<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://m365security.net/2023/10/15/how-to-safeguard-against-phishing-attacks-using-onmicrosoft-com-domains/</loc><image:image><image:loc>https://m365security.net/wp-content/uploads/2023/10/image-2.png</image:loc><image:title>image-2</image:title></image:image><image:image><image:loc>https://m365security.net/wp-content/uploads/2023/10/image-1.png</image:loc><image:title>image-1</image:title></image:image><image:image><image:loc>https://m365security.net/wp-content/uploads/2023/10/image.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://m365security.net/wp-content/uploads/2023/10/untitled-5.png</image:loc><image:title>Untitled (5)</image:title></image:image><lastmod>2024-07-08T16:10:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://m365security.net/about-me/</loc><image:image><image:loc>https://m365security.net/wp-content/uploads/2021/03/pontus_pic.jpeg</image:loc><image:title>Pontus_pic</image:title></image:image><lastmod>2023-10-13T22:22:56+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://m365security.net/2023/09/29/detect-when-entra-id-guest-account-get-blocked-due-to-risk-on-home-tenant/</loc><image:image><image:loc>https://m365security.net/wp-content/uploads/2023/09/untitled-4.png</image:loc><image:title>Untitled (4)</image:title></image:image><image:image><image:loc>https://m365security.net/wp-content/uploads/2023/09/untitled-3.png</image:loc><image:title>Untitled (3)</image:title></image:image><image:image><image:loc>https://m365security.net/wp-content/uploads/2023/09/alertrule.png</image:loc><image:title>alertrule</image:title></image:image><lastmod>2023-10-13T20:33:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://m365security.net/2023/09/24/detect-unusual-email-spikes-from-your-smtp-connector/</loc><image:image><image:loc>https://m365security.net/wp-content/uploads/2023/09/untitled-2.png</image:loc><image:title>Untitled (2)</image:title></image:image><image:image><image:loc>https://m365security.net/wp-content/uploads/2023/09/untitled-1.png</image:loc><image:title>Untitled (1)</image:title></image:image><image:image><image:loc>https://m365security.net/wp-content/uploads/2023/09/untitled.png</image:loc><image:title>Untitled</image:title></image:image><image:image><image:loc>https://m365security.net/wp-content/uploads/2023/09/microsoftteams-image-3.png</image:loc><image:title>microsoftteams-image-3</image:title></image:image><image:image><image:loc>https://m365security.net/wp-content/uploads/2023/09/microsoftteams-image-2.png</image:loc><image:title>microsoftteams-image-2</image:title></image:image><image:image><image:loc>https://m365security.net/wp-content/uploads/2023/09/microsoftteams-image-1.png</image:loc><image:title>microsoftteams-image-1</image:title></image:image><image:image><image:loc>https://m365security.net/wp-content/uploads/2023/09/microsoftteams-image.png</image:loc><image:title>microsoftteams-image</image:title></image:image><lastmod>2023-09-25T13:26:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://m365security.net/2021/01/31/why-you-need-to-take-care-of-legacy-authentication-right-now/</loc><image:image><image:loc>https://m365security.net/wp-content/uploads/2021/01/my-post-4-1.jpeg</image:loc><image:title>My Post (4)</image:title></image:image><image:image><image:loc>https://m365security.net/wp-content/uploads/2021/01/my-post-4.jpeg</image:loc><image:title>My Post (4)</image:title></image:image><image:image><image:loc>https://m365security.net/wp-content/uploads/2021/01/my-post-3.png</image:loc><image:title>My Post (3)</image:title></image:image><lastmod>2022-09-16T06:20:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://m365security.net/2022/02/13/enable-users-to-request-access-to-auto-forward-emails-outside-the-organization/</loc><image:image><image:loc>https://m365security.net/wp-content/uploads/2022/02/my-post-copy-8.png</image:loc><image:title>My Post Copy 8</image:title></image:image><lastmod>2022-02-14T07:51:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://m365security.net/2021/03/21/keeping-track-of-conditional-access-changes/</loc><image:image><image:loc>https://m365security.net/wp-content/uploads/2021/03/my-post-copy-4.png</image:loc><image:title>My Post Copy 4</image:title></image:image><lastmod>2023-06-15T20:18:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://m365security.net/2022/02/10/how-to-implement-oath-totp-hardware-tokens-to-azure-ad/</loc><image:image><image:loc>https://m365security.net/wp-content/uploads/2022/02/my-post-copy-7-1.png</image:loc><image:title>My Post Copy 7 (1)</image:title></image:image><image:image><image:loc>https://m365security.net/wp-content/uploads/2022/02/my-post-copy-7.png</image:loc><image:title>My Post Copy 7</image:title></image:image><image:image><image:loc>https://m365security.net/wp-content/uploads/2022/02/3-1.png</image:loc><image:title>3</image:title></image:image><image:image><image:loc>https://m365security.net/wp-content/uploads/2022/02/1-1.png</image:loc><image:title>1</image:title></image:image><image:image><image:loc>https://m365security.net/wp-content/uploads/2022/02/0.png</image:loc></image:image><image:image><image:loc>https://m365security.net/wp-content/uploads/2022/02/5.png</image:loc><image:title>5</image:title></image:image><image:image><image:loc>https://m365security.net/wp-content/uploads/2022/02/4.png</image:loc><image:title>4</image:title></image:image><image:image><image:loc>https://m365security.net/wp-content/uploads/2022/02/3.png</image:loc><image:title>3</image:title></image:image><image:image><image:loc>https://m365security.net/wp-content/uploads/2022/02/2.png</image:loc><image:title>2</image:title></image:image><image:image><image:loc>https://m365security.net/wp-content/uploads/2022/02/1.png</image:loc><image:title>1</image:title></image:image><lastmod>2023-03-31T11:06:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://m365security.net/2021/11/12/block-access-for-all-non-intune-mdm-enrolled-mobile-devices-through-conditional-access/</loc><image:image><image:loc>https://m365security.net/wp-content/uploads/2021/11/my-post-copy-5-4.png</image:loc><image:title>My Post Copy 5 (4)</image:title></image:image><image:image><image:loc>https://m365security.net/wp-content/uploads/2021/11/my-post-copy-5-3.png</image:loc><image:title>My Post Copy 5 (3)</image:title></image:image><image:image><image:loc>https://m365security.net/wp-content/uploads/2021/11/my-post-copy-5-1.png</image:loc><image:title>My Post Copy 5 (1)</image:title></image:image><lastmod>2024-06-14T10:02:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://m365security.net/2021/11/21/how-to-enable-mfa-code-matching-context-in-azure-ad-portal-public-preview/</loc><image:image><image:loc>https://m365security.net/wp-content/uploads/2021/11/my-post-copy-6.png</image:loc><image:title>My Post Copy 6</image:title></image:image><lastmod>2023-10-15T00:20:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://m365security.net/2021/04/05/detect-when-compromised-end-user-connects-to-azure-ad-for-reconnaissance/</loc><image:image><image:loc>https://m365security.net/wp-content/uploads/2021/04/my-post-copy-5.png</image:loc><image:title>My Post Copy 5</image:title></image:image><lastmod>2021-04-19T12:43:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://m365security.net/links/</loc><lastmod>2021-03-22T13:26:46+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://m365security.net/2021/03/15/find-changes-in-end-users-mfa-authentication-methods/</loc><image:image><image:loc>https://m365security.net/wp-content/uploads/2021/03/my-post-copy-3.png</image:loc><image:title>My Post Copy 3</image:title></image:image><lastmod>2021-03-15T14:03:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://m365security.net/2021/02/28/manage-azure-ad-logs-with-azure-monitoring/</loc><image:image><image:loc>https://m365security.net/wp-content/uploads/2021/02/manage_azuread_logs.jpeg</image:loc><image:title>Manage_AzureAD_logs</image:title></image:image><lastmod>2021-03-10T07:54:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://m365security.net/2021/03/06/setup-and-monitor-emergency-azure-ad-accounts/</loc><image:image><image:loc>https://m365security.net/wp-content/uploads/2021/03/20210306_122933-1.jpg</image:loc><image:title>20210306_122933.jpg</image:title></image:image><image:image><image:loc>https://m365security.net/wp-content/uploads/2021/03/20210306_122933.jpg</image:loc><image:title>20210306_122933.jpg</image:title></image:image><image:image><image:loc>https://m365security.net/wp-content/uploads/2021/03/my-post-copy-2.png</image:loc><image:title>My Post Copy 2</image:title></image:image><lastmod>2021-03-07T19:30:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://m365security.net/2021/02/17/tracking-excluded-conditional-access-users-with-identity-governance/</loc><lastmod>2021-02-17T12:14:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://m365security.net/blog/</loc><lastmod>2021-02-10T22:51:37+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://m365security.net</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2024-07-08T16:10:34+00:00</lastmod></url></urlset>
