<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://securityoccupied.com/your-instructions/</loc><lastmod>2025-05-29T22:15:51+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://securityoccupied.com/2024/09/27/automate-mde-custom-indicators-with-powershell/</loc><image:image><image:loc>https://securityoccupied.com/wp-content/uploads/2024/09/image-4.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securityoccupied.com/wp-content/uploads/2024/09/05175602-5024-46e6-b651-531dfd830d66.jpg</image:loc><image:title>_05175602-5024-46e6-b651-531dfd830d66</image:title></image:image><image:image><image:loc>https://securityoccupied.com/wp-content/uploads/2024/09/image-3.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securityoccupied.com/wp-content/uploads/2024/09/image-2.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securityoccupied.com/wp-content/uploads/2024/09/image-1.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securityoccupied.com/wp-content/uploads/2024/09/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2024-09-27T19:10:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityoccupied.com/2023/12/11/automate-ioc-expiry-reports-with-power-automate-and-microsoft-defender-for-endpoint/</loc><image:image><image:loc>https://securityoccupied.com/wp-content/uploads/2023/11/antivirus-6918169_1280.jpg</image:loc><image:title>antivirus-6918169_1280</image:title></image:image><image:image><image:loc>https://securityoccupied.com/wp-content/uploads/2023/11/image-3.png</image:loc><image:title>image-3</image:title></image:image><image:image><image:loc>https://securityoccupied.com/wp-content/uploads/2023/11/image-2.png</image:loc><image:title>image-2</image:title></image:image><image:image><image:loc>https://securityoccupied.com/wp-content/uploads/2023/11/image-1.png</image:loc><image:title>image-1</image:title></image:image><image:image><image:loc>https://securityoccupied.com/wp-content/uploads/2023/11/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2023-12-11T16:57:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityoccupied.com/2023/10/10/mde-kit-a-powershell-module-for-microsoft-defender-for-endpoint/</loc><image:image><image:loc>https://securityoccupied.com/wp-content/uploads/2023/10/mdekit.png</image:loc><image:title>MDEKit</image:title></image:image><image:image><image:loc>https://securityoccupied.com/wp-content/uploads/2023/10/image-1.png</image:loc><image:title>image-1</image:title></image:image><image:image><image:loc>https://securityoccupied.com/wp-content/uploads/2023/10/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-05-05T23:20:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityoccupied.com/2023/09/12/notify-teams-channels-when-specific-mde-alerts-occur/</loc><image:image><image:loc>https://securityoccupied.com/wp-content/uploads/2023/09/image-31.png</image:loc><image:title>image-31</image:title></image:image><image:image><image:loc>https://securityoccupied.com/wp-content/uploads/2023/09/teams.png</image:loc><image:title>Teams</image:title></image:image><image:image><image:loc>https://securityoccupied.com/wp-content/uploads/2023/09/image-30.png</image:loc><image:title>image-30</image:title></image:image><image:image><image:loc>https://securityoccupied.com/wp-content/uploads/2023/09/image-29.png</image:loc><image:title>image-29</image:title></image:image><image:image><image:loc>https://securityoccupied.com/wp-content/uploads/2023/09/image-28.png</image:loc><image:title>image-28</image:title></image:image><image:image><image:loc>https://securityoccupied.com/wp-content/uploads/2023/09/image-27.png</image:loc><image:title>image-27</image:title></image:image><image:image><image:loc>https://securityoccupied.com/wp-content/uploads/2023/09/image-26.png</image:loc><image:title>image-26</image:title></image:image><image:image><image:loc>https://securityoccupied.com/wp-content/uploads/2023/09/image-25.png</image:loc><image:title>image-25</image:title></image:image><image:image><image:loc>https://securityoccupied.com/wp-content/uploads/2023/09/image-24.png</image:loc><image:title>image-24</image:title></image:image><image:image><image:loc>https://securityoccupied.com/wp-content/uploads/2023/09/image-23.png</image:loc><image:title>image-23</image:title></image:image><lastmod>2023-09-12T22:46:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityoccupied.com/2023/09/01/creating-custom-email-reports-with-advanced-hunting-and-power-automate/</loc><image:image><image:loc>https://securityoccupied.com/wp-content/uploads/2023/09/ah-pwrautmt.png</image:loc><image:title>AH PwrAutmt</image:title></image:image><image:image><image:loc>https://securityoccupied.com/wp-content/uploads/2023/09/image-15.png</image:loc><image:title>image-15</image:title></image:image><image:image><image:loc>https://securityoccupied.com/wp-content/uploads/2023/09/image-14.png</image:loc><image:title>image-14</image:title></image:image><image:image><image:loc>https://securityoccupied.com/wp-content/uploads/2023/09/image-13.png</image:loc><image:title>image-13</image:title></image:image><image:image><image:loc>https://securityoccupied.com/wp-content/uploads/2023/09/image-12.png</image:loc><image:title>image-12</image:title></image:image><image:image><image:loc>https://securityoccupied.com/wp-content/uploads/2023/09/image-11.png</image:loc><image:title>image-11</image:title></image:image><image:image><image:loc>https://securityoccupied.com/wp-content/uploads/2023/09/image-10.png</image:loc><image:title>image-10</image:title></image:image><image:image><image:loc>https://securityoccupied.com/wp-content/uploads/2023/09/image-9.png</image:loc><image:title>image-9</image:title></image:image><image:image><image:loc>https://securityoccupied.com/wp-content/uploads/2023/09/image-8.png</image:loc><image:title>image-8</image:title></image:image><image:image><image:loc>https://securityoccupied.com/wp-content/uploads/2023/09/image-7.png</image:loc><image:title>image-7</image:title></image:image><lastmod>2023-09-01T20:55:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityoccupied.com/2023/06/15/taking-actions-on-mde-devices-via-powershell-and-mde-api/</loc><image:image><image:loc>https://securityoccupied.com/wp-content/uploads/2023/06/image-3.png</image:loc><image:title>image-3</image:title></image:image><image:image><image:loc>https://securityoccupied.com/wp-content/uploads/2023/06/image-2.png</image:loc><image:title>image-2</image:title></image:image><image:image><image:loc>https://securityoccupied.com/wp-content/uploads/2023/06/image-1.png</image:loc><image:title>image-1</image:title></image:image><image:image><image:loc>https://securityoccupied.com/wp-content/uploads/2023/06/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2024-08-05T16:17:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityoccupied.com/2023/05/11/creating-custom-mde-alert-email-reports-with-power-automate/</loc><image:image><image:loc>https://securityoccupied.com/wp-content/uploads/2023/05/brave_7jmghepavq-1.png</image:loc><image:title>brave_7jmghepavq-1</image:title></image:image><image:image><image:loc>https://securityoccupied.com/wp-content/uploads/2023/05/brave_i8d2piz9sw.png</image:loc><image:title>brave_i8d2piz9sw</image:title></image:image><image:image><image:loc>https://securityoccupied.com/wp-content/uploads/2023/05/brave_7jmghepavq.png</image:loc><image:title>brave_7jmghepavq</image:title></image:image><image:image><image:loc>https://securityoccupied.com/wp-content/uploads/2023/05/brave_gyad82zqsy-1.png</image:loc><image:title>brave_gyad82zqsy-1</image:title></image:image><image:image><image:loc>https://securityoccupied.com/wp-content/uploads/2023/05/brave_gyad82zqsy.png</image:loc><image:title>brave_gyad82zqsy</image:title></image:image><image:image><image:loc>https://securityoccupied.com/wp-content/uploads/2023/05/image.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securityoccupied.com/wp-content/uploads/2023/05/cbogts2d7y.png</image:loc><image:title>cbogts2d7y</image:title></image:image><image:image><image:loc>https://securityoccupied.com/wp-content/uploads/2023/05/brave_vmszjlbctv.png</image:loc><image:title>brave_vmszjlbctv</image:title></image:image><image:image><image:loc>https://securityoccupied.com/wp-content/uploads/2023/05/brave_dvjmxezcey.png</image:loc><image:title>brave_dvjmxezcey</image:title></image:image><image:image><image:loc>https://securityoccupied.com/wp-content/uploads/2023/05/brave_np8ses2yrc.png</image:loc><image:title>brave_np8ses2yrc</image:title></image:image><lastmod>2023-05-12T12:01:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityoccupied.com/2021/11/01/5-powerful-advanced-hunting-queries/</loc><image:image><image:loc>https://securityoccupied.com/wp-content/uploads/2022/09/9af07-bowtarget.png</image:loc><image:title>bow&amp;target</image:title></image:image><image:image><image:loc>https://securityoccupied.com/wp-content/uploads/2022/09/e3900-advanced-hunting.png</image:loc><image:title>Advanced Hunting</image:title></image:image><image:image><image:loc>https://securityoccupied.com/wp-content/uploads/2022/09/a6be1-image-3.png</image:loc><image:title>image-3</image:title></image:image><lastmod>2022-09-10T17:20:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityoccupied.com/2022/06/12/advanced-hunting-with-api/</loc><image:image><image:loc>https://securityoccupied.com/wp-content/uploads/2022/09/36ba7-defender-api-image.jpg</image:loc><image:title>Defender-API-Image</image:title></image:image><lastmod>2022-09-10T17:20:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityoccupied.com/2021/10/20/phishing-campaign-with-defender-for-office-365/</loc><image:image><image:loc>https://securityoccupied.com/wp-content/uploads/2022/09/5b61c-image-2.png</image:loc><image:title>image-2</image:title></image:image><image:image><image:loc>https://securityoccupied.com/wp-content/uploads/2022/09/245d4-image-1.png</image:loc><image:title>image-1</image:title></image:image><image:image><image:loc>https://securityoccupied.com/wp-content/uploads/2022/09/f5953-image.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securityoccupied.com/wp-content/uploads/2022/09/91d9a-gdc981w.png</image:loc><image:title>Gdc981W</image:title></image:image><lastmod>2022-09-10T17:20:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityoccupied.com/2021/10/12/mde-lab-creation/</loc><lastmod>2021-10-14T23:30:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securityoccupied.com</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2025-05-29T22:15:51+00:00</lastmod></url></urlset>
