi-and-ps1-nothing-but-endpoint-privilege-management-and-a-couple-of-file.html</loc>
<lastmod>2024-06-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/06/26/t1556009-detect-and-prevent-suspicious-conditional-access-policy-modifications.html</loc>
<lastmod>2024-06-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/06/26/the-curiously-unfinished-outlook-settings-api.html</loc>
<lastmod>2024-06-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/06/27/how-to-assess-the-impact-of-mfa-enforcement-in-azure.html</loc>
<lastmod>2024-06-27T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/06/27/teams-to-block-federated-communications-with-trial-tenants.html</loc>
<lastmod>2024-06-27T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/06/28/teams-chat-gets-the-shared-tab.html</loc>
<lastmod>2024-06-28T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/06/29/veeam-backup-m365-exchange-online-backup-fails-with-error-failed-to-get-folder-p.html</loc>
<lastmod>2024-06-29T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/07/01/office-365-for-it-pros-2025-edition-is-now-available.html</loc>
<lastmod>2024-07-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/07/02/introducing-the-microsoft-entra-suite-license.html</loc>
<lastmod>2024-07-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/07/02/prevent-conditional-access-bypass-with-restricted-management-administrative-unit.html</loc>
<lastmod>2024-07-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/07/02/using-company-wide-sharing-links-with-copilot-for-microsoft-365.html</loc>
<lastmod>2024-07-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/07/03/epm-error-0x8007010b-the-debugging-game.html</loc>
<lastmod>2024-07-03T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/07/03/teams-to-begin-automatically-hiding-inactive-channels.html</loc>
<lastmod>2024-07-03T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/07/03/temporary-exclusions-for-conditional-access-using-pim-for-groups.html</loc>
<lastmod>2024-07-03T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/07/04/all-sharepoint-online-sharing-links-now-support-expiration-dates.html</loc>
<lastmod>2024-07-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/07/05/new-policy-to-disable-some-in-product-messages-in-teams.html</loc>
<lastmod>2024-07-05T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/07/07/reflecting-on-a-remarkable-first-half-of-the-year-2024.html</loc>
<lastmod>2024-07-07T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/07/08/5-years-on-the-microsoft-sentinel-experience.html</loc>
<lastmod>2024-07-08T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/07/08/find-lateral-movement-paths-using-kql-graph-semantics.html</loc>
<lastmod>2024-07-08T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/07/08/how-to-filter-users-with-extension-attributes-using-microsoft-graph.html</loc>
<lastmod>2024-07-08T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/07/08/outlook-mobile-introduces-synchronization-window.html</loc>
<lastmod>2024-07-08T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/07/09/configuring-outlook-dlp-policy-pop-ups-for-sensitive-content.html</loc>
<lastmod>2024-07-09T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/07/09/die-hard-with-a-utc-fixing-autopilot-device-preparation.html</loc>
<lastmod>2024-07-09T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/07/10/introducing-azure-devops-backup-tool-1059-enhanced-security-optimization-and-bug.html</loc>
<lastmod>2024-07-10T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/07/10/office-connectors-retirement-for-teams.html</loc>
<lastmod>2024-07-10T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/07/11/the-right-way-to-replace-the-remove-spoexternaluser-cmdlet.html</loc>
<lastmod>2024-07-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/07/12/conditional-access-staged-rollout-settings.html</loc>
<lastmod>2024-07-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/07/12/outlook-mobile-continues-to-set-the-standard-for-microsoft-365-email-mobility.html</loc>
<lastmod>2024-07-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/07/14/entra-id-global-secure-access-now-generally-available.html</loc>
<lastmod>2024-07-14T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/07/15/azure-arc-windows-admin-center-cant-connect-with-error-couldnt-get-server-data-a.html</loc>
<lastmod>2024-07-15T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/07/15/upgrading-the-teams-and-groups-activity-report-to-60.html</loc>
<lastmod>2024-07-15T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/07/16/microsoft-itot-convergence-in-defender-xdr-new-and-sentinel.html</loc>
<lastmod>2024-07-16T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/07/16/monitoring-updates-to-sensitivity-label-policies-and-labels.html</loc>
<lastmod>2024-07-16T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/07/16/windows-enrollment-attestation-76-mdm-hardening.html</loc>
<lastmod>2024-07-16T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/07/17/how-to-delete-cloud-pki-cas-in-microsoft-intune.html</loc>
<lastmod>2024-07-17T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/07/17/mdm-x-tpm-the-mdm-hardening.html</loc>
<lastmod>2024-07-17T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/07/17/team-owners-can-rename-the-general-channel.html</loc>
<lastmod>2024-07-17T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/07/18/all-the-intune-mdm-certificate-recovery-we-cannot-see.html</loc>
<lastmod>2024-07-18T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/07/18/exchange-online-previews-inbound-smtp-dane-with-dnssec.html</loc>
<lastmod>2024-07-18T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/07/18/signtoolgui-a-new-tool-is-here-for-your-digital-signing-experience-now-public.html</loc>
<lastmod>2024-07-18T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/07/19/crowdstrike-issue-workarounds.html</loc>
<lastmod>2024-07-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/07/19/self-service-purchase-notifications-for-tenant-administrators.html</loc>
<lastmod>2024-07-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/07/20/microsoft-to-start-blocking-custom-oma-uri-settings-in-intune.html</loc>
<lastmod>2024-07-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/07/21/entra-suite-license-explained.html</loc>
<lastmod>2024-07-21T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/07/21/how-to-rotate-bitlocker-keys-with-microsoft-graph-powershell.html</loc>
<lastmod>2024-07-21T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/07/22/comparing-shared-and-inactive-mailboxes-for-retaining-ex-employee-content.html</loc>
<lastmod>2024-07-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/07/22/microsoft-purview-series-part-2.html</loc>
<lastmod>2024-07-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/07/23/adding-cost-center-reporting-to-the-microsoft-365-licensing-report.html</loc>
<lastmod>2024-07-23T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/07/24/initiaterecovery-the-power-of-hardening-the-intune-enrollment.html</loc>
<lastmod>2024-07-24T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/07/24/phishing-resistant-mfa-basics.html</loc>
<lastmod>2024-07-24T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/07/24/stream-moves-to-intelligent-versioning.html</loc>
<lastmod>2024-07-24T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/07/25/the-onedrive-for-business-problem-created-when-deleting-user-accounts.html</loc>
<lastmod>2024-07-25T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/07/26/analyzing-mde-network-inspections.html</loc>
<lastmod>2024-07-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/07/26/how-to-find-settings-in-the-setting-catalog-by-custom-oma-uri.html</loc>
<lastmod>2024-07-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/07/26/saving-upgrade-ryan-how-kb5040527-fixed-the-subscription-activation-issue.html</loc>
<lastmod>2024-07-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/07/26/the-maddening-side-of-the-microsoft-graph-powershell-sdk.html</loc>
<lastmod>2024-07-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/07/28/find-all-permissions-assigned-to-all-applications-in-microsoft-entra.html</loc>
<lastmod>2024-07-28T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/07/29/finding-managers-of-users-with-the-microsoft-graph-powershell-sdk.html</loc>
<lastmod>2024-07-29T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/07/30/microsoft-to-charge-for-unlicensed-onedrive-for-business-accounts.html</loc>
<lastmod>2024-07-30T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/07/30/overview-to-global-secure-access.html</loc>
<lastmod>2024-07-30T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/07/31/istpmattested-the-ultimate-attestation-security-gate.html</loc>
<lastmod>2024-07-31T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/07/31/return-a-permanently-deleted-users-sign-in-info-with-get-mguser.html</loc>
<lastmod>2024-07-31T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/07/31/teams-app-centric-management-acm.html</loc>
<lastmod>2024-07-31T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/08/01/how-to-secure-oauth-apps-with-app-governance-in-defender-xdr.html</loc>
<lastmod>2024-08-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/08/01/identify-and-prevent-abuse-of-managed-identities-with-federated-credentials-from.html</loc>
<lastmod>2024-08-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/08/01/office-365-for-it-pros-august-2024-update.html</loc>
<lastmod>2024-08-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/08/02/identify-minimum-graph-permissions-for-scripts-with-the-dev-proxy.html</loc>
<lastmod>2024-08-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/08/02/microsoft-cloud-revenues-keep-on-growing.html</loc>
<lastmod>2024-08-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/08/05/how-to-check-for-a-healthy-defender-for-endpoint-environment.html</loc>
<lastmod>2024-08-05T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/08/05/mdm-vs-mam-personal-vs-corporate.html</loc>
<lastmod>2024-08-05T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/08/05/microsoft-quashes-bad-habit-of-sending-passwords-in-email.html</loc>
<lastmod>2024-08-05T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/08/06/global-secure-access-in-conditional-access.html</loc>
<lastmod>2024-08-06T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/08/06/keep-your-interactive-logons-close-but-your-epm-virtual-account-closer.html</loc>
<lastmod>2024-08-06T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/08/06/teams-tightens-access-controls-for-meeting-recordings-and-transcripts.html</loc>
<lastmod>2024-08-06T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/08/07/dealing-with-teams-chat-messages-when-people-leave.html</loc>
<lastmod>2024-08-07T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/08/08/how-to-list-details-of-teams-apps.html</loc>
<lastmod>2024-08-08T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/08/08/microsoft-to-reduce-permissions-on-directory-synchronization-accounts.html</loc>
<lastmod>2024-08-08T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/08/09/microsoft-365-admin-center-to-take-over-license-assignments.html</loc>
<lastmod>2024-08-09T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/08/10/demystifying-new-azure-monitor-auxiliary-logs-plan.html</loc>
<lastmod>2024-08-10T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/08/10/introducing-azure-devops-backup-tool-1100-major-update-with-new-features-bug-fix.html</loc>
<lastmod>2024-08-10T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/08/12/a-deep-dive-into-microsofts-sse-solution-part-1.html</loc>
<lastmod>2024-08-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/08/12/handling-online-teams-meetings-organized-by-ex-employees.html</loc>
<lastmod>2024-08-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/08/13/comparing-microsoft-cloud-email-services.html</loc>
<lastmod>2024-08-13T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/08/14/handling-the-too-many-retries-error-and-dealing-with-odd-numbers-of-audit-events.html</loc>
<lastmod>2024-08-14T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/08/14/how-to-check-your-tenants-entra-license-plan-with-powershell.html</loc>
<lastmod>2024-08-14T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/08/15/adding-graph-api-permissions-to-managed-identities.html</loc>
<lastmod>2024-08-15T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/08/15/microsoft-defender-for-identity-how-to-manually-remove-a-malfunctioning-sensor-t.html</loc>
<lastmod>2024-08-15T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/08/15/switching-microsoft-365-data-report-privacy-on-and-off.html</loc>
<lastmod>2024-08-15T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/08/16/microsoft-copilot-to-get-enterprise-data-protection.html</loc>
<lastmod>2024-08-16T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/08/16/windows-server-aug2024-patch-issues-kb5041578.html</loc>
<lastmod>2024-08-16T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/08/18/all-you-need-to-know-about-the-mandatory-multifactor-authentication-for-azure-an.html</loc>
<lastmod>2024-08-18T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/08/18/security-monitoring-antipatterns.html</loc>
<lastmod>2024-08-18T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/08/19/mandatory-mfa-requirement-for-access-to-azure-sites-and-tools.html</loc>
<lastmod>2024-08-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/08/20/reporting-entra-id-administrative-role-assignments.html</loc>
<lastmod>2024-08-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/08/21/the-benefits-of-rationalizing-license-management-in-the-microsoft-365-admin-cent.html</loc>
<lastmod>2024-08-21T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/08/22/best-practice-for-emergency-access-accounts-in-microsoft-entra.html</loc>
<lastmod>2024-08-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/08/22/evolving-subscription-activation-from-workarounds-to-a-robust-solution.html</loc>
<lastmod>2024-08-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/08/22/report-detailing-unlicensed-onedrive-for-business-accounts-available.html</loc>
<lastmod>2024-08-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/08/23/teams-external-domain-activity-report-gets-a-refresh.html</loc>
<lastmod>2024-08-23T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/08/23/you-always-trust-your-csp-cross-tenant-mfa-and-gdap.html</loc>
<lastmod>2024-08-23T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/08/24/security-monitoring-threat-modeling-and-data-sources.html</loc>
<lastmod>2024-08-24T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/08/26/finding-non-compliant-shared-mailboxes.html</loc>
<lastmod>2024-08-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/08/26/microsoft-purview-series-part-3.html</loc>
<lastmod>2024-08-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/08/27/foouser-meets-the-cosmic-autopilot-user.html</loc>
<lastmod>2024-08-27T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/08/27/the-problem-with-scoped-audit-log-searches.html</loc>
<lastmod>2024-08-27T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/08/28/microsoft-defender-for-identity-expands-support-to-servers-with-microsoft-entra.html</loc>
<lastmod>2024-08-28T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/08/28/why-entra-id-can-restore-some-types-of-deleted-groups-and-not-others.html</loc>
<lastmod>2024-08-28T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/08/29/pnp-powershell-changes-its-entra-id-app.html</loc>
<lastmod>2024-08-29T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/08/29/the-lakehouse-of-epm-easily-create-epm-elevation-rules-based-on-the-elevation-re.html</loc>
<lastmod>2024-08-29T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/08/30/microsoft-withdraws-copilot-catch-up-feature.html</loc>
<lastmod>2024-08-30T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/08/30/mrs-resource-performance-youre-trying-to-seduce-me-with-your-cpu-spike-arent-you.html</loc>
<lastmod>2024-08-30T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/08/31/detect-impact-mfa-enforcement.html</loc>
<lastmod>2024-08-31T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/09/02/mastering-the-mfa-mandate-considerations-and-recommendations-for-a-smooth-transi.html</loc>
<lastmod>2024-09-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/09/02/office-365-for-it-pros-september-2024-update.html</loc>
<lastmod>2024-09-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/09/02/speaking-at-the-cloud-identity-summit-2024-on-thursday-september-5th.html</loc>
<lastmod>2024-09-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/09/03/transferring-reusable-powershell-objects-between-microsoft-365-tenants.html</loc>
<lastmod>2024-09-03T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/09/04/cloud-pcs-where-were-going-we-dont-need-device-query-and-support-approved.html</loc>
<lastmod>2024-09-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/09/04/teams-improves-text-pasting-and-mic-pending.html</loc>
<lastmod>2024-09-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/09/05/copilots-automatic-summary-for-word-documents.html</loc>
<lastmod>2024-09-05T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/09/06/using-guest-accounts-to-bypass-the-teams-meeting-lobby.html</loc>
<lastmod>2024-09-06T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/09/07/deep-dive-dns-in-entra-private-access.html</loc>
<lastmod>2024-09-07T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/09/07/no-internet-access-on-azure-vm-in-new-vnet-subnet.html</loc>
<lastmod>2024-09-07T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/09/09/exploring-the-microsoft-sentinel-codeless-connector-platform-ccp.html</loc>
<lastmod>2024-09-09T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/09/09/purview-ediscoverys-big-makeover.html</loc>
<lastmod>2024-09-09T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/09/10/microsoft-365-admin-center-to-support-continuous-access-evaluation.html</loc>
<lastmod>2024-09-10T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/09/10/use-cases-for-sentinel-summary-rules.html</loc>
<lastmod>2024-09-10T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/09/11/automatic-hiding-of-teams-channels-continues.html</loc>
<lastmod>2024-09-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/09/11/configure-file-integrity-monitoring-fim-using-defender-for-endpoint.html</loc>
<lastmod>2024-09-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/09/12/microsoft-365-licensing-report-script-v194.html</loc>
<lastmod>2024-09-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/09/13/copilot-usage-report-apis-available.html</loc>
<lastmod>2024-09-13T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/09/13/speaking-at-the-workplace-ninja-summit-2024.html</loc>
<lastmod>2024-09-13T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/09/13/the-subscription-activation-journey-stuck-on-pro.html</loc>
<lastmod>2024-09-13T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/09/14/deep-dive-sso-in-entra-private-access.html</loc>
<lastmod>2024-09-14T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/09/14/optimize-costs-using-auxiliary-logs-for-verbose-logging.html</loc>
<lastmod>2024-09-14T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/09/14/troubleshooting-monitoring-of-log-ingestion-with-data-collection-rules.html</loc>
<lastmod>2024-09-14T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/09/16/the-new-entra-id-photo-update-settings-policy-for-user-profile-photos.html</loc>
<lastmod>2024-09-16T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/09/17/how-to-report-the-information-stored-in-recoverable-items.html</loc>
<lastmod>2024-09-17T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/09/17/register-yubikeys-on-behalf-of-your-users-with-microsoft-entra-id-fido2-provisio.html</loc>
<lastmod>2024-09-17T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/09/18/understanding-consistencylevel-eventual-with-microsoft-graph-powershell.html</loc>
<lastmod>2024-09-18T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/09/18/using-the-get-recoverableitems-cmdlet-to-report-recoverable-items.html</loc>
<lastmod>2024-09-18T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/09/19/ai-revolution-in-cybersecurity-will-it-replace-or-redefine-them.html</loc>
<lastmod>2024-09-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/09/19/get-mailbox-versus-get-exomailbox.html</loc>
<lastmod>2024-09-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/09/19/windows-service-monitoring-at-scale-using-cloud-native-azure-components.html</loc>
<lastmod>2024-09-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/09/20/how-outlook-suppresses-duplicate-contacts-or-not.html</loc>
<lastmod>2024-09-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/09/22/introducing-azure-devops-backup-tool-1110-update-with-new-features-and-bug-fixes.html</loc>
<lastmod>2024-09-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/09/23/how-to-add-contacts-to-user-mailboxes-from-a-csv-file.html</loc>
<lastmod>2024-09-23T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/09/24/import-and-export-automation-rules-for-microsoft-sentinel-unified-soc-platform.html</loc>
<lastmod>2024-09-24T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/09/24/installing-the-entire-microsoft-graph-powershell-sdk-seems-like-the-right-idea.html</loc>
<lastmod>2024-09-24T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/09/24/securechannelfailure-errors-and-the-curious-case-of-the-failing-ime.html</loc>
<lastmod>2024-09-24T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/09/25/dlp-policy-tips-get-new-premium-conditions.html</loc>
<lastmod>2024-09-25T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/09/26/azug-noest.html</loc>
<lastmod>2024-09-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/09/26/no-practical-way-to-disable-onedrive-for-business.html</loc>
<lastmod>2024-09-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/09/26/troubleshooting-intune-enrollment-solving-the-0x80180031-mdm-not-configured-erro.html</loc>
<lastmod>2024-09-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/09/27/tec-2024-rolls-into-dallas.html</loc>
<lastmod>2024-09-27T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/09/27/understanding-microsoft-entra-licensing-with-multiple-tenants.html</loc>
<lastmod>2024-09-27T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/09/29/microsoft-graph-powershell-book.html</loc>
<lastmod>2024-09-29T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/09/30/accessing-online-archives-with-outlook-mobile.html</loc>
<lastmod>2024-09-30T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/09/30/report-enterprise-app-catalog-updates-in-intune-with-powershell.html</loc>
<lastmod>2024-09-30T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/10/01/cyber-back-to-school.html</loc>
<lastmod>2024-10-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/10/01/office-365-for-it-pros-october-2024-update.html</loc>
<lastmod>2024-10-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/10/01/windows-11-24h2-released-with-windows-laps-improvements.html</loc>
<lastmod>2024-10-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/10/02/making-sure-that-outlook-puts-deleted-items-in-the-right-place.html</loc>
<lastmod>2024-10-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/10/03/bicep-dynamic-naming-technique.html</loc>
<lastmod>2024-10-03T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/10/03/how-to-deploy-enterprise-app-catalog-updates-with-powershell.html</loc>
<lastmod>2024-10-03T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/10/03/sharepoint-oversharing-governance-and-lifecycle.html</loc>
<lastmod>2024-10-03T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/10/04/microsoft-retires-the-revoke-spousersession-cmdlet.html</loc>
<lastmod>2024-10-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/10/07/adding-a-custom-test-to-the-maester-tool.html</loc>
<lastmod>2024-10-07T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/10/07/administrator-protection-in-windows-11-explained-how-microsoft-rebuilt-local-adm.html</loc>
<lastmod>2024-10-07T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/10/07/microsoft-defender-for-identity-new-posture-recommendations-focusing-on-active-d.html</loc>
<lastmod>2024-10-07T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/10/08/delve-retirement-and-user-profiles.html</loc>
<lastmod>2024-10-08T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/10/08/how-to-automatically-migrate-to-authentication-methods-policies.html</loc>
<lastmod>2024-10-08T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/10/09/free-teams-licenses-now-blocked-for-federated-communications.html</loc>
<lastmod>2024-10-09T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/10/09/unleash-the-power-of-devicetvminfogathering.html</loc>
<lastmod>2024-10-09T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/10/10/the-new-outlook-for-windows-can-start-without-an-internet-connection.html</loc>
<lastmod>2024-10-10T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/10/11/how-i-write-powershell-scripts-for-microsoft-365.html</loc>
<lastmod>2024-10-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/10/14/client-credentials-client-secret.html</loc>
<lastmod>2024-10-14T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/10/14/local-administrator-protection-vs-epm-the-differences-explained.html</loc>
<lastmod>2024-10-14T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/10/14/no-reason-to-upgrade-distribution-lists-to-microsoft-365-groups.html</loc>
<lastmod>2024-10-14T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/10/15/using-the-members-of-a-dynamic-microsoft-365-group-to-populate-an-adaptive-scope.html</loc>
<lastmod>2024-10-15T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/10/16/working-with-copilot-pages.html</loc>
<lastmod>2024-10-16T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/10/17/hardening-entra-id.html</loc>
<lastmod>2024-10-17T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/10/17/teams-revamps-its-calendar-with-outlook-components.html</loc>
<lastmod>2024-10-17T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/10/18/will-microsoft-365-copilot-errors-and-hallucinations-eventually-corrupt-the-micr.html</loc>
<lastmod>2024-10-18T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/10/20/entra-external-identities-security.html</loc>
<lastmod>2024-10-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/10/21/azure-rbac-security-best-practices.html</loc>
<lastmod>2024-10-21T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/10/21/client-credentials-client-certificate.html</loc>
<lastmod>2024-10-21T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/10/21/microsoft-graph-doesnt-support-custom-attributes-for-groups.html</loc>
<lastmod>2024-10-21T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/10/21/report-license-usage-rights-with-microsoft-graph-powershell.html</loc>
<lastmod>2024-10-21T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/10/22/entra-id-protection-risk-policies.html</loc>
<lastmod>2024-10-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/10/22/microsoft-releases-beta-version-of-new-cloud-licensing-graph-api.html</loc>
<lastmod>2024-10-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/10/23/autopilot-error-0x80280009-tpm-attestation-what-is-going-on.html</loc>
<lastmod>2024-10-23T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/10/23/how-to-force-users-to-sign-in-weekly.html</loc>
<lastmod>2024-10-23T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/10/23/privileged-identity-management-entra.html</loc>
<lastmod>2024-10-23T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/10/24/entra-workload-identities-security.html</loc>
<lastmod>2024-10-24T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/10/24/how-to-set-directory-synchronization-features-with-the-graph.html</loc>
<lastmod>2024-10-24T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/10/25/cyber-back-to-school-microsoft-token-theft-unveiled.html</loc>
<lastmod>2024-10-25T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/10/25/managed-identity-permission-manager-a-new-tool-is-out-to-test-v-1.html</loc>
<lastmod>2024-10-25T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/10/25/microsoft-says-smes-can-benefit-from-microsoft-365-copilot.html</loc>
<lastmod>2024-10-25T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/10/25/test-yourself-part-1-identity.html</loc>
<lastmod>2024-10-25T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/10/26/conditional-access-policy-design.html</loc>
<lastmod>2024-10-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/10/27/entra-id-security-config-analyzer.html</loc>
<lastmod>2024-10-27T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/10/28/how-to-bypass-microsoft-graph-powershell-access-restrictions.html</loc>
<lastmod>2024-10-28T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/10/28/how-to-search-for-email-protected-by-sensitivity-labels.html</loc>
<lastmod>2024-10-28T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/10/28/improving-automated-sentinel-detection-validation.html</loc>
<lastmod>2024-10-28T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/10/28/patch-my-pc-home-updater-50-effortless-updates-for-over-500-apps.html</loc>
<lastmod>2024-10-28T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/10/28/the-incredible-story-of-using-the-windows-performance-recorder-to-troubleshoot-y.html</loc>
<lastmod>2024-10-28T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/10/29/enablement-of-passkeys-in-authenticator-with-no-key-restrictions.html</loc>
<lastmod>2024-10-29T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/10/29/how-to-restore-the-service-plan-for-a-microsoft-365-product-license.html</loc>
<lastmod>2024-10-29T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/10/30/autopilot-device-preparation-avp2ap-dpp-hiding-the-privacy-settings.html</loc>
<lastmod>2024-10-30T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/10/30/introducing-azure-devops-backup-tool-1120-security-update.html</loc>
<lastmod>2024-10-30T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/10/30/why-are-per-user-mfa-settings-available-in-the-entra-admin-center.html</loc>
<lastmod>2024-10-30T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/10/31/create-a-custom-copilot-agent-for-sharepoint-online.html</loc>
<lastmod>2024-10-31T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/11/01/managed-identity-permission-manager-v-1002-is-out.html</loc>
<lastmod>2024-11-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/11/01/office-365-for-it-pros-november-2024-update.html</loc>
<lastmod>2024-11-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/11/03/restrict-non-admin-access-to-the-microsoft-entra-portal-with-powershell.html</loc>
<lastmod>2024-11-03T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/11/04/entra-id-private-access-with-private-integrated-storage-accounts.html</loc>
<lastmod>2024-11-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/11/04/fix-subscription-activation-by-automatically-removing-secondary-work-or-school-a.html</loc>
<lastmod>2024-11-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/11/04/how-to-use-the-graph-sdk-to-manage-group-based-licensing.html</loc>
<lastmod>2024-11-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/11/05/loop-app-adds-more-support-for-sensitivity-labels.html</loc>
<lastmod>2024-11-05T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/11/06/exchange-online-adds-delicensing-resiliency.html</loc>
<lastmod>2024-11-06T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/11/07/how-microsoft-copilot-generates-compliance-records.html</loc>
<lastmod>2024-11-07T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/11/07/microsoft-recommends-use-of-the-unifiedroledefinition-apis.html</loc>
<lastmod>2024-11-07T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/11/08/private-channels-just-dont-get-any-respect.html</loc>
<lastmod>2024-11-08T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/11/11/microsoft-recommends-the-unifiedroledefinition-graph-api-for-role-assignment-aut.html</loc>
<lastmod>2024-11-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/11/12/device-compliance-the-tpm-preattestationhealthcheck-in-windows-24h2.html</loc>
<lastmod>2024-11-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/11/12/microsoft-to-separate-copilot-and-teams-compliance-records.html</loc>
<lastmod>2024-11-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/11/13/graph-permission-scopes-and-delegate-access-in-microsoft-entra.html</loc>
<lastmod>2024-11-13T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/11/13/how-sharepoint-online-intelligent-versioning-interacts-with-retention-policies-a.html</loc>
<lastmod>2024-11-13T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/11/13/ual-unaligned-activity-logs.html</loc>
<lastmod>2024-11-13T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/11/14/github-backup-tool-update-1310-is-out.html</loc>
<lastmod>2024-11-14T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/11/14/manage-pim-role-assignments-with-the-microsoft-graph-powershell-sdk.html</loc>
<lastmod>2024-11-14T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/11/15/use-the-audit-log-to-find-the-last-accessed-date-for-documents.html</loc>
<lastmod>2024-11-15T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/11/18/fixing-time-zone-issues-in-windows-autopilot.html</loc>
<lastmod>2024-11-18T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/11/18/microsoft-to-enforce-mandatory-mfa-requirement-for-microsoft-365-admin-center.html</loc>
<lastmod>2024-11-18T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/11/19/microsoft-details-progress-towards-a-more-secure-exchange-online.html</loc>
<lastmod>2024-11-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/11/20/selfservice-for-hardware-oath-tokens-in-entra-id.html</loc>
<lastmod>2024-11-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/11/20/track-sensitivity-label-downgrades-and-removals-with-audit-log-data.html</loc>
<lastmod>2024-11-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/11/21/msem-ot-security-initiative.html</loc>
<lastmod>2024-11-21T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/11/21/use-the-microsoft-graph-to-report-service-principal-sign-in-activity.html</loc>
<lastmod>2024-11-21T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/11/22/microsofts-simple-message-at-ignite-its-all-about-ai.html</loc>
<lastmod>2024-11-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/11/25/the-impact-of-generative-ai-on-technology-websites.html</loc>
<lastmod>2024-11-25T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/11/26/the-problem-of-document-mismatches-and-cloudy-attachments.html</loc>
<lastmod>2024-11-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/11/27/fix-sense-service-stuck-in-start_pending-on-ws2012r2-or-ws2016-check-oobe.html</loc>
<lastmod>2024-11-27T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/11/27/microsoft-changes-names-for-sensitivity-label-permissions.html</loc>
<lastmod>2024-11-27T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/11/28/announcing-the-netskope-ccp-connector.html</loc>
<lastmod>2024-11-28T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/11/28/evilginx-mastery-course-what-i-learned.html</loc>
<lastmod>2024-11-28T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/11/28/proof-of-possession-token-protection-and-graph-powershell-whats-next.html</loc>
<lastmod>2024-11-28T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/11/29/finding-inactive-mailboxes-based-on-message-trace-data.html</loc>
<lastmod>2024-11-29T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/12/01/edr-silencers-and-beyond-exploring-methods-to-block-edr-communication-part-1.html</loc>
<lastmod>2024-12-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/12/02/office-365-for-it-pros-december-2024-update.html</loc>
<lastmod>2024-12-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/12/02/passkeys-101-how-microsoft-entra-simplifies-passwordless-authentication.html</loc>
<lastmod>2024-12-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/12/02/windows-hotpatching-is-now-possible-on-clients-rebootless-updates-is-here.html</loc>
<lastmod>2024-12-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/12/03/report-copilot-user-prompts-and-ai-responses-with-powershell.html</loc>
<lastmod>2024-12-03T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/12/03/using-the-audit-log-to-generate-a-daily-action-summary-for-a-user.html</loc>
<lastmod>2024-12-03T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/12/04/how-to-switch-onedrive-for-business-accounts-to-intelligent-versioning.html</loc>
<lastmod>2024-12-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/12/04/request-temporary-access-pass-on-behalf-of-others-via-entra-id-governance-access.html</loc>
<lastmod>2024-12-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/12/04/the-0x80072f9a-we-start-from.html</loc>
<lastmod>2024-12-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/12/05/microsoft-365-unifies-video-under-clipchamp-brand.html</loc>
<lastmod>2024-12-05T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/12/06/thwarting-social-engineering-attacks-against-teams-federated-chat.html</loc>
<lastmod>2024-12-06T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/12/06/use-requestor-information-in-entra-id-access-packages-as-input-for-custom-extens.html</loc>
<lastmod>2024-12-06T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/12/06/workshop-kusto-graph-semantics-explained.html</loc>
<lastmod>2024-12-06T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/12/08/how-to-receive-entra-admin-email-notifications-without-a-mailbox.html</loc>
<lastmod>2024-12-08T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/12/08/under-the-hoods-of-the-windows-device-inventory-agent.html</loc>
<lastmod>2024-12-08T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/12/09/device-isolation-and-containment-strategies.html</loc>
<lastmod>2024-12-09T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/12/09/life-is-like-a-box-of-enhanced-device-inventory-properties.html</loc>
<lastmod>2024-12-09T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/12/09/microsoft-entra-identity-governance-fundamentals-access-packages.html</loc>
<lastmod>2024-12-09T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/12/09/microsoft-kills-viva-goals.html</loc>
<lastmod>2024-12-09T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/12/10/new-option-available-to-update-microsoft-365-user-profile.html</loc>
<lastmod>2024-12-10T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/12/11/february-deadline-looms-for-legacy-exchange-tokens-used-by-outlook-add-ins.html</loc>
<lastmod>2024-12-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/12/12/how-to-configure-sensitivity-labels-to-block-document-downloads-from-sharepoint.html</loc>
<lastmod>2024-12-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/12/13/microsoft-365-users-to-get-outlooks-org-explorer.html</loc>
<lastmod>2024-12-13T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/12/16/teams-gets-resizable-windows-and-more-pop-out-panes.html</loc>
<lastmod>2024-12-16T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/12/17/ioc-hunting-at-scale.html</loc>
<lastmod>2024-12-17T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/12/17/microsoft-entra-identity-governance-fundamentals-lifecycle-workflows.html</loc>
<lastmod>2024-12-17T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/12/17/microsoft-proposes-a-horrible-change-for-the-search-unifiedauditlog-cmdlet.html</loc>
<lastmod>2024-12-17T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/12/17/troubleshooting-the-properties-catalog-error-2147749902.html</loc>
<lastmod>2024-12-17T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/12/18/processing-microsoft-365-retention-labels-with-the-microsoft-graph-powershell-sd.html</loc>
<lastmod>2024-12-18T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/12/19/blocking-microsoft-365-copilot-making-inferences-in-teams-meetings.html</loc>
<lastmod>2024-12-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/12/19/mc2mc-live-forward-to-the-past.html</loc>
<lastmod>2024-12-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/12/19/microsoft-defender-for-cloud-apps-visibility-into-applications-with-highly-privi.html</loc>
<lastmod>2024-12-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/12/20/the-confusing-renaming-of-microsoft-365-copilot.html</loc>
<lastmod>2024-12-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/12/22/tool-release-pwshmisp.html</loc>
<lastmod>2024-12-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/12/23/managed-identity-permission-manager-v-1003-is-out.html</loc>
<lastmod>2024-12-23T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/12/23/microsoft-now-allows-connecting-to-multi-tenant-apps-using-managed-identities.html</loc>
<lastmod>2024-12-23T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/12/23/microsoft-search-in-bing-gets-the-bullet.html</loc>
<lastmod>2024-12-23T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/12/26/tool-release-pwshuploadindicatorsapi.html</loc>
<lastmod>2024-12-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/12/30/how-to-use-managed-identities-for-multi-tenant-app-authentication.html</loc>
<lastmod>2024-12-30T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2024/12/30/mdm-intune-policies-moving-over-to-mmp-c.html</loc>
<lastmod>2024-12-30T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/01/01/kql-sources-2025-update.html</loc>
<lastmod>2025-01-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/01/01/office-365-for-it-pros-january-2025-update.html</loc>
<lastmod>2025-01-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/01/01/what-a-2024-a-new-year-is-now-over-and-a-new-begings.html</loc>
<lastmod>2025-01-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/01/02/microsoft-entra-id-governance-show-suggested-access-packages-in-my-access.html</loc>
<lastmod>2025-01-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/01/02/viva-engage-items-show-up-in-search-results.html</loc>
<lastmod>2025-01-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/01/03/how-to-create-a-teams-avatar-from-a-photo.html</loc>
<lastmod>2025-01-03T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/01/03/new-ebook-demystifying-microsoft-defender-for-servers-by-james-agombar.html</loc>
<lastmod>2025-01-03T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/01/04/how-to-use-microsoft-security-exposure-management-xspm.html</loc>
<lastmod>2025-01-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/01/05/how-to-check-and-block-malicious-browser-extensions-with-microsoft-defender-and.html</loc>
<lastmod>2025-01-05T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/01/06/mastering-microsoft-azure-rbac-38-entra-id-roles-automated-role-assignment-repor.html</loc>
<lastmod>2025-01-06T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/01/06/renewing-apple-enrollment-program-vpp-token-and-mdm-push-certificate-in-microsof.html</loc>
<lastmod>2025-01-06T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/01/06/sharepoint-online-intelligent-versioning-and-the-500-version-limit.html</loc>
<lastmod>2025-01-06T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/01/07/after-2-years-a-new-release-of-mde-troubleshooter.html</loc>
<lastmod>2025-01-07T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/01/07/governing-os-versions-in-microsoft-intune-best-practices-and-configuration.html</loc>
<lastmod>2025-01-07T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/01/07/microsoft-describes-top-five-sharepoint-features-shipped-in-2024.html</loc>
<lastmod>2025-01-07T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/01/08/protecting-your-break-glass-accounts-in-entra-now-that-mfa-gets-enforced-on-more.html</loc>
<lastmod>2025-01-08T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/01/08/teams-splits-recording-and-transcription-settings-for-meetings-and-events.html</loc>
<lastmod>2025-01-08T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/01/09/9-ways-to-improve-your-m365-mfa-deployment-in-2025.html</loc>
<lastmod>2025-01-09T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/01/09/otp-verification-option-for-teams-meetings.html</loc>
<lastmod>2025-01-09T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/01/10/all-about-the-office-365-for-it-pros-github-repository.html</loc>
<lastmod>2025-01-10T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/01/10/enabling-qr-code-sign-in-for-microsoft-entra-id.html</loc>
<lastmod>2025-01-10T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/01/11/on-the-use-of-threat-intelligence-in-detection.html</loc>
<lastmod>2025-01-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/01/11/seamlessly-migrating-from-symantec-endpoint-protection-to-microsoft-defender-for.html</loc>
<lastmod>2025-01-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/01/11/the-curious-case-of-the-missing-enterprise-app.html</loc>
<lastmod>2025-01-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/01/13/how-to-post-video-clips-in-teams-channel-posts-and-replies.html</loc>
<lastmod>2025-01-13T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/01/13/parsing-cef-messages-without-azure-monitor-agent.html</loc>
<lastmod>2025-01-13T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/01/13/spying-on-your-isvs-credential-choices.html</loc>
<lastmod>2025-01-13T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/01/14/list-all-directory-objects-owned-by-a-user-in-entra-with-powershell.html</loc>
<lastmod>2025-01-14T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/01/14/using-the-sharepoint-pages-graph-api.html</loc>
<lastmod>2025-01-14T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/01/15/final-days-for-the-msonline-and-azuread-powershell-modules.html</loc>
<lastmod>2025-01-15T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/01/16/microsoft-defender-for-cloud-apps-permissions-filter-and-export-capability-is-he.html</loc>
<lastmod>2025-01-16T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/01/16/microsoft-launches-copilot-for-all-initiative.html</loc>
<lastmod>2025-01-16T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/01/17/microsoft-365-user-profile-card-gets-name-pronunciation.html</loc>
<lastmod>2025-01-17T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/01/18/privacy-policy.html</loc>
<lastmod>2025-01-18T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/01/19/restore-microsoft-365-users-with-a-new-username-using-powershell.html</loc>
<lastmod>2025-01-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/01/20/dual-enrollment-mmp-c-light-for-workplace-joined-devices.html</loc>
<lastmod>2025-01-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/01/20/enable-all-auditable-events.html</loc>
<lastmod>2025-01-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/01/20/how-to-replace-group-owners-when-they-leave-the-organization.html</loc>
<lastmod>2025-01-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/01/20/kung-fu-mmp-c-onboarding.html</loc>
<lastmod>2025-01-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/01/20/mastering-plus-addressing-in-microsoft-simplify-email-management.html</loc>
<lastmod>2025-01-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/01/21/primer-how-to-use-azure-automation-to-run-microsoft-graph-powershell-sdk-scripts.html</loc>
<lastmod>2025-01-21T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/01/22/device-cleanup.html</loc>
<lastmod>2025-01-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/01/22/mde-analyzer.html</loc>
<lastmod>2025-01-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/01/22/primer-output-data-generated-with-an-azure-automation-runbook-to-a-sharepoint-li.html</loc>
<lastmod>2025-01-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/01/23/capremortem.html</loc>
<lastmod>2025-01-23T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/01/23/from-spf-to-dane-securing-microsoft-365-email-communications.html</loc>
<lastmod>2025-01-23T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/01/23/primer-how-to-schedule-azure-automation-runbooks-to-process-microsoft-365-data.html</loc>
<lastmod>2025-01-23T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/01/24/entra-id-allows-people-to-update-their-user-principal-names.html</loc>
<lastmod>2025-01-24T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/01/24/managed-identity-permission-manager-v-1004-is-out.html</loc>
<lastmod>2025-01-24T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/01/24/navigating-new-authentication-methods-sms-for-password-reset-not-for-mfa.html</loc>
<lastmod>2025-01-24T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/01/25/expanding-on-cyber-threat-intelligence-for-security-monitoring.html</loc>
<lastmod>2025-01-25T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/01/26/defender-autoconfig.html</loc>
<lastmod>2025-01-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/01/26/microsoft-accidentally-allows-users-to-update-their-own-username.html</loc>
<lastmod>2025-01-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/01/26/one-full-scan.html</loc>
<lastmod>2025-01-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/01/27/securing-microsoft-business-premium-part-01-the-first-step-to-an-unbreakable-def.html</loc>
<lastmod>2025-01-27T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/01/27/super-advanced-auditing.html</loc>
<lastmod>2025-01-27T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/01/27/update-8-available-for-automating-microsoft-365-with-powershell.html</loc>
<lastmod>2025-01-27T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/01/28/comparing-web-filtering-and-security-microsoft-entra-internet-access-global-secu.html</loc>
<lastmod>2025-01-28T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/01/28/entra-id-new-build-in-audit-feature-in-entra-connect-is-finally-here.html</loc>
<lastmod>2025-01-28T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/01/28/primer-running-audit-searches-and-sending-email-from-azure-automation.html</loc>
<lastmod>2025-01-28T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/01/29/monitor-for-new-actions-in-sentinel-and-mde.html</loc>
<lastmod>2025-01-29T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/01/29/primer-using-exchange-high-volume-email-with-azure-automation.html</loc>
<lastmod>2025-01-29T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/01/30/microsoft-announce-new-people-administrator-role-in-microsoft-entra.html</loc>
<lastmod>2025-01-30T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/01/30/microsoft-cloud-revenues-keep-on-heaping-up.html</loc>
<lastmod>2025-01-30T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/01/30/the-shadowadminpairs-a-deep-dive-into-administrator-protection.html</loc>
<lastmod>2025-01-30T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/01/31/microsoft-azure-elevate-access-to-resources-with-entra-id-audit-logs-now-availab.html</loc>
<lastmod>2025-01-31T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/01/31/microsoft-reannounces-teams-policy-to-suppress-in-product-messages.html</loc>
<lastmod>2025-01-31T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/02/01/getting-more-data-from-the-ca-insights-and-reporting-workbook.html</loc>
<lastmod>2025-02-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/02/02/find-multi-tenant-applications-using-weak-authentication-methods.html</loc>
<lastmod>2025-02-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/02/02/operational-collections-20.html</loc>
<lastmod>2025-02-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/02/02/readme.html</loc>
<lastmod>2025-02-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/02/03/monthly-update-116-for-office-365-for-it-pros.html</loc>
<lastmod>2025-02-03T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/02/03/your-microsoft-entra-tenant-isnt-as-secure-as-you-think-fix-it-with-protected-ac.html</loc>
<lastmod>2025-02-03T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/02/04/entra-id-introduces-new-graph-permissions-for-user-accounts.html</loc>
<lastmod>2025-02-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/02/04/protect-deletion-of-directory-objects-using-conditional-access.html</loc>
<lastmod>2025-02-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/02/04/tutorial-the-fastest-way-to-report-a-false-negative-in-defender-for-endpoint.html</loc>
<lastmod>2025-02-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/02/05/how-to-register-for-qr-code-authentication-in-microsoft-365.html</loc>
<lastmod>2025-02-05T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/02/05/interpreting-signin-audit-records-for-service-principals.html</loc>
<lastmod>2025-02-05T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/02/05/workplace-ninja-connect-netherland.html</loc>
<lastmod>2025-02-05T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/02/06/managed-identity-permission-manager-v1100-is-here.html</loc>
<lastmod>2025-02-06T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/02/06/mc2mc-connect.html</loc>
<lastmod>2025-02-06T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/02/06/microsoft-introduces-people-administrator-role.html</loc>
<lastmod>2025-02-06T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/02/07/maester-framework-continues-to-prosper.html</loc>
<lastmod>2025-02-07T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/02/09/how-to-check-for-oauth-apps-with-specific-graph-permissions-assigned.html</loc>
<lastmod>2025-02-09T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/02/10/primer-using-exchange-online-powershell-in-azure-automation-runbooks.html</loc>
<lastmod>2025-02-10T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/02/10/securing-microsoft-business-premium-part-02-your-authentication-is-brokenheres-h.html</loc>
<lastmod>2025-02-10T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/02/11/conditional-access-risk-policies-dont-get-fooled.html</loc>
<lastmod>2025-02-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/02/11/mam-vs-mdm-choosing-the-right-mobile-management-approach.html</loc>
<lastmod>2025-02-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/02/11/new-bulk-edit-features-for-users-in-microsoft-entra-id.html</loc>
<lastmod>2025-02-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/02/11/use-protected-actions-to-stop-attackers-hard-deleting-entra-id-accounts.html</loc>
<lastmod>2025-02-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/02/12/common-mistakes-during-microsoft-defender-for-endpoint-deployments.html</loc>
<lastmod>2025-02-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/02/12/how-to-use-bulk-user-operations-in-entra-admin-center.html</loc>
<lastmod>2025-02-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/02/13/how-to-index-and-search-sharepoint-online-custom-columns.html</loc>
<lastmod>2025-02-13T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/02/14/microsoft-graph-powershell-sdk-needs-to-fix-its-password-problem.html</loc>
<lastmod>2025-02-14T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/02/16/correlating-defender-for-endpoint-and-global-secure-access-logs.html</loc>
<lastmod>2025-02-16T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/02/16/how-to-protect-against-device-code-flow-abuse-storm-2372-attacks-and-block-the-a.html</loc>
<lastmod>2025-02-16T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/02/17/purview-retires-the-events-alert-capability-from-audit-solution.html</loc>
<lastmod>2025-02-17T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/02/18/how-to-find-over-licensed-privileged-accounts-in-microsoft-entra.html</loc>
<lastmod>2025-02-18T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/02/18/unlocking-microsoft-entras-elevated-access-logs-better-security-better-insights.html</loc>
<lastmod>2025-02-18T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/02/18/update-9-for-automating-microsoft-365-with-powershell-ebook.html</loc>
<lastmod>2025-02-18T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/02/19/device-query-for-multiple-devices-device-inventory-and-single-device-query-conne.html</loc>
<lastmod>2025-02-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/02/19/processing-multiple-message-attachments-with-the-microsoft-graph-powershell-sdk.html</loc>
<lastmod>2025-02-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/02/19/unleash-the-power-of-enterprise-exposure-graph-create-a-managed-identities-permi.html</loc>
<lastmod>2025-02-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/02/20/an-interesting-m365-billing-scam.html</loc>
<lastmod>2025-02-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/02/20/here-we-go.html</loc>
<lastmod>2025-02-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/02/20/how-to-convert-pscustomobject-to-hashtable-with-powershell.html</loc>
<lastmod>2025-02-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/02/20/why-microsoft-365-copilot-works-for-some-and-not-for-others.html</loc>
<lastmod>2025-02-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/02/21/another-nail-in-the-exchange-web-services-coffin.html</loc>
<lastmod>2025-02-21T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/02/23/workspace-transformation-rules-in-practice.html</loc>
<lastmod>2025-02-23T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/02/24/tracking-down-bootleg-copies-of-office-365-for-it-pros.html</loc>
<lastmod>2025-02-24T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/02/25/how-to-bulk-provision-qr-code-authentication-in-microsoft-entra.html</loc>
<lastmod>2025-02-25T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/02/25/microsoft-graph-powershell-sdk-runs-into-choppy-waters.html</loc>
<lastmod>2025-02-25T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/02/25/why-using-a-dem-account-for-windows-autopilot-is-a-bad-idea.html</loc>
<lastmod>2025-02-25T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/02/26/microsoft-removes-reactivation-fee-for-archived-sharepoint-sites.html</loc>
<lastmod>2025-02-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/02/26/things-you-should-know-before-rolling-out-device-bound-passkeys-in-microsoft-aut.html</loc>
<lastmod>2025-02-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/02/27/azure-spring-clean-maestering-azure-tenant-security.html</loc>
<lastmod>2025-02-27T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/02/27/language-packs-i-just-told-my-computer-to-figure-it-out-apparently-it-did.html</loc>
<lastmod>2025-02-27T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/02/27/sharepoint-online-adds-support-for-sensitivity-labels-with-user-defined-permissi.html</loc>
<lastmod>2025-02-27T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/02/28/new-payg-service-to-classify-historical-sharepoint-data.html</loc>
<lastmod>2025-02-28T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/03/03/configure-automatic-attack-disruption-in-microsoft-defender-xdr.html</loc>
<lastmod>2025-03-03T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/03/03/god-mode-with-a-timer-using-logic-apps-to-restrict-elevated-access-in-entra.html</loc>
<lastmod>2025-03-03T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/03/03/office-365-for-it-pros-march-2025-update.html</loc>
<lastmod>2025-03-03T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/03/04/create-a-free-interactive-license-usage-report-for-microsoft-365.html</loc>
<lastmod>2025-03-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/03/04/microsoft-graph-powershell-sdk-v2261-remains-flawed.html</loc>
<lastmod>2025-03-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/03/05/how-to-create-and-send-an-outlook-newsletter.html</loc>
<lastmod>2025-03-05T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/03/06/using-ios-build-numbers-in-exchange-activesync-device-access-rules.html</loc>
<lastmod>2025-03-06T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/03/07/evilginx-loves-temporary-access-passes-too.html</loc>
<lastmod>2025-03-07T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/03/07/the-new-outlook-gains-colored-folder-icons.html</loc>
<lastmod>2025-03-07T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/03/10/declarative-device-management-with-intune.html</loc>
<lastmod>2025-03-10T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/03/10/exchange-online-restricts-the-number-of-dynamic-distribution-groups.html</loc>
<lastmod>2025-03-10T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/03/11/create-a-free-interactive-entra-authentication-methods-report.html</loc>
<lastmod>2025-03-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/03/11/microsoft-imposes-1-year-retention-for-teams-meeting-attendance-reports.html</loc>
<lastmod>2025-03-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/03/12/defender-for-vulnerability-management.html</loc>
<lastmod>2025-03-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/03/12/how-to-send-outlook-newsletters-with-email-communication-services.html</loc>
<lastmod>2025-03-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/03/13/secure-score-series-disable-local-storage-of-passwords.html</loc>
<lastmod>2025-03-13T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/03/13/why-only-web-based-outlook-clients-can-recall-encrypted-email.html</loc>
<lastmod>2025-03-13T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/03/14/common-mistakes-you-may-be-making-with-data-loss-prevention.html</loc>
<lastmod>2025-03-14T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/03/14/sharepoint-online-powershell-module-gets-modern-authentication.html</loc>
<lastmod>2025-03-14T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/03/16/ms-mfa-mandate-essential-insights-and-strategies.html</loc>
<lastmod>2025-03-16T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/03/17/creating-a-ccp-connector-part-1.html</loc>
<lastmod>2025-03-17T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/03/17/future-proofing-microsoft-entra-logs-practical-azure-storage.html</loc>
<lastmod>2025-03-17T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/03/17/signtool-gui-v-1400-is-out.html</loc>
<lastmod>2025-03-17T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/03/17/time-to-remove-the-old-report-message-add-ins.html</loc>
<lastmod>2025-03-17T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/03/18/facilitator-agent-brings-ai-powered-notetaking-to-teams-chat.html</loc>
<lastmod>2025-03-18T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/03/18/how-to-authenticate-with-windows-hello-for-business-or-fido-security-key-in-rdp.html</loc>
<lastmod>2025-03-18T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/03/18/securing-azure-identities-the-new-perimeter-in-cybersecurity.html</loc>
<lastmod>2025-03-18T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/03/19/ai-workload-threat-protection-in-microsoft-defender-for-cloud.html</loc>
<lastmod>2025-03-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/03/19/create-a-free-enterprise-app-permissions-report-in-microsoft-entra.html</loc>
<lastmod>2025-03-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/03/19/creating-a-ccp-connector-part-2.html</loc>
<lastmod>2025-03-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/03/19/mde-device-discovery-improving-the-monitored-network-page.html</loc>
<lastmod>2025-03-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/03/19/securing-azure-paas-resources-with-network-security-perimeter-1.html</loc>
<lastmod>2025-03-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/03/19/securing-azure-paas-resources-with-network-security-perimeter-2.html</loc>
<lastmod>2025-03-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/03/19/securing-azure-paas-resources-with-network-security-perimeter.html</loc>
<lastmod>2025-03-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/03/19/securing-microsoft-business-premium-part-03-authorization-best-practices-from-ze.html</loc>
<lastmod>2025-03-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/03/19/updating-email-addresses-after-removing-domains.html</loc>
<lastmod>2025-03-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/03/20/use-data-loss-prevention-to-stop-microsoft-365-copilot-chat-from-processing-docu.html</loc>
<lastmod>2025-03-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/03/21/copilot-in-outlook-gets-a-revamp.html</loc>
<lastmod>2025-03-21T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/03/22/microsoft-purview-series-part-4.html</loc>
<lastmod>2025-03-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/03/24/asr-rules-the-importance-of-configuration-and-verifying-with-the-asr-rule-inspec.html</loc>
<lastmod>2025-03-24T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/03/24/creating-a-ccp-connector-part-3.html</loc>
<lastmod>2025-03-24T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/03/24/defender-for-cloud-ai-posture-management-ai-workload-protection-1.html</loc>
<lastmod>2025-03-24T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/03/24/defender-for-cloud-ai-posture-management-ai-workload-protection.html</loc>
<lastmod>2025-03-24T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/03/24/defender-for-cloud-ai-posture-management-amp-ai-workload-protection.html</loc>
<lastmod>2025-03-24T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/03/24/microsofts-attempts-to-improve-the-teams-ui-are-not-always-successful.html</loc>
<lastmod>2025-03-24T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/03/24/seal-the-gaps-new-microsoft-purview-data-security-controls-for-the-browser-38-ne.html</loc>
<lastmod>2025-03-24T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/03/25/microsoft-azure-secure-your-code-with-trusted-signing-a-practical-guide.html</loc>
<lastmod>2025-03-25T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/03/25/new-mitoken-graph-powershell-module-for-multi-tenant-apps.html</loc>
<lastmod>2025-03-25T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/03/25/proactive-exposure-hunting-oauth-applications-and-azure-permissions.html</loc>
<lastmod>2025-03-25T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/03/25/why-teams-clients-prompt-for-your-location.html</loc>
<lastmod>2025-03-25T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/03/26/automated-incident-triage-with-security-copilot-and-microsoft-sentinel-defender.html</loc>
<lastmod>2025-03-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/03/26/how-to-stop-microsoft-365-users-uploading-sharepoint-online-and-onedrive-for-bus.html</loc>
<lastmod>2025-03-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/03/27/artificial-intelligence-powershell-and-microsoft-365-administration.html</loc>
<lastmod>2025-03-27T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/03/27/entra-chat-with-merill-fernando.html</loc>
<lastmod>2025-03-27T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/03/28/another-day-another-purview-solution-data-security-investigations.html</loc>
<lastmod>2025-03-28T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/03/28/duplicate-mail-user-objects-created-for-guest-accounts.html</loc>
<lastmod>2025-03-28T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/03/30/quickpim-a-multi-role-pim-activation-extension-for-google-chrome.html</loc>
<lastmod>2025-03-30T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/03/31/how-to-find-who-assigned-retention-labels-to-sharepoint-files.html</loc>
<lastmod>2025-03-31T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/04/01/office-365-for-it-pros-april-2025-update.html</loc>
<lastmod>2025-04-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/04/02/how-sharepoint-online-restricted-content-discovery-works.html</loc>
<lastmod>2025-04-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/04/03/managing-restricted-groups-with-access-packages.html</loc>
<lastmod>2025-04-03T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/04/03/securing-microsoft-business-premium-part-04-passwords-unlocked-mastering-self-se.html</loc>
<lastmod>2025-04-03T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/04/03/transferring-meeting-ownership-from-an-ex-employee-can-be-hard-work.html</loc>
<lastmod>2025-04-03T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/04/04/bringing-artificial-intelligence-to-entra-id-conditional-access.html</loc>
<lastmod>2025-04-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/04/06/entra-private-access-and-the-future-of-the-entra-app-proxy.html</loc>
<lastmod>2025-04-06T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/04/07/microsoft-defender-for-office-365-exposes-bad-links-in-email-preview.html</loc>
<lastmod>2025-04-07T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/04/08/how-to-find-non-privileged-applications-owners-in-microsoft-entra.html</loc>
<lastmod>2025-04-08T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/04/08/how-to-report-who-shared-what-file-from-sharepoint-online-sites.html</loc>
<lastmod>2025-04-08T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/04/08/introducing-asr-rule-inspector-v2.html</loc>
<lastmod>2025-04-08T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/04/09/the-continue-to-sign-in-prompt-that-breaks-the-sso.html</loc>
<lastmod>2025-04-09T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/04/09/use-auto-label-policies-to-protect-old-files-from-copilot.html</loc>
<lastmod>2025-04-09T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/04/09/why-microsoft-purview-projects-fail-before-they-even-begin-and-how-to-stop-that.html</loc>
<lastmod>2025-04-09T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/04/10/reporting-the-creation-of-sharepoint-agents.html</loc>
<lastmod>2025-04-10T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/04/11/are-microsoft-e5-licensing-add-ons-a-good-deal.html</loc>
<lastmod>2025-04-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/04/13/defender-for-identity-unveiling-enhanced-visibility-new-service-account-monitori.html</loc>
<lastmod>2025-04-13T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/04/13/implementing-attack-surface-reduction-policies.html</loc>
<lastmod>2025-04-13T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/04/14/microsoft-attempts-to-fix-microsoft-graph-powershell-sdk-problem-with-azure-auto.html</loc>
<lastmod>2025-04-14T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/04/14/using-azure-arc-only-for-defender-for-servers-or-azure-monitoring-agent-lock-it.html</loc>
<lastmod>2025-04-14T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/04/15/a-huge-thank-you-and-a-little-update-behind-the-scenes.html</loc>
<lastmod>2025-04-15T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/04/15/comprehensive-guide-to-configuring-advanced-auditing.html</loc>
<lastmod>2025-04-15T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/04/15/entra-id-to-disable-service-principal-less-authentication.html</loc>
<lastmod>2025-04-15T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/04/16/introducing-the-microsoft-graph-copilot-powershell-module.html</loc>
<lastmod>2025-04-16T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/04/16/licensing-auto-label-policies-for-sensitivity-labels.html</loc>
<lastmod>2025-04-16T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/04/17/important-purview-ediscovery-changes-take-effect-in-may-2025.html</loc>
<lastmod>2025-04-17T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/04/18/how-to-report-the-sponsors-of-entra-id-guest-accounts.html</loc>
<lastmod>2025-04-18T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/04/19/continue-to-sign-in-prompt-part-2-disable-the-dma-sso-compliance.html</loc>
<lastmod>2025-04-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/04/21/an-account-blocked-by-mace-credential-revocation-is-a-good-way-to-start-a-saturd.html</loc>
<lastmod>2025-04-21T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/04/21/report-conditional-access-blocked-sign-in-metrics-with-powershell.html</loc>
<lastmod>2025-04-21T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/04/22/exchange-online-moves-closer-to-dumping-ews.html</loc>
<lastmod>2025-04-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/04/22/microsoft-defender-for-identity-recommended-actions-unsafe-permissions-on-the-dn.html</loc>
<lastmod>2025-04-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/04/23/microsoft-retires-exchange-server-owa-access-to-online-archives.html</loc>
<lastmod>2025-04-23T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/04/23/modern-data-security-challenges-defence-in-depth-approach.html</loc>
<lastmod>2025-04-23T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/04/24/replacing-litigation-holds-with-an-ediscovery-case.html</loc>
<lastmod>2025-04-24T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/04/25/copilots-solution-to-fix-grammar-and-spellings.html</loc>
<lastmod>2025-04-25T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/04/26/detecting-non-privileged-windows-hello-abuse.html</loc>
<lastmod>2025-04-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/04/27/how-to-block-the-creation-of-client-secrets-on-entra-applications.html</loc>
<lastmod>2025-04-27T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/04/28/automating-microsoft-365-with-powershell-update-11.html</loc>
<lastmod>2025-04-28T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/04/28/creating-a-ccp-connector-part-4.html</loc>
<lastmod>2025-04-28T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/04/28/go-with-the-flow-mastering-microsoft-entra-user-flowsself-service-sign-up-in-a-w.html</loc>
<lastmod>2025-04-28T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/04/28/how-to-block-the-use-of-direct-send-in-exchange-online.html</loc>
<lastmod>2025-04-28T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/04/29/how-to-find-active-ews-based-apps-in-a-microsoft-365-tenant.html</loc>
<lastmod>2025-04-29T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/04/30/data-strategy-breakdown-series-defence-in-depth-38-zero-trust-1.html</loc>
<lastmod>2025-04-30T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/04/30/microsoft-365-security-compliance-user-group.html</loc>
<lastmod>2025-04-30T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/04/30/microsoft-introduces-control-for-direct-send-in-exchange-online.html</loc>
<lastmod>2025-04-30T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/05/01/may-2025-update-for-the-office-365-for-it-pros-ebook.html</loc>
<lastmod>2025-05-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/05/02/the-return-of-the-general-channel.html</loc>
<lastmod>2025-05-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/05/03/find-least-privileged-roles-for-delegated-graph-api-permissions.html</loc>
<lastmod>2025-05-03T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/05/04/time-for-a-new-lab-enviroment-part-1.html</loc>
<lastmod>2025-05-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/05/05/investigating-clickfix-incidents.html</loc>
<lastmod>2025-05-05T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/05/05/microsoft-extends-dlp-policy-for-copilot-to-office-apps.html</loc>
<lastmod>2025-05-05T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/05/06/how-microsoft-365-copilot-tenants-benefit-from-sharepoint-advanced-management.html</loc>
<lastmod>2025-05-06T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/05/06/how-to-restrict-device-code-flow-in-entra-id.html</loc>
<lastmod>2025-05-06T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/05/07/azure-arc-keep-your-azure-connected-machine-agent-up-to-date-on-a-windows-server.html</loc>
<lastmod>2025-05-07T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/05/07/data-strategy-breakdown-series-basic-security-hygiene-2.html</loc>
<lastmod>2025-05-07T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/05/07/defender-for-office-365-visualisation-of-the-tenant-allowblock-list-features.html</loc>
<lastmod>2025-05-07T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/05/07/how-to-permanently-remove-mailbox-items-with-the-graph-api.html</loc>
<lastmod>2025-05-07T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/05/08/the-downside-of-losing-the-exchange-mailbox-audit-search-cmdlets.html</loc>
<lastmod>2025-05-08T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/05/09/how-to-enhance-copilot-usage-data.html</loc>
<lastmod>2025-05-09T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/05/09/use-custom-extensions-for-access-package-approval-in-entra.html</loc>
<lastmod>2025-05-09T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/05/10/register-yubikeys-on-behalf-of-your-users-with-yubienroll.html</loc>
<lastmod>2025-05-10T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/05/12/eligible-pim-enabled-group-membership-via-access-packages.html</loc>
<lastmod>2025-05-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/05/12/microsoft-sentinel-ueba-2025-guide-to-behavior-analytics.html</loc>
<lastmod>2025-05-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/05/12/penetration-test-asks-questions-about-copilot-access-to-sharepoint-online.html</loc>
<lastmod>2025-05-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/05/13/entra-id-managed-identity-permissions-manager-performance-stats-and-community-in.html</loc>
<lastmod>2025-05-13T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/05/13/use-an-owa-mailbox-policy-to-block-attachment-download-for-the-new-outlook-for-w.html</loc>
<lastmod>2025-05-13T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/05/14/replacing-litigation-holds-with-microsoft-365-retention-policies.html</loc>
<lastmod>2025-05-14T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/05/15/microsoft-graph-powershell-sdk-v228-attempts-to-restore-stability.html</loc>
<lastmod>2025-05-15T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/05/16/time-to-review-how-to-preserve-ex-employee-data.html</loc>
<lastmod>2025-05-16T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/05/19/microsoft-365-copilot-gets-viva-insights-service-plans.html</loc>
<lastmod>2025-05-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/05/19/whats-new-in-windows-autopatch.html</loc>
<lastmod>2025-05-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/05/20/entra-id-admin-roles-report.html</loc>
<lastmod>2025-05-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/05/20/export-conditional-access-policy-files-with-ca-policy-copier.html</loc>
<lastmod>2025-05-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/05/20/why-copilot-access-to-restricted-passwords-isnt-as-big-an-issue-as-uploading-fil.html</loc>
<lastmod>2025-05-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/05/21/quest-tool-migrates-protected-email-and-files-between-tenants.html</loc>
<lastmod>2025-05-21T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/05/21/unlocking-the-power-of-employeehiredate-in-entra-id-dynamic-groups.html</loc>
<lastmod>2025-05-21T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/05/22/how-to-add-a-loop-workspace-to-a-standard-teams-channel.html</loc>
<lastmod>2025-05-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/05/22/m365-license-assignment-report.html</loc>
<lastmod>2025-05-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/05/23/azure-arc-introducing-aacmatoolkit-a-new-azure-arc-management-tool.html</loc>
<lastmod>2025-05-23T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/05/23/june-2025-update-for-the-automating-microsoft-365-with-powershell-ebook.html</loc>
<lastmod>2025-05-23T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/05/23/microsoft-defender-for-identity-recommended-actions-gpo-assigns-unprivileged-ide.html</loc>
<lastmod>2025-05-23T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/05/24/troubleshooting-windows-feature-updates-not-being-deploying-using-intuneautopatc.html</loc>
<lastmod>2025-05-24T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/05/25/tutorial-integrate-ai-into-your-powershell-scripts.html</loc>
<lastmod>2025-05-25T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/05/26/in-depth-series-dlp-strategy-with-microsoft-purview.html</loc>
<lastmod>2025-05-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/05/26/securing-microsoft-business-premium-part-05-efficient-identity-management-for-ex.html</loc>
<lastmod>2025-05-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/05/26/teams-tweaks-its-discover-feed.html</loc>
<lastmod>2025-05-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/05/27/microsoft-launches-agent-management-in-the-entra-admin-center.html</loc>
<lastmod>2025-05-27T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/05/28/data-strategy-breakdown-series-secure-collaboration-3.html</loc>
<lastmod>2025-05-28T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/05/28/the-case-of-the-mysterious-sharepoint-embedded-containers.html</loc>
<lastmod>2025-05-28T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/05/29/entra-id-entra-connect-secure-app-certificate-based-authentication-is-here-plus.html</loc>
<lastmod>2025-05-29T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/05/29/how-to-list-hidden-group-memberships-with-the-graph.html</loc>
<lastmod>2025-05-29T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/05/29/how-to-register-all-required-azure-compute-resource-providers-with-azure-powersh.html</loc>
<lastmod>2025-05-29T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/05/30/how-to-tell-if-entra-connect-is-using-application-based-authentication.html</loc>
<lastmod>2025-05-30T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/05/30/microsoft-launches-the-copilot-interaction-export-api.html</loc>
<lastmod>2025-05-30T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/05/31/defender-xdr-custom-detection-rules-pushpull-via-api.html</loc>
<lastmod>2025-05-31T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/05/31/in-depth-series-microsoft-entra-risky-users-and-risky-sign-ins.html</loc>
<lastmod>2025-05-31T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/06/02/june-2025-update-available-for-office-365-for-it-pros-2025-edition.html</loc>
<lastmod>2025-06-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/06/03/new-outlook-and-owa-control-for-viewing-protected-email.html</loc>
<lastmod>2025-06-03T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/06/04/mailbox-import-export-graph-apis-leave-no-audit-trail.html</loc>
<lastmod>2025-06-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/06/04/poor-mans-iga-revoke-all-refresh-tokens-for-user.html</loc>
<lastmod>2025-06-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/06/05/exchange-online-upgrades-its-message-tracing-capabilities.html</loc>
<lastmod>2025-06-05T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/06/05/how-to-enable-token-binding-with-microsoft-graph-powershell.html</loc>
<lastmod>2025-06-05T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/06/06/respond-to-teams-messages-with-multiple-emoji-reactions.html</loc>
<lastmod>2025-06-06T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/06/07/mde-troubleshooter-v161-available.html</loc>
<lastmod>2025-06-07T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/06/09/data-strategy-breakdown-series-defender-xdr-and-intune-4.html</loc>
<lastmod>2025-06-09T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/06/09/how-to-block-pst-files-for-the-new-outlook-for-windows.html</loc>
<lastmod>2025-06-09T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/06/09/microsoft-entra-restricted-management-administrative-units-delegating-control-wi.html</loc>
<lastmod>2025-06-09T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/06/10/hunting-through-apis.html</loc>
<lastmod>2025-06-10T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/06/10/poor-mans-iga-generate-temporary-access-pass-for-joiners.html</loc>
<lastmod>2025-06-10T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/06/10/say-goodbye-to-basic-authentication-in-exchange-online-what-you-need-to-know.html</loc>
<lastmod>2025-06-10T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/06/10/sharepoint-online-dumps-otp-authentication-for-sharing-links.html</loc>
<lastmod>2025-06-10T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/06/11/how-to-block-ad-hoc-email-based-subscriptions.html</loc>
<lastmod>2025-06-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/06/12/azure-update-manager-failed-to-update-a-dynamic-scope-for-resources-on-a-newly-a.html</loc>
<lastmod>2025-06-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/06/12/in-depth-series-architecting-microsoft-defender.html</loc>
<lastmod>2025-06-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/06/12/remote-speedtest-in-cli-easy-quick-network-troubleshooting.html</loc>
<lastmod>2025-06-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/06/12/when-the-invoke-mggraphrequest-cmdlet-needs-help-to-fetch-responses.html</loc>
<lastmod>2025-06-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/06/13/ai-generative-summaries-make-life-even-harder-for-technology-websites.html</loc>
<lastmod>2025-06-13T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/06/13/intune-anomalies-report.html</loc>
<lastmod>2025-06-13T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/06/13/win32-apps-not-installing-during-autopilot-device-preparation.html</loc>
<lastmod>2025-06-13T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/06/15/how-to-remove-exchange-without-breaking-hybrid-mail-management.html</loc>
<lastmod>2025-06-15T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/06/16/using-a-copilot-agent-in-sharepoint-to-interact-with-office-365-for-it-pros.html</loc>
<lastmod>2025-06-16T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/06/17/people-skills-rolling-out-within-microsoft-365.html</loc>
<lastmod>2025-06-17T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/06/18/microsoft-pushes-european-sovereign-solutions.html</loc>
<lastmod>2025-06-18T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/06/19/microsoft-to-block-users-granting-third-party-app-access-to-user-sites-and-files.html</loc>
<lastmod>2025-06-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/06/19/require-admin-consent-for-third-party-apps-accessing-files-and-sites.html</loc>
<lastmod>2025-06-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/06/19/updating-the-entra-id-custom-banned-password-list-with-powershell.html</loc>
<lastmod>2025-06-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/06/20/configure-passkey-profiles-for-group-based-passkey-restrictions.html</loc>
<lastmod>2025-06-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/06/21/introducing-azure-devops-backup-tool-1200-update-with-new-features-and-bug-fixes.html</loc>
<lastmod>2025-06-21T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/06/22/inside-my-toolkit-dev-tools-productivity-apps-and-more.html</loc>
<lastmod>2025-06-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/06/23/defender-av-mystery-solving-the-source-files-could-not-be-found.html</loc>
<lastmod>2025-06-23T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/06/23/everyone-gets-the-same-toolbox-powershell-script.html</loc>
<lastmod>2025-06-23T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/06/23/in-depth-series-mastering-dspm-in-microsoft-purview.html</loc>
<lastmod>2025-06-23T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/06/23/intune-policies-showing-error-code-2016281112.html</loc>
<lastmod>2025-06-23T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/06/23/outlooks-new-summarize-option-for-email-attachments.html</loc>
<lastmod>2025-06-23T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/06/24/autopilot-unexpected-reboot-what-really-triggers-a-device-restart-and-how-to-fix.html</loc>
<lastmod>2025-06-24T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/06/24/launch-plan-for-office-365-for-it-pros-2026-edition.html</loc>
<lastmod>2025-06-24T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/06/25/microsoft-365-powershell-modules-need-better-testing.html</loc>
<lastmod>2025-06-25T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/06/25/why-you-should-disable-seamless-sso-in-microsoft-entra-connect.html</loc>
<lastmod>2025-06-25T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/06/26/token-protection-extends-to-microsoft-graph-powershell-sdk-sessions.html</loc>
<lastmod>2025-06-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/06/27/copilot-agent-governance-product-launched-by-isv.html</loc>
<lastmod>2025-06-27T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/06/29/releasing-my-legacy-powershell-ad-service-account-tool-yes-it-still-works-great.html</loc>
<lastmod>2025-06-29T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/06/30/automating-microsoft-365-with-powershell-second-edition.html</loc>
<lastmod>2025-06-30T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/06/30/azure-arc-uninstall-the-connected-machine-agent-and-clean-up-related-resources-o.html</loc>
<lastmod>2025-06-30T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/06/30/configure-microsoft-entra-trusted-network-locations-for-better-protection.html</loc>
<lastmod>2025-06-30T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/06/30/secure-score-series-a-comprehensive-guide.html</loc>
<lastmod>2025-06-30T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/07/01/a-native-way-to-remove-default-microsoft-store-packages.html</loc>
<lastmod>2025-07-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/07/01/announcing-office-365-for-it-pros-2026-edition.html</loc>
<lastmod>2025-07-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/07/01/how-the-ime-cleans-up-the-imecache-folder.html</loc>
<lastmod>2025-07-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/07/02/data-strategy-breakdown-series-entra-id-5.html</loc>
<lastmod>2025-07-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/07/02/microsoft-defender-attack-simulation-training-boosting-real-world-security-aware.html</loc>
<lastmod>2025-07-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/07/02/microsoft-launches-new-way-to-consume-documentation.html</loc>
<lastmod>2025-07-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/07/03/how-to-ensure-microsoft-entra-licensing-compliance.html</loc>
<lastmod>2025-07-03T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/07/03/new-outlook-for-windows-support-for-export-to-pst.html</loc>
<lastmod>2025-07-03T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/07/04/exchange-server-subscription-edition-now-generally-available.html</loc>
<lastmod>2025-07-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/07/04/kb-we-detected-that-this-particular-key-type-has-been-blocked-by-your-organizati.html</loc>
<lastmod>2025-07-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/07/04/transition-from-microsoft-sentinel-to-defender-xdr-practical-challenges.html</loc>
<lastmod>2025-07-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/07/05/workload-identities-from-attack-to-defense-with-microsoft-security.html</loc>
<lastmod>2025-07-05T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/07/06/how-to-secure-redirect-uris-in-microsoft-entra-id-applications.html</loc>
<lastmod>2025-07-06T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/07/07/copilot-audio-overviews-for-onedrive-documents.html</loc>
<lastmod>2025-07-07T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/07/07/microsofts-evolving-zero-trust-strategy-in-2025.html</loc>
<lastmod>2025-07-07T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/07/08/configuring-m365-company-branding-38-privacy-settings-simple-tricks-to-reduce-ph.html</loc>
<lastmod>2025-07-08T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/07/08/copying-group-membership-with-the-microsoft-graph-powershell-sdk.html</loc>
<lastmod>2025-07-08T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/07/08/poor-mans-iga-monitor-and-clean-up-stale-guest-accounts.html</loc>
<lastmod>2025-07-08T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/07/08/shedding-light-on-dormant-sensitive-accounts.html</loc>
<lastmod>2025-07-08T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/07/09/improving-the-processing-of-protected-messages-in-shared-mailboxes.html</loc>
<lastmod>2025-07-09T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/07/09/microsoft-to-remove-personal-account-requirement-for-microsoft-authenticator-bac.html</loc>
<lastmod>2025-07-09T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/07/10/easier-configuration-promised-for-the-microsoft-authenticator-app.html</loc>
<lastmod>2025-07-10T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/07/11/entra-id-governance-deep-dive-1.html</loc>
<lastmod>2025-07-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/07/11/entra-id-governance-deep-dive-2.html</loc>
<lastmod>2025-07-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/07/11/entra-id-governance-deep-dive.html</loc>
<lastmod>2025-07-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/07/11/in-depth-series-shadow-ids-workload-security-in-entra.html</loc>
<lastmod>2025-07-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/07/11/microsoft-graph-powershell-sdk-v229-now-available.html</loc>
<lastmod>2025-07-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/07/12/my-first-year-as-a-microsoft-mvp.html</loc>
<lastmod>2025-07-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/07/13/microsoft-defender-for-identity-recommended-actions-remove-access-rights-on-susp.html</loc>
<lastmod>2025-07-13T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/07/14/azure-update-manager-register-all-required-resource-providers-with-a-powershell.html</loc>
<lastmod>2025-07-14T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/07/14/hunting-through-apis-logic-app-edition.html</loc>
<lastmod>2025-07-14T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/07/14/managing-pim-enabled-groups-with-entra-id-governance-access-packages-just-got-be.html</loc>
<lastmod>2025-07-14T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/07/14/microsoft-365-copilot-search-rolling-out.html</loc>
<lastmod>2025-07-14T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/07/15/conditional-access-gone-too-far-navigating-zero-trust-edge-cases.html</loc>
<lastmod>2025-07-15T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/07/15/copilot-studio-agent-vulnerability-to-prompt-injection.html</loc>
<lastmod>2025-07-15T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/07/15/intune-vtpm-and-mdm-enrollment-version-60-what-you-need-to-know.html</loc>
<lastmod>2025-07-15T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/07/16/defender-for-office-365-auto-remediation-of-malicious-messages-air.html</loc>
<lastmod>2025-07-16T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/07/16/exchange-online-reduces-delicensing-resiliency-threshold-to-5000-mailboxes.html</loc>
<lastmod>2025-07-16T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/07/17/microsoft-introduces-exchange-20162019-extended-security-program.html</loc>
<lastmod>2025-07-17T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/07/18/how-to-find-all-inactive-guests-in-microsoft-365.html</loc>
<lastmod>2025-07-18T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/07/18/teams-gains-new-accent-colors.html</loc>
<lastmod>2025-07-18T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/07/19/how-to-not-mess-up-your-microsoft-sentinel-deployment.html</loc>
<lastmod>2025-07-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/07/20/microsoft-to-streamline-the-same-device-sign-in-experience-for-microsoft-authent.html</loc>
<lastmod>2025-07-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/07/21/changes-coming-to-smoothen-edges-in-microsoft-authenticator-app.html</loc>
<lastmod>2025-07-21T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/07/21/remove-default-microsoft-store-apps-prevents-provisioning-for-new-users-only.html</loc>
<lastmod>2025-07-21T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/07/21/streamline-your-git-workflow-semi-automated-branch-cleanup-with-powershell.html</loc>
<lastmod>2025-07-21T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/07/22/be-careful-with-retention-labels-configured-with-created-date-expiration.html</loc>
<lastmod>2025-07-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/07/22/beyondtrust-breaking-autopilot-8018000a.html</loc>
<lastmod>2025-07-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/07/22/planned-change-prevents-microsoft-tenant-domain-enumeration.html</loc>
<lastmod>2025-07-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/07/22/quick-machine-recovery-built-in-resilience-for-windows-24h2.html</loc>
<lastmod>2025-07-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/07/23/how-to-remove-members-from-microsoft-365-groups-with-powershell.html</loc>
<lastmod>2025-07-23T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/07/24/entra-id-introduces-linkable-token-identifiers-for-audit-events.html</loc>
<lastmod>2025-07-24T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/07/24/microsoft-makes-token-protection-available-for-entra-id-p1-licenses.html</loc>
<lastmod>2025-07-24T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/07/25/new-outlook-for-windows-enables-smime-inheritance-control.html</loc>
<lastmod>2025-07-25T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/07/27/intune-remote-wipe-ending-up-in-something-went-wrong-0x800f0991.html</loc>
<lastmod>2025-07-27T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/07/28/ai-access-governance-in-m365-detect-sensitive-prompts-and-output.html</loc>
<lastmod>2025-07-28T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/07/28/august-2025-update-for-automating-microsoft-365-with-powershell-ebook.html</loc>
<lastmod>2025-07-28T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/07/28/how-to-block-upload-to-wetransfer-dropbox-google-drive-but-allowing-download-usi.html</loc>
<lastmod>2025-07-28T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/07/28/microsoft-sentinel-data-lake-faq.html</loc>
<lastmod>2025-07-28T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/07/29/azure-arc-troubleshoot-azure-connected-machine-agent-connectivity-issues.html</loc>
<lastmod>2025-07-29T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/07/29/download-intunewin-win32-app-files-directly-from-intune.html</loc>
<lastmod>2025-07-29T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/07/29/entra-id-governance-levies-charges-for-guest-accounts.html</loc>
<lastmod>2025-07-29T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/07/29/important-changes-to-conditional-access-policies-for-azure-devops-sign-ins.html</loc>
<lastmod>2025-07-29T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/07/29/legacy-mfa-38-sspr-are-retiring-how-to-migrate-mfa-and-sspr-settings-to-the-auth.html</loc>
<lastmod>2025-07-29T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/07/30/dynamic-approval-in-entra-id-access-packages-using-custom-extensions.html</loc>
<lastmod>2025-07-30T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/07/30/how-to-block-owa-and-use-the-new-outlook.html</loc>
<lastmod>2025-07-30T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/07/30/microsoft-sentinel-data-lake-how-to-useenable-and-set-up-the-unified-data-lake.html</loc>
<lastmod>2025-07-30T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/07/31/dlp-diagnostics-available-in-purview-portal.html</loc>
<lastmod>2025-07-31T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/08/01/how-to-secure-your-enterprise-application-via-pim.html</loc>
<lastmod>2025-08-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/08/01/monthly-update-122-available-for-office-365-for-it-pros-ebook.html</loc>
<lastmod>2025-08-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/08/04/blocking-risky-users-with-passwordless-authentication-methods.html</loc>
<lastmod>2025-08-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/08/04/how-microsoft-graph-powershell-sdk-access-tokens-work.html</loc>
<lastmod>2025-08-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/08/04/how-to-store-defender-xdr-data-for-years-in-sentinel-data-lake-without-expensive.html</loc>
<lastmod>2025-08-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/08/04/pimactivation-the-ultimate-tool-for-microsoft-entra-pim-bulk-role-activation.html</loc>
<lastmod>2025-08-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/08/05/creating-a-microsoft-365-retention-policy-for-shared-mailboxes.html</loc>
<lastmod>2025-08-05T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/08/05/defender-for-cloud-apps-do-you-know-what-saas-apps-are-being-used-in-the-organiz-1.html</loc>
<lastmod>2025-08-05T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/08/05/defender-for-cloud-apps-do-you-know-what-saas-apps-are-being-used-in-the-organiz.html</loc>
<lastmod>2025-08-05T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/08/05/defender-for-cloud-apps-do-you-know-what-saas-apps.html</loc>
<lastmod>2025-08-05T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/08/05/microsoft-entra-connect-migration-to-application-based-authentication-aba.html</loc>
<lastmod>2025-08-05T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/08/06/microsoft-introduces-copilot-memory.html</loc>
<lastmod>2025-08-06T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/08/06/microsoft-to-roll-out-automatic-registration-for-external-authentication-methods.html</loc>
<lastmod>2025-08-06T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/08/07/microsoft-tells-hybrid-exchange-customers-to-get-going-with-dedicated-hybrid-con.html</loc>
<lastmod>2025-08-07T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/08/08/best-practice-for-configuring-privileged-identity-management-in-microsoft-entra.html</loc>
<lastmod>2025-08-08T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/08/08/teams-gets-a-keyql-powered-search-box.html</loc>
<lastmod>2025-08-08T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/08/11/how-to-enforce-macro-security-by-running-only-excel-macros-signed-with-your-own.html</loc>
<lastmod>2025-08-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/08/11/unexpected-microsoft-defender-for-office-365-license-requirement-for-shared-mail.html</loc>
<lastmod>2025-08-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/08/12/azure-governance-managing-decommissioned-azure-subscriptions-with-a-dedicated-ma.html</loc>
<lastmod>2025-08-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/08/12/conditional-access-essentials-introduction-use-cases-the-art-of-possible.html</loc>
<lastmod>2025-08-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/08/12/how-to-visualise-microsoft-entra-mfa-sign-in-metrics-with-powershell.html</loc>
<lastmod>2025-08-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/08/12/maintaining-a-microsoft-365-retention-policy-with-powershell.html</loc>
<lastmod>2025-08-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/08/13/purview-priority-cleanup-expands-to-sharepoint-and-onedrive.html</loc>
<lastmod>2025-08-13T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/08/13/script-sentinel-data-lake-table-management.html</loc>
<lastmod>2025-08-13T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/08/13/windows-hello-pin-stops-working-after-the-windows-11-24h2-upgrade.html</loc>
<lastmod>2025-08-13T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/08/14/detect-threats-using-graphapiauditevents-part-3.html</loc>
<lastmod>2025-08-14T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/08/14/microsoft-cancels-access-package-visibility-changes.html</loc>
<lastmod>2025-08-14T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/08/14/sensitivity-labels-with-user-defined-permissions-gain-sharepoint-support.html</loc>
<lastmod>2025-08-14T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/08/14/unified-rbac-in-microsoft-defender-xdr-simpler-secops-fewer-highpriv-roles.html</loc>
<lastmod>2025-08-14T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/08/15/mobile-device-management-options-disappear-from-owa-and-the-new-outlook.html</loc>
<lastmod>2025-08-15T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/08/17/recommended-settings-for-windows-laps-with-intune.html</loc>
<lastmod>2025-08-17T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/08/18/entra-id-managed-identity-permission-manager-a-community-driven-recap.html</loc>
<lastmod>2025-08-18T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/08/18/graphapiauditevents-the-new-graph-api-logs.html</loc>
<lastmod>2025-08-18T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/08/18/mastering-microsoft-entra-authentication-contexts-part-1-what-they-are-why-they.html</loc>
<lastmod>2025-08-18T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/08/18/microsoft-defender-for-identity-recommended-actions-remove-local-admins-on-ident.html</loc>
<lastmod>2025-08-18T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/08/18/microsoft-defender-for-office-365-shared-mailboxes-and-microsoft-365-groups.html</loc>
<lastmod>2025-08-18T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/08/19/a-first-look-at-microsoft-entra-private-access-for-active-directory-domain-contr.html</loc>
<lastmod>2025-08-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/08/19/conditional-access-essentials-naming-conventions-personas-emergency-access-38-de.html</loc>
<lastmod>2025-08-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/08/19/unverified-sender-messages-highlighted-by-outlook-mobile.html</loc>
<lastmod>2025-08-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/08/20/removing-obsolete-mobile-device-partnerships-from-exchange-online.html</loc>
<lastmod>2025-08-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/08/20/summer-recap-time-to-reconnect.html</loc>
<lastmod>2025-08-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/08/21/endpoint-privilege-management-virtual-elevation-acccount-support.html</loc>
<lastmod>2025-08-21T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/08/21/microsoft-defender-xdr-take-action-on-advanced-hunting-results.html</loc>
<lastmod>2025-08-21T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/08/21/multi-admin-approval-extends-to-device-reset-options-in-intune.html</loc>
<lastmod>2025-08-21T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/08/21/reporting-authentication-method-usage-data-via-the-graph.html</loc>
<lastmod>2025-08-21T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/08/22/configure-whether-requestors-can-see-access-package-approver-details.html</loc>
<lastmod>2025-08-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/08/22/microsoft-defender-xdr-take-action-on-advanced-hunting-results.html</loc>
<lastmod>2025-08-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/08/22/microsoft-fixes-copilot-audit-records.html</loc>
<lastmod>2025-08-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/08/22/userless-enrollment-status-in-autopilot-how-to-unblock-devices.html</loc>
<lastmod>2025-08-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/08/23/modern-outlookteams-fails-with-webview2-error-seen-on-win11-arm.html</loc>
<lastmod>2025-08-23T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/08/24/entra-id-bulk-user-download-enhanced-experience.html</loc>
<lastmod>2025-08-24T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/08/24/finding-seamless-sso-usage.html</loc>
<lastmod>2025-08-24T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/08/25/find-and-restore-deleted-cross-tenant-access-policies.html</loc>
<lastmod>2025-08-25T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/08/25/microsoft-365-tenants-need-vanity-domains-to-send-external-email.html</loc>
<lastmod>2025-08-25T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/08/25/remove-old-or-orphaned-sentinels-from-the-xdr-streaming-api.html</loc>
<lastmod>2025-08-25T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/08/26/autopilot-enrollment-fails-after-terms-of-use-acceptance.html</loc>
<lastmod>2025-08-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/08/26/conditional-access-essentials-rmaus-named-locations-authentication-strengths-ser.html</loc>
<lastmod>2025-08-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/08/26/microsoft-sentinel-data-lake-tier-deep-dive-and-comparison.html</loc>
<lastmod>2025-08-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/08/26/summarize-email-thread-feature-coming-to-outlook.html</loc>
<lastmod>2025-08-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/08/26/windows-autopatch-client-broker-what-it-is-when-to-use-it-and-why-it-matters.html</loc>
<lastmod>2025-08-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/08/27/guidance-on-how-to-manage-products-updates-for-defender-for-server-on-linux-dist.html</loc>
<lastmod>2025-08-27T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/08/27/how-to-delegate-access-package-approvals-in-my-access.html</loc>
<lastmod>2025-08-27T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/08/27/maesterdiff-because-comparing-maesters-just-got-twice-as-fun.html</loc>
<lastmod>2025-08-27T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/08/27/september-2025-update-for-automating-microsoft-365-with-powershell.html</loc>
<lastmod>2025-08-27T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/08/27/windows-backup-for-organizations-esr-20-with-a-new-skin.html</loc>
<lastmod>2025-08-27T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/08/28/teams-gives-users-control-over-hiding-inactive-channels.html</loc>
<lastmod>2025-08-28T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/08/29/creating-and-using-an-azure-automation-custom-runtime-environment.html</loc>
<lastmod>2025-08-29T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/08/29/security-info-registration-entra-ids-rabbit-hole.html</loc>
<lastmod>2025-08-29T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/09/01/aitm-mfa-phishing-attacks-in-combination-with-new-microsoft-protections-2025-edi.html</loc>
<lastmod>2025-09-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/09/01/september-2025-update-for-office-365-for-it-pros.html</loc>
<lastmod>2025-09-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/09/01/what-is-entra-docs-tracker.html</loc>
<lastmod>2025-09-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/09/02/bitlocker-policies-not-getting-applied-in-intune-65000.html</loc>
<lastmod>2025-09-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/09/02/closing-microsoft-graph-gaps-my-feedback-portal-request-gains-top-3-in-just-4-da.html</loc>
<lastmod>2025-09-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/09/02/conditional-access-essentials-authentication-contexts-secure-pim-38-resource-acc.html</loc>
<lastmod>2025-09-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/09/02/entra-useless-insights-report.html</loc>
<lastmod>2025-09-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/09/02/microsoft-deprecates-graph-cli-and-toolkit.html</loc>
<lastmod>2025-09-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/09/02/protect-security-info-registration-with-microsoft-entra-conditional-access-and-m.html</loc>
<lastmod>2025-09-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/09/03/microsoft-explains-the-differences-between-copilot-memories.html</loc>
<lastmod>2025-09-03T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/09/04/people-settings-appear-in-the-microsoft-365-admin-center.html</loc>
<lastmod>2025-09-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/09/04/windows-autopilot-installing-windows-updates-during-setup-oobe.html</loc>
<lastmod>2025-09-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/09/04/windows-autopilot-stuck-on-identifying-the-kb5065848-story.html</loc>
<lastmod>2025-09-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/09/05/how-to-update-entra-id-apps-to-run-teams-cmdlets.html</loc>
<lastmod>2025-09-05T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/09/06/collect-microsoft-entra-connect-sync-audit-events.html</loc>
<lastmod>2025-09-06T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/09/08/microsoft-bolts-on-copilot-license-check-onto-exrca.html</loc>
<lastmod>2025-09-08T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/09/08/use-entrasort-to-sort-the-microsoft-entra-menu-alphabetically.html</loc>
<lastmod>2025-09-08T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/09/09/conditional-access-essentials-managing-exclusions-with-identity-governance-and-t.html</loc>
<lastmod>2025-09-09T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/09/09/improving-passkey-registration-experiences.html</loc>
<lastmod>2025-09-09T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/09/09/microsofts-push-to-save-office-files-in-the-cloud.html</loc>
<lastmod>2025-09-09T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/09/09/whats-next-for-visual-studio-2026-v18.html</loc>
<lastmod>2025-09-09T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/09/09/you-shall-not-passkey-updated.html</loc>
<lastmod>2025-09-09T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/09/10/microsofts-effort-to-develop-a-broad-people-platform.html</loc>
<lastmod>2025-09-10T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/09/11/running-the-sharepoint-site-content-and-policy-comparison-report.html</loc>
<lastmod>2025-09-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/09/11/signtool-gui-2000-major-update-out-now.html</loc>
<lastmod>2025-09-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/09/12/running-teams-powershell-cmdlets-in-azure-automation.html</loc>
<lastmod>2025-09-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/09/14/offensive-ai.html</loc>
<lastmod>2025-09-14T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/09/15/copilot-transcription-behavior-changing-for-teams-meetings.html</loc>
<lastmod>2025-09-15T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/09/15/how-to-actually-security-benchmark-your-microsoft-365-tenant.html</loc>
<lastmod>2025-09-15T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/09/15/prevent-shadowai-with-defender-for-cloud-apps.html</loc>
<lastmod>2025-09-15T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/09/16/copilot-administrative-skills-dont-do-much-for-sharepoint-management.html</loc>
<lastmod>2025-09-16T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/09/16/entra-id-when-ideas-become-features-reflections-on-entra-id-app-policies.html</loc>
<lastmod>2025-09-16T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/09/16/understanding-the-default-compliance-policy-whats-changed-and-why-devices-stay-c.html</loc>
<lastmod>2025-09-16T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/09/17/entra-ids-keep-me-signed-in-feature-good-or-bad.html</loc>
<lastmod>2025-09-17T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/09/17/recommended-application-policies-for-microsoft-entra-apps.html</loc>
<lastmod>2025-09-17T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/09/18/whats-the-best-way-to-manage-guest-accounts.html</loc>
<lastmod>2025-09-18T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/09/19/copilot-chat-arrives-in-microsoft-365-apps.html</loc>
<lastmod>2025-09-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/09/19/should-you-upgrade-to-exchange-se-or-remove-your-last-server.html</loc>
<lastmod>2025-09-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/09/21/azure-back-to-school-2025-azure-arc-under-the-hood-troubleshooting-the-azure-con.html</loc>
<lastmod>2025-09-21T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/09/22/automating-microsoft-365-with-powershell-october-2025-update.html</loc>
<lastmod>2025-09-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/09/22/departmental-risk-based-segmentation-with-purview-and-entra.html</loc>
<lastmod>2025-09-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/09/22/no-your-nhis-cant-use-passwords-either.html</loc>
<lastmod>2025-09-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/09/23/microsoft-defender-for-identity-recommended-actions-remove-non-admin-accounts-wi.html</loc>
<lastmod>2025-09-23T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/09/23/updating-the-user-password-and-authentication-report.html</loc>
<lastmod>2025-09-23T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/09/24/assembly-clashes-make-microsoft-365-powershell-frustrating.html</loc>
<lastmod>2025-09-24T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/09/24/how-to-configure-password-protection-with-microsoft-graph.html</loc>
<lastmod>2025-09-24T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/09/25/sharepoint-knowledge-agent-available-in-preview.html</loc>
<lastmod>2025-09-25T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/09/26/microsoft-use-of-anthropic-ai-models-creates-concerns-for-tenants.html</loc>
<lastmod>2025-09-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/09/28/how-to-configure-lifecycle-workflows-for-inactive-users.html</loc>
<lastmod>2025-09-28T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/09/29/how-to-restore-deleted-conditional-access-policies.html</loc>
<lastmod>2025-09-29T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/09/29/mastering-microsoft-entra-authentication-contexts-part-2-real-world-access-38-ac.html</loc>
<lastmod>2025-09-29T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/09/29/the-ultimate-defender-xdr-rbac-visualization.html</loc>
<lastmod>2025-09-29T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/09/29/using-the-enterprise-website-microsoft-365-copilot-connector.html</loc>
<lastmod>2025-09-29T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/09/30/january-2026-change-for-how-outlook-extracts-events-from-email.html</loc>
<lastmod>2025-09-30T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/09/30/why-do-required-apps-wait-60-minutes-after-autopilot-enrollment.html</loc>
<lastmod>2025-09-30T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/10/01/important-changes-to-hybridbrotherscom.html</loc>
<lastmod>2025-10-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/10/01/office-365-for-it-pros-october-2025-update.html</loc>
<lastmod>2025-10-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/10/02/autopilot-device-preparation-and-the-return-of-oobe-controls.html</loc>
<lastmod>2025-10-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/10/02/how-to-convert-a-synced-user-source-of-authority-to-microsoft-entra.html</loc>
<lastmod>2025-10-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/10/02/teams-stamps-external-users-with-trust-indicators.html</loc>
<lastmod>2025-10-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/10/03/microsoft-introduces-restore-capability-for-conditional-access-policies.html</loc>
<lastmod>2025-10-03T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/10/04/entra-id-soft-delete-restore-for-conditional-access-new-powershell-module.html</loc>
<lastmod>2025-10-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/10/04/microsoft-defender-for-endpoint-getting-started-with-deployment-using-intune.html</loc>
<lastmod>2025-10-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/10/06/application-registration-secrets-fire-forget.html</loc>
<lastmod>2025-10-06T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/10/06/how-to-restore-deleted-entra-id-conditional-access-policies-and-named-locations.html</loc>
<lastmod>2025-10-06T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/10/06/whats-the-best-way-to-find-sharepoint-online-sites-with-graph-powershell.html</loc>
<lastmod>2025-10-06T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/10/07/chromium-141-update-will-affect-offline-access-for-sharepoint-online-and-onedriv.html</loc>
<lastmod>2025-10-07T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/10/07/conditional-access-essentials-custom-security-attributes-in-entra-id-and-cross-t.html</loc>
<lastmod>2025-10-07T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/10/07/the-truth-about-the-8-hour-intune-sync-and-why-its-a-myth.html</loc>
<lastmod>2025-10-07T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/10/08/teams-support-for-emojis-in-chat-and-channels-section-names.html</loc>
<lastmod>2025-10-08T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/10/09/exchange-2016-and-2019-end-of-life-and-some-interesting-exchange-online-developm.html</loc>
<lastmod>2025-10-09T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/10/10/microsoft-365-copilot-usage-report-api-general-availability.html</loc>
<lastmod>2025-10-10T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/10/10/practical-detection-engineering.html</loc>
<lastmod>2025-10-10T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/10/10/real-time-protection-for-ai-agents.html</loc>
<lastmod>2025-10-10T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/10/11/defender-xdr-vs-microsoft-sentinel-table-changes.html</loc>
<lastmod>2025-10-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/10/11/kb-failed-to-verify-domain-name-entra-id.html</loc>
<lastmod>2025-10-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/10/11/trigger-logic-app-on-group-membership-changes-in-entra-id.html</loc>
<lastmod>2025-10-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/10/12/configuring-conditional-access-for-guest-users-allowing-only-office-365-and-esse.html</loc>
<lastmod>2025-10-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/10/12/msrc-case-when-temporary-global-admin-rights-dont-expire-in-microsoft-entra-pim.html</loc>
<lastmod>2025-10-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/10/13/chatgpt-enterprise-connects-to-sharepoint-online.html</loc>
<lastmod>2025-10-13T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/10/13/microsoft-privileged-access-workstations-a-comprehensive-guide.html</loc>
<lastmod>2025-10-13T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/10/14/changing-the-offline-access-period-for-sensitivity-labels.html</loc>
<lastmod>2025-10-14T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/10/14/conditional-access-essentials-from-report-only-to-enforced-mode.html</loc>
<lastmod>2025-10-14T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/10/14/mastering-certificate-rotation-in-entra-id.html</loc>
<lastmod>2025-10-14T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/10/14/windows-finally-translates-entra-group-and-role-sids-to-real-names.html</loc>
<lastmod>2025-10-14T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/10/15/the-my-sign-ins-portal-applications-and-conditional-access.html</loc>
<lastmod>2025-10-15T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/10/16/using-the-secret-management-powershell-module-with-azure-key-vault-and-azure-aut.html</loc>
<lastmod>2025-10-16T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/10/17/extending-the-migrate2gsa-powershell-module-why-i-added-json-support.html</loc>
<lastmod>2025-10-17T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/10/17/outlook-gets-ai-drafting-of-meeting-agendas.html</loc>
<lastmod>2025-10-17T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/10/18/a-closer-look-at-entra-application-policies-to-govern-secrets-and-certificates.html</loc>
<lastmod>2025-10-18T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/10/18/conditional-access-baseline-october-2025-v2025-10-available-on-github.html</loc>
<lastmod>2025-10-18T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/10/19/the-history-of-intune-from-oma-dm-to-modern-windows-management.html</loc>
<lastmod>2025-10-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/10/20/a-public-bug-report-for-entra-id-application-policies.html</loc>
<lastmod>2025-10-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/10/20/balancing-control-and-convenience-preventing-edge-password-sync-on-unmanaged-dev.html</loc>
<lastmod>2025-10-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/10/20/mastering-microsoft-entra-authentication-contexts-part-3-advanced-data-protectio.html</loc>
<lastmod>2025-10-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/10/20/new-audio-only-recording-option-for-teams-meetings.html</loc>
<lastmod>2025-10-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/10/21/automating-microsoft-365-with-powershell-november-2025-update.html</loc>
<lastmod>2025-10-21T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/10/21/how-to-hide-enterprise-apps-from-entra-with-non-privileged-access.html</loc>
<lastmod>2025-10-21T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/10/21/physical-security-cards-phish-resistant-authentication.html</loc>
<lastmod>2025-10-21T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/10/22/important-change-coming-for-entra-id-passkeys-in-november-2025.html</loc>
<lastmod>2025-10-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/10/22/mmp-c-the-future-of-windows-device-management-with-intune.html</loc>
<lastmod>2025-10-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/10/22/remotely-intune-wipe-devices-in-defender-for-endpoint-isolation-mode.html</loc>
<lastmod>2025-10-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/10/23/configure-browser-policy-to-preserve-onedrive-and-sharepoint-web-performance-and.html</loc>
<lastmod>2025-10-23T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/10/23/hp-oneagent-update-broke-entra-trust-on-hp-ai-devices.html</loc>
<lastmod>2025-10-23T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/10/23/updating-the-entra-id-password-protection-policy-with-the-microsoft-graph-powers.html</loc>
<lastmod>2025-10-23T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/10/24/allowing-users-to-add-enterprise-apps-to-entra-id-is-a-bad-idea.html</loc>
<lastmod>2025-10-24T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/10/25/disable-entra-connect-seamless-sso-step-by-step-guide.html</loc>
<lastmod>2025-10-25T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/10/25/how-to-find-all-gallery-applications-in-microsoft-entra.html</loc>
<lastmod>2025-10-25T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/10/26/dynamic-conditional-access-policies-using-custom-security-attributes.html</loc>
<lastmod>2025-10-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/10/27/how-to-use-managed-identity-for-multi-tenant-microsoft-teams-authentication.html</loc>
<lastmod>2025-10-27T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/10/27/stealing-access-token-secrets-from-teams-is-hard-unless-a-workstation-is-comprom.html</loc>
<lastmod>2025-10-27T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/10/28/auto-updating-teams-work-location-is-not-employee-monitoring.html</loc>
<lastmod>2025-10-28T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/10/28/governing-access-to-app-stores-in-microsoft-365-apps.html</loc>
<lastmod>2025-10-28T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/10/28/kb-enable-single-sign-on-for-windows-365-cloud-pc.html</loc>
<lastmod>2025-10-28T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/10/28/security-incidents-that-exposed-a-weak-link-in-entra-id-applications.html</loc>
<lastmod>2025-10-28T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/10/29/Why-your-apps-doesnt-show.html</loc>
<lastmod>2025-10-29T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/10/29/bringing-order-to-microsofts-fastmoving-copilot-rollout-in-microsoft-365.html</loc>
<lastmod>2025-10-29T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/10/29/modernizing-sensitivity-label-grouping-for-app-display.html</loc>
<lastmod>2025-10-29T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/10/30/how-to-find-inactive-authentication-methods-in-microsoft-entra.html</loc>
<lastmod>2025-10-30T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/10/30/using-the-sharepoint-site-attestation-policy.html</loc>
<lastmod>2025-10-30T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/10/31/microsoft-defender-for-identity-recommended-actions-gpo-can-be-modified-by-unpri.html</loc>
<lastmod>2025-10-31T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/10/31/microsoft-issues-updated-guidance-for-defender-for-office-365-licensing.html</loc>
<lastmod>2025-10-31T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/11/03/2025-microsoft-defender-optimization-configuration-cheat-sheet.html</loc>
<lastmod>2025-11-03T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/11/03/how-to-export-microsoft-purview-permissions-rbac-roles-easily.html</loc>
<lastmod>2025-11-03T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/11/03/mastering-microsoft-entra-authentication-contexts-part-4-monitoring-and-reportin.html</loc>
<lastmod>2025-11-03T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/11/03/office-365-for-it-pros-november-2025-update.html</loc>
<lastmod>2025-11-03T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/11/04/microsoft-wont-dump-outlook-for-a-new-ai-client.html</loc>
<lastmod>2025-11-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/11/04/secure-access-to-azure-vm-s-with-bastion-and-phisi.html</loc>
<lastmod>2025-11-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/11/04/secure-access-to-azure-vms-with-bastion-and-phishing-resistant-mfa.html</loc>
<lastmod>2025-11-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/11/04/secure-access-to-azure-vms-with-bastion-and-phising-resistant-mfa.html</loc>
<lastmod>2025-11-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/11/05/microsoft-365-companion-apps-fail-to-impress.html</loc>
<lastmod>2025-11-05T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/11/06/restore-deleted-cloud-security-groups-in-microsoft-entra.html</loc>
<lastmod>2025-11-06T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/11/06/updating-entra-id-applications-for-on-premises-services-a-real-world-tested-appr.html</loc>
<lastmod>2025-11-06T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/11/06/version-15-of-the-microsoft-365-user-password-and-authentication-report.html</loc>
<lastmod>2025-11-06T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/11/06/watchtra-automated-attribute-compliance-for-microsoft-entra-id.html</loc>
<lastmod>2025-11-06T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/11/07/reporting-the-use-of-emojis-in-teams-reactions.html</loc>
<lastmod>2025-11-07T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/11/10/teams-gains-ability-to-start-chat-with-email-address.html</loc>
<lastmod>2025-11-10T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/11/11/a-brief-history-of-soft-deleted-entra-id-groups.html</loc>
<lastmod>2025-11-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/11/11/how-to-stay-up-to-date-with-microsoft-365-updates.html</loc>
<lastmod>2025-11-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/11/11/how-to-use-pim-with-rbac-roles-purview-exchange-and-more.html</loc>
<lastmod>2025-11-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/11/11/practical-detection-engineering.html</loc>
<lastmod>2025-11-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/11/12/auditing-claude-usage-with-the-copilot-researcher-agent.html</loc>
<lastmod>2025-11-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/11/12/how-to-setup-synced-passkeys-for-your-icloud-keychain.html</loc>
<lastmod>2025-11-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/11/12/new-entra-account-recovery-feature-with-identity-verification.html</loc>
<lastmod>2025-11-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/11/13/microsoft-azure-attestation-the-next-step-in-compliance.html</loc>
<lastmod>2025-11-13T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/11/13/microsoft-makes-another-change-to-teams-channel-email-storage-location.html</loc>
<lastmod>2025-11-13T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/11/13/why-user-install-behavior-doesnt-mean-a-user-install.html</loc>
<lastmod>2025-11-13T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/11/14/copilots-temporary-chat.html</loc>
<lastmod>2025-11-14T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/11/14/monitoring-azure-access-elevation-in-entra-id.html</loc>
<lastmod>2025-11-14T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/11/14/the-hidden-microsoft-entra-pim-urls-microsoft-never-documented-even-when-restric.html</loc>
<lastmod>2025-11-14T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/11/16/microsoft-defender-for-identity-recommended-actions-built-in-active-directory-gu.html</loc>
<lastmod>2025-11-16T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/11/17/microsoft-managed-risk-remediation.html</loc>
<lastmod>2025-11-17T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/11/17/powershell-script-support-added-for-win32-intune-app-deployment.html</loc>
<lastmod>2025-11-17T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/11/17/removing-inactive-entra-id-user-accounts-with-powershell.html</loc>
<lastmod>2025-11-17T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/11/18/entra-id-synced-passkeys-and-security-considerations.html</loc>
<lastmod>2025-11-18T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/11/18/microsoft-launches-preview-of-exchange-admin-api.html</loc>
<lastmod>2025-11-18T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/11/18/what-is-microsoft-entra-agent-id.html</loc>
<lastmod>2025-11-18T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/11/18/windows-recovery-and-remediation.html</loc>
<lastmod>2025-11-18T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/11/19/how-to-create-an-agent-identity-blueprint-with-graph-powershell.html</loc>
<lastmod>2025-11-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/11/19/intelligent-local-access-deep-dive.html</loc>
<lastmod>2025-11-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/11/19/microsoft-365-announcements-at-ignite-2025.html</loc>
<lastmod>2025-11-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/11/20/how-to-create-an-agent-identity-with-microsoft-graph-powershell.html</loc>
<lastmod>2025-11-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/11/20/kb-windows-11-advanced-passkey-settings.html</loc>
<lastmod>2025-11-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/11/20/microsoft-defender-for-identity-recommended-actions-change-password-for-krbtgt-a.html</loc>
<lastmod>2025-11-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/11/20/microsoft-defender-for-identity-recommended-actions-change-password-of-built-in.html</loc>
<lastmod>2025-11-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/11/20/purview-launches-new-dlp-policy-for-copilot-prompts.html</loc>
<lastmod>2025-11-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/11/20/the-hidden-risks-of-entra-id-application-ownership-part-1.html</loc>
<lastmod>2025-11-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/11/20/troubleshoot-configured-defender-av-settings-with-effective-settings-in-defender.html</loc>
<lastmod>2025-11-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/11/21/automating-microsoft-365-with-powershell-december-2025-update.html</loc>
<lastmod>2025-11-21T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/11/21/defender-for-endpoint-custom-data-collection-rules.html</loc>
<lastmod>2025-11-21T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/11/21/microsoft-defender-for-identity-recommended-actions-ensure-that-all-privileged-a.html</loc>
<lastmod>2025-11-21T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/11/22/defender-for-endpoint-custom-data-collection-rules.html</loc>
<lastmod>2025-11-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/11/22/defender-for-identity-automatic-windows-event-auditing-configuration.html</loc>
<lastmod>2025-11-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/11/22/microsoft-intune-multi-admin-approval-securing-device-actions-such-as-wipe-retir.html</loc>
<lastmod>2025-11-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/11/23/autopilot-device-association.html</loc>
<lastmod>2025-11-23T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/11/24/store-your-microsoft-365-passkeys-in-1password.html</loc>
<lastmod>2025-11-24T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/11/24/teams-messaging-gains-new-protections.html</loc>
<lastmod>2025-11-24T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/11/24/what-is-baseline-security-mode-and-should-you-rely-on-it.html</loc>
<lastmod>2025-11-24T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/11/25/copilot-studio-ai-agents-inventory-security-posture.html</loc>
<lastmod>2025-11-25T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/11/25/global-secure-access-intelligent-local-access-for-private-access.html</loc>
<lastmod>2025-11-25T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/11/25/how-to-check-if-shared-mailboxes-need-mdo-licenses.html</loc>
<lastmod>2025-11-25T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/11/25/the-imperative-for-zero-trust-identity-architecture-in-a-cloud-first-world.html</loc>
<lastmod>2025-11-25T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/11/26/checking-the-effectiveness-of-a-transport-rule-to-block-spammy-email.html</loc>
<lastmod>2025-11-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/11/26/granular-access-to-genai-apps-with-defender-for-cloud-apps.html</loc>
<lastmod>2025-11-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/11/26/how-to-enable-baseline-security-mode-in-microsoft-365.html</loc>
<lastmod>2025-11-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/11/27/intune-policy-tattooing-issue-removed-settings-stay-enforced.html</loc>
<lastmod>2025-11-27T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/11/28/microsoft-365-the-essential-10-security-considerations.html</loc>
<lastmod>2025-11-28T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/11/29/lab-setting-up-hyper-v-host.html</loc>
<lastmod>2025-11-29T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/11/30/conditional-access-bypasses.html</loc>
<lastmod>2025-11-30T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/11/30/lab-setting-up-hyper-v-host.html</loc>
<lastmod>2025-11-30T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/11/30/modern-security-for-legacy-systems.html</loc>
<lastmod>2025-11-30T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/12/01/mdi-configurator-v10-is-out.html</loc>
<lastmod>2025-12-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/12/01/office-365-for-it-pros-december-2025-update.html</loc>
<lastmod>2025-12-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/12/01/when-the-company-portal-gets-stuck-on-downloading-the-hidden-ime-issue-behind-it.html</loc>
<lastmod>2025-12-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/12/02/app-only-authentication-for-sharepoint-online-powershell.html</loc>
<lastmod>2025-12-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/12/02/forgotten-features-series-part-1-the-legal-gatekeeper-you-arent-using-conditiona.html</loc>
<lastmod>2025-12-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/12/02/how-to-enable-require-risk-remediation-in-conditional-access.html</loc>
<lastmod>2025-12-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/12/02/the-hidden-steps-microsoft-forgot-to-document-securing-azure-app-service-authent.html</loc>
<lastmod>2025-12-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/12/02/unified-security-posture-management-1.html</loc>
<lastmod>2025-12-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/12/02/unified-security-posture-management-2.html</loc>
<lastmod>2025-12-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/12/02/unified-security-posture-management.html</loc>
<lastmod>2025-12-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/12/03/finally-control-over-the-allow-my-organization-to-manage-my-device-prompt.html</loc>
<lastmod>2025-12-03T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/12/03/lab-defender-for-iot-configuration.html</loc>
<lastmod>2025-12-03T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/12/03/talking-microsoft-365-compliance-at-the-european-sharepoint-conference.html</loc>
<lastmod>2025-12-03T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/12/04/journey-to-passwordless-authentication-might-include-some-bumps.html</loc>
<lastmod>2025-12-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/12/04/lab-defender-for-iot-configuration.html</loc>
<lastmod>2025-12-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/12/04/major-updates-in-microsoft-365-and-microsoft-intune-december-2025.html</loc>
<lastmod>2025-12-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/12/05/microsoft-blocks-ews-access-for-kiosk-users.html</loc>
<lastmod>2025-12-05T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/12/05/new-features-and-updates-from-microsoft-ignite-2025.html</loc>
<lastmod>2025-12-05T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/12/06/exploring-identityaccountinfo-building-a-kql-query-to-assess-identity-password-s.html</loc>
<lastmod>2025-12-06T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/12/06/global-secure-access-guest-access-support-with-the-windows-client-b2b-guest.html</loc>
<lastmod>2025-12-06T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/12/08/microsoft-increases-office-365-and-microsoft-365-license-prices.html</loc>
<lastmod>2025-12-08T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/12/09/checking-where-tenant-users-go-as-guests.html</loc>
<lastmod>2025-12-09T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/12/10/streamlining-employee-onboarding-with-entitlement-management-part-1.html</loc>
<lastmod>2025-12-10T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/12/11/testing-the-mcp-server-for-enterprise.html</loc>
<lastmod>2025-12-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/12/12/application-identity-security-in-a-zero-trust-framework.html</loc>
<lastmod>2025-12-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/12/12/how-to-disable-or-deactivate-applications-in-microsoft-entra.html</loc>
<lastmod>2025-12-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/12/12/microsoft-to-enable-anthrophic-models-by-default.html</loc>
<lastmod>2025-12-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/12/13/powershell-script-installer-support-for-win32-apps-in-intune.html</loc>
<lastmod>2025-12-13T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/12/13/soft-delete-in-microsoft-entra-conditional-access-easily-restore-deleted-policie.html</loc>
<lastmod>2025-12-13T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/12/15/discover-and-restrict-access-to-genai-apps-in-the-microsoft-security-ecosystem.html</loc>
<lastmod>2025-12-15T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/12/15/microsoft-baseline-security-mode-rolls-out.html</loc>
<lastmod>2025-12-15T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/12/15/new-intuneautopatch-feature-cve-and-kb-reporting-better-visibility-smarter-patch.html</loc>
<lastmod>2025-12-15T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/12/15/streamlining-employee-onboarding-with-entitlement-management-part-2.html</loc>
<lastmod>2025-12-15T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/12/16/how-intune-syncs-work-powershell-and-win32-app-delivery-vs-policy-delivery.html</loc>
<lastmod>2025-12-16T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/12/16/microsoft-entra-to-add-soft-delete-capability-for-devices.html</loc>
<lastmod>2025-12-16T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/12/16/old-versions-of-exchange-activesync-clients-get-the-bullet.html</loc>
<lastmod>2025-12-16T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/12/16/signtoolgui-2100-released.html</loc>
<lastmod>2025-12-16T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/12/17/sharepoint-online-expands-version-expiration-for-audio-and-video-files.html</loc>
<lastmod>2025-12-17T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/12/17/the-edge-localnetworkaccessallowedforurls-policy-you-never-deployed.html</loc>
<lastmod>2025-12-17T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/12/18/removing-retention-holds-from-exchange-mailboxes.html</loc>
<lastmod>2025-12-18T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/12/19/how-to-enable-passkeys-for-guest-users-in-entra-id.html</loc>
<lastmod>2025-12-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/12/20/this-cant-possibly-work-building-a-detection-engineering-assistant.html</loc>
<lastmod>2025-12-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/12/21/this-cant-possibly-work-building-a-detection-engineering-assistant.html</loc>
<lastmod>2025-12-21T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/12/21/using-global-secure-access-in-cross-tenant-scenarios.html</loc>
<lastmod>2025-12-21T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/12/22/how-to-list-and-export-available-azure-vm-images-by-generation-and-region-with-a.html</loc>
<lastmod>2025-12-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/12/22/microsoft-resolves-wam-issues-for-microsoft-graph-powershell.html</loc>
<lastmod>2025-12-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/12/23/microsoft-graph-powershell-sdk-v234-makes-wam-the-default.html</loc>
<lastmod>2025-12-23T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/12/27/microsoft-adds-new-microsoft-365-support-engineer-role-to-entra.html</loc>
<lastmod>2025-12-27T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/12/28/kb-veeam-backup-fails-to-synology-smb-share-an-unexpected-network-error-occurred.html</loc>
<lastmod>2025-12-28T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/12/29/how-to-report-dlp-alerts.html</loc>
<lastmod>2025-12-29T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/12/29/how-to-setup-conditional-access-for-account-recovery.html</loc>
<lastmod>2025-12-29T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/12/29/merry-multicloud-managing-aws-virtual-machine-instances-with-azure-arc.html</loc>
<lastmod>2025-12-29T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/12/29/what-really-happens-when-you-press-remote-sync-in-intune.html</loc>
<lastmod>2025-12-29T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/12/30/2025-top-appgov-score-resources-for-application-governance-security.html</loc>
<lastmod>2025-12-30T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/12/30/the-exchange-enforcedtimestamps-mailbox-property.html</loc>
<lastmod>2025-12-30T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2025/12/31/training-people-to-use-microsoft-365-copilot-effectively.html</loc>
<lastmod>2025-12-31T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/01/01/january-2026-update-for-office-365-for-it-pros.html</loc>
<lastmod>2026-01-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/01/01/tool-release-darklighthouse.html</loc>
<lastmod>2026-01-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/01/02/a-second-look-at-microsoft-entra-private-access-for-active-directory-domain-cont.html</loc>
<lastmod>2026-01-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/01/02/reflecting-on-the-year-2025-how-it-started-and-whats-next.html</loc>
<lastmod>2026-01-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/01/02/teams-admin-center-simplifies-external-collaboration.html</loc>
<lastmod>2026-01-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/01/04/kql-sources-2026-update.html</loc>
<lastmod>2026-01-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/01/04/migrating-microsoft-sentinel-to-microsoft-defender-xdr.html</loc>
<lastmod>2026-01-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/01/05/azure-arc-creating-or-updating-an-aws-multicloud-connector-for-s3-bucket-to-azur.html</loc>
<lastmod>2026-01-05T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/01/05/sharepoint-online-dumps-legacy-compliance-features.html</loc>
<lastmod>2026-01-05T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/01/06/a-quick-look-at-purview-data-security-investigations.html</loc>
<lastmod>2026-01-06T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/01/06/configuring-time-based-conditional-access-policies.html</loc>
<lastmod>2026-01-06T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/01/06/microsoft-sentinel-cost-management-how-to-get-insights-in-data-lake-usage.html</loc>
<lastmod>2026-01-06T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/01/07/azure-arc-how-to-migrate-data-from-amazon-s3-buckets-to-azure-blob-storage-with.html</loc>
<lastmod>2026-01-07T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/01/07/disable-correlation-for-analytic-rules-in-microsoft-sentinel.html</loc>
<lastmod>2026-01-07T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/01/08/useful-search-filters-in-entra-id-you-might-not-know-yet.html</loc>
<lastmod>2026-01-08T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/01/09/entra-id-rationalizes-session-revocation-for-user-accounts.html</loc>
<lastmod>2026-01-09T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/01/10/could-you-build-a-simple-c2-framework-using-world-of-warcraft.html</loc>
<lastmod>2026-01-10T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/01/10/microsoft-entra-access-reviews-governance-for-user-and-guest-access.html</loc>
<lastmod>2026-01-10T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/01/11/forgotten-features-series-part-2-the-overlooked-control-layer-administrative-uni.html</loc>
<lastmod>2026-01-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/01/12/access-azure-virtual-desktop-and-windows-365-cloud-pc-from-non-managed-devices.html</loc>
<lastmod>2026-01-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/01/12/forgotten-features-series-part-3-the-metadata-revolution-youre-missing-custom-se.html</loc>
<lastmod>2026-01-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/01/12/how-to-enumerate-microsoft-365-tenant-domains-in-2026.html</loc>
<lastmod>2026-01-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/01/12/the-channel-agent-brings-ai-interactions-to-teams-channels.html</loc>
<lastmod>2026-01-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/01/12/tool-release-misp-filter-builder.html</loc>
<lastmod>2026-01-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/01/13/entra-join-shows-no-password-prompt-the-user-realm-issue.html</loc>
<lastmod>2026-01-13T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/01/13/sharepoint-online-site-administrators-can-now-control-restricted-content-discove.html</loc>
<lastmod>2026-01-13T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/01/13/yellowhat.html</loc>
<lastmod>2026-01-13T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/01/14/policy-is-rejected-by-licensing-error-code-0x82b00006.html</loc>
<lastmod>2026-01-14T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/01/14/teams-external-collaboration-administrator-role-arrives.html</loc>
<lastmod>2026-01-14T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/01/15/agent-identity-demystified.html</loc>
<lastmod>2026-01-15T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/01/15/purview-ediscovery-simplifies-content-searches-in-february-2026.html</loc>
<lastmod>2026-01-15T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/01/16/agents-in-entra-security-risks-and-governance-best-practices.html</loc>
<lastmod>2026-01-16T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/01/16/some-microsoft-graph-powershell-sdk-cmdlets-lose-body-parameters.html</loc>
<lastmod>2026-01-16T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/01/17/a-new-community-tool-is-comming-to-hyper-v-stay-turned.html</loc>
<lastmod>2026-01-17T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/01/17/microsoft-copilot-studio-real-time-protection-for-ai-agents.html</loc>
<lastmod>2026-01-17T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/01/18/monitor-new-actions-in-sentinel-defender-xdr-v2.html</loc>
<lastmod>2026-01-18T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/01/18/testing-the-sinkvpn-concept-to-silence-edrs.html</loc>
<lastmod>2026-01-18T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/01/19/how-to-create-sharepoint-sites-with-the-graph-api.html</loc>
<lastmod>2026-01-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/01/20/entra-id-agent-identity-security-products-explained.html</loc>
<lastmod>2026-01-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/01/20/how-to-natively-archive-defender-xdr-logs-for-up-to-12-years.html</loc>
<lastmod>2026-01-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/01/20/linking-privileged-accounts-to-identities-in-microsoft-defender-benefits-amp-use.html</loc>
<lastmod>2026-01-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/01/20/local-autopilot-reset-blocked-by-deny-network-logon.html</loc>
<lastmod>2026-01-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/01/20/synchronizing-security-and-microsoft-365-group-memberships.html</loc>
<lastmod>2026-01-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/01/21/clarifying-the-microsoft-365-business-license-limits.html</loc>
<lastmod>2026-01-21T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/01/21/generate-a-weekly-report-of-role-assignments.html</loc>
<lastmod>2026-01-21T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/01/22/automating-microsoft-365-with-powershell-update-20.html</loc>
<lastmod>2026-01-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/01/22/make-some-noise-a-note-on-detections.html</loc>
<lastmod>2026-01-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/01/23/autopilot-hybrid-join-failure-80004005-and-a-malformed-id_token.html</loc>
<lastmod>2026-01-23T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/01/23/teams-integrates-viva-engage-communities.html</loc>
<lastmod>2026-01-23T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/01/24/agent-identity-security-controls.html</loc>
<lastmod>2026-01-24T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/01/24/the-secure-boot-status-report-coming-soon-to-intune.html</loc>
<lastmod>2026-01-24T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/01/24/tool-release-rustymisp2sentinel.html</loc>
<lastmod>2026-01-24T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/01/25/defender-for-endpoint-timeline-internals.html</loc>
<lastmod>2026-01-25T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/01/25/enable-group-synchronisation-for-microsoft-entra-cross-tenant-sync.html</loc>
<lastmod>2026-01-25T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/01/25/least-privilege-for-temporary-access-pass-creation.html</loc>
<lastmod>2026-01-25T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/01/25/protect-copilot-studio-agents-against-indirect-prompt-injection-via-image-and-ur.html</loc>
<lastmod>2026-01-25T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/01/26/autopilot-hybrid-join-failure-80004005-and-a-malformed-id-token.html</loc>
<lastmod>2026-01-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/01/26/microsoft-to-introduce-native-tenant-configuration-drift-monitoring.html</loc>
<lastmod>2026-01-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/01/26/teams-revamps-premium-licensing.html</loc>
<lastmod>2026-01-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/01/27/using-the-exchange-online-message-trace-api.html</loc>
<lastmod>2026-01-27T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/01/28/defender-for-endpoint-migration-troubleshooting-persistent-third-party-av-regist.html</loc>
<lastmod>2026-01-28T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/01/28/getting-a-first-grip-on-copilot-studio-agents-as-an-administrator.html</loc>
<lastmod>2026-01-28T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/01/28/visual-studio-enterprise-partner-benefits-a-heads-up.html</loc>
<lastmod>2026-01-28T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/01/29/analyzing-workload-identity-activity-through-token-based-hunting.html</loc>
<lastmod>2026-01-29T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/01/29/how-to-setup-unified-tenant-configuration-management.html</loc>
<lastmod>2026-01-29T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/01/29/the-secure-boot-status-report-who-actually-sends-the-secure-boot-info.html</loc>
<lastmod>2026-01-29T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/01/30/jans-resource-catalog-to-learn-all-about-agents.html</loc>
<lastmod>2026-01-30T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/01/30/powershell-script-is-failed-to-execute-the-file-parameter-does-not-exist.html</loc>
<lastmod>2026-01-30T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/02/02/automatic-windows-event-auditing-configuration-for-defender-for-identity-v3x-sen.html</loc>
<lastmod>2026-02-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/02/03/forgotten-features-series-part-4-beyond-built-in-checks-intune-custom-compliance.html</loc>
<lastmod>2026-02-03T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/02/03/intune-device-certificate-renewal-flow-has-shifted-from-pull-to-push.html</loc>
<lastmod>2026-02-03T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/02/06/copilot-studio-agent-security-lessons-learned-from-the-field.html</loc>
<lastmod>2026-02-06T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/02/06/intelligent-local-access-in-microsoft-entra-global-secure-access.html</loc>
<lastmod>2026-02-06T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/02/06/microsoft-introduces-new-cloud-licensing-apis-for-m365.html</loc>
<lastmod>2026-02-06T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/02/06/the-final-countdown-to-remove-ews-from-exchange-online-begins.html</loc>
<lastmod>2026-02-06T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/02/06/the-hidden-risk-of-using-akams-shorturls-for-microsoft-portals.html</loc>
<lastmod>2026-02-06T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/02/07/microsoft-purview-implementing-hr-data-connector-for-insider-risk-management.html</loc>
<lastmod>2026-02-07T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/02/08/how-to-find-and-remove-application-owners-from-disabled-applications.html</loc>
<lastmod>2026-02-08T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/02/09/forgotten-features-series-part-5-the-defender-tag-bridge-youre-not-using-custom.html</loc>
<lastmod>2026-02-09T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/02/09/how-to-find-unattested-device-bound-passkeys-in-entra-id.html</loc>
<lastmod>2026-02-09T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/02/09/how-to-report-adaptive-scope-membership.html</loc>
<lastmod>2026-02-09T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/02/09/modern-email-security-explained-from-sender-authentication-to-transport-security.html</loc>
<lastmod>2026-02-09T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/02/09/run-xdrinternals-as-github-action.html</loc>
<lastmod>2026-02-09T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/02/10/intune-mdm-certificate-renewal-failure-the-hidden-upn-issue.html</loc>
<lastmod>2026-02-10T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/02/10/maester-and-utcm-are-complementary-tools-for-microsoft-365-tenant-management.html</loc>
<lastmod>2026-02-10T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/02/11/deactivating-an-entra-id-application.html</loc>
<lastmod>2026-02-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/02/11/how-to-secure-microsoft-copilot-studio-agents-with-real-time-protection-in-defen.html</loc>
<lastmod>2026-02-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/02/11/identity-threat-detection-and-response-linking-accounts.html</loc>
<lastmod>2026-02-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/02/12/app-governance-accelerator-32-turning-application-governance-into-an-auditable-a.html</loc>
<lastmod>2026-02-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/02/12/new-outlook-gets-smarter-dlp.html</loc>
<lastmod>2026-02-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/02/13/admx-ingestion-and-access-is-denied-0x80070005.html</loc>
<lastmod>2026-02-13T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/02/13/code-error-allowed-copilot-chat-to-expose-confidential-information.html</loc>
<lastmod>2026-02-13T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/02/13/microsoft-entra-private-access-byod-access-internal-resources-with-entra-registe.html</loc>
<lastmod>2026-02-13T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/02/15/entra-agent-id-portal-explained.html</loc>
<lastmod>2026-02-15T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/02/15/microsoft-artifact-signing-region-requirement-errors-root-cause-and-fix.html</loc>
<lastmod>2026-02-15T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/02/16/how-to-configure-inbound-smtp-dane-38-dnssec-in-exchange-online.html</loc>
<lastmod>2026-02-16T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/02/16/remediating-agent-identities-for-identity-admins-and-socs.html</loc>
<lastmod>2026-02-16T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/02/17/defender-xdr-custom-detection-rules-powershell-module.html</loc>
<lastmod>2026-02-17T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/02/18/microsoft-introduces-entra-hybrid-join-using-entra-kerberos.html</loc>
<lastmod>2026-02-18T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/02/18/what-admins-can-learn-from-the-new-entra-id-groups-insights-blade.html</loc>
<lastmod>2026-02-18T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/02/19/becoming-a-microsoft-mvp.html</loc>
<lastmod>2026-02-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/02/19/identity-security-predictions-for-2026-what-threat-actors-are-targeting-next.html</loc>
<lastmod>2026-02-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/02/20/require-risk-remediation-in-entra-conditional-access.html</loc>
<lastmod>2026-02-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/02/22/azure-advisor-how-to-view-potential-savings-in-eur-instead-of-usd-with-an-excel.html</loc>
<lastmod>2026-02-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/02/22/dxbp-part-1-technical-detection-engineering-best-practices.html</loc>
<lastmod>2026-02-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/02/24/meet-the-scholars-incredible-voices-shaping-the-future-of-tech.html</loc>
<lastmod>2026-02-24T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/02/24/microsoft-extends-dlp-policy-for-copilot-protection-to-all-storage-locations.html</loc>
<lastmod>2026-02-24T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/02/24/security-dashboard-for-ai-security-requirements-explained-complex.html</loc>
<lastmod>2026-02-24T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/02/25/how-to-use-scoped-graph-permissions-with-sharepoint-lists.html</loc>
<lastmod>2026-02-25T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/02/26/extending-protection-for-confidential-sharepoint-online-files.html</loc>
<lastmod>2026-02-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/02/27/intune-powershell-script-delay-here-is-what-really-causes-it.html</loc>
<lastmod>2026-02-27T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/02/27/microsoft-entra-one-person-one-license-now-what.html</loc>
<lastmod>2026-02-27T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/02/27/planners-newly-redesigned-interface.html</loc>
<lastmod>2026-02-27T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/02/28/disable-mdm-enrollment-when-adding-a-work-or-school-account-on-windows.html</loc>
<lastmod>2026-02-28T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/03/01/intune-win32app-powershell-script-installer-64-bit-switch-not-working.html</loc>
<lastmod>2026-03-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/03/02/defender-for-endpoint-new-feature-is-out-live-response-file-library.html</loc>
<lastmod>2026-03-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/03/02/march-2026-update-for-office-365-for-it-pros.html</loc>
<lastmod>2026-03-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/03/02/securing-microsoft-business-premium-part-06-securing-email-with-defender-for-off.html</loc>
<lastmod>2026-03-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/03/03/microsoft-celebrates-sharepoint-25th-anniversary-with-announcements.html</loc>
<lastmod>2026-03-03T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/03/04/how-to-test-a-file-against-dlp-sensitive-information-types.html</loc>
<lastmod>2026-03-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/03/05/measuring-kpis-like-response-times-for-shared-mailboxes.html</loc>
<lastmod>2026-03-05T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/03/05/microsoft-365-copilot-why-self-service-trials-are-a-security-risk.html</loc>
<lastmod>2026-03-05T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/03/05/saml-vs-oidc-vs-oauth-20-strategic-identity-protocols-explained.html</loc>
<lastmod>2026-03-05T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/03/06/ai-agent-security-posture-no-authentication.html</loc>
<lastmod>2026-03-06T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/03/06/how-to-get-better-with-graph-api-part-one.html</loc>
<lastmod>2026-03-06T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/03/06/intune-device-actions-microsoft-brings-back-instant-remote-actions.html</loc>
<lastmod>2026-03-06T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/03/06/sharepoint-online-drops-one-time-passcodes-for-external-access.html</loc>
<lastmod>2026-03-06T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/03/07/intel-tdt-deprecated-defender-csp-error-0x86000002.html</loc>
<lastmod>2026-03-07T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/03/07/microsoft-entra-private-access-secure-access-for-external-users-to-internal-reso.html</loc>
<lastmod>2026-03-07T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/03/08/eldk26-highlights.html</loc>
<lastmod>2026-03-08T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/03/09/microsoft-rushes-high-volume-email-to-general-availability.html</loc>
<lastmod>2026-03-09T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/03/10/how-to-remove-sensitivity-labels-from-sharepoint-files-at-scale.html</loc>
<lastmod>2026-03-10T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/03/10/introducing-hvtools-your-new-tool-for-hyper-vclusters-and-azure-local-overview.html</loc>
<lastmod>2026-03-10T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/03/10/microsoft-365-e7-has-arrived.html</loc>
<lastmod>2026-03-10T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/03/10/microsoft-releases-new-ai-self-service-support-experience-in-entra.html</loc>
<lastmod>2026-03-10T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/03/11/microsoft-365-backup-launches-file-level-restore.html</loc>
<lastmod>2026-03-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/2026/03/11/new-microsoft-entra-passkeys-for-windows-hello-enter-public-preview.html</loc>
<lastmod>2026-03-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://securityblogsearch.com/about.html</loc>
</url>
<url>
<loc>https://securityblogsearch.com/azure.html</loc>
</url>
<url>
<loc>https://securityblogsearch.com/contributing.html</loc>
</url>
<url>
<loc>https://securityblogsearch.com/defender-cloud-apps.html</loc>
</url>
<url>
<loc>https://securityblogsearch.com/defender-cloud.html</loc>
</url>
<url>
<loc>https://securityblogsearch.com/defender-endpoint.html</loc>
</url>
<url>
<loc>https://securityblogsearch.com/defender-identity.html</loc>
</url>
<url>
<loc>https://securityblogsearch.com/defender-office.html</loc>
</url>
<url>
<loc>https://securityblogsearch.com/entra.html</loc>
</url>
<url>
<loc>https://securityblogsearch.com/</loc>
</url>
<url>
<loc>https://securityblogsearch.com/intune.html</loc>
</url>
<url>
<loc>https://securityblogsearch.com/office365.html</loc>
</url>
<url>
<loc>https://securityblogsearch.com/pending-features.html</loc>
</url>
<url>
<loc>https://securityblogsearch.com/purview.html</loc>
</url>
<url>
<loc>https://securityblogsearch.com/sentinel.html</loc>
</url>
</urlset>
