<?xml version='1.0' encoding='UTF-8'?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1"><url><loc>https://kb.cybertecsecurity.com/knowledge/create-ios-version-specific-compliance-policy</loc><lastmod>2025-11-14</lastmod></url><url><loc>https://kb.cybertecsecurity.com/knowledge/i-am-in-a-serviced-office-how-does-that-affect-ce</loc><lastmod>2025-11-14</lastmod></url><url><loc>https://kb.cybertecsecurity.com/knowledge/qualys-manual-scan</loc><lastmod>2025-11-14</lastmod></url><url><loc>https://kb.cybertecsecurity.com/knowledge/winverifytrust-vulnerability</loc><lastmod>2025-11-14</lastmod></url><url><loc>https://kb.cybertecsecurity.com/knowledge/unique-admin-accounts-separation</loc><lastmod>2025-11-14</lastmod></url><url><loc>https://kb.cybertecsecurity.com/knowledge/is-mobile-device-management-mdm-required-for-cyber-essentials</loc><lastmod>2026-03-04</lastmod></url><url><loc>https://kb.cybertecsecurity.com/knowledge/how-to-block-file-extensions-in-365</loc><lastmod>2025-11-14</lastmod></url><url><loc>https://kb.cybertecsecurity.com/knowledge/what-is-a-cloud-service-in-cyber-essentials</loc><lastmod>2025-11-14</lastmod></url><url><loc>https://kb.cybertecsecurity.com/knowledge/how-to-download-logos-and-reports-from-the-portal</loc><lastmod>2025-11-14</lastmod></url><url><loc>https://kb.cybertecsecurity.com/knowledge/removal-of-msxml</loc><lastmod>2025-11-14</lastmod></url><url><loc>https://kb.cybertecsecurity.com/knowledge/firewall-rules-for-assessment</loc><lastmod>2025-11-14</lastmod></url><url><loc>https://kb.cybertecsecurity.com/knowledge/localaccounttokenfilterpolicy</loc><lastmod>2025-11-14</lastmod></url><url><loc>https://kb.cybertecsecurity.com/knowledge/headless-linux-installation-process</loc><lastmod>2025-11-14</lastmod></url><url><loc>https://kb.cybertecsecurity.com/knowledge/mobile-device-pin</loc><lastmod>2025-11-14</lastmod></url><url><loc>https://kb.cybertecsecurity.com/knowledge/microsoft-teams-wide-installer-issues</loc><lastmod>2025-11-14</lastmod></url><url><loc>https://kb.cybertecsecurity.com/knowledge/android-9-microsoft-teams-phones</loc><lastmod>2025-11-14</lastmod></url><url><loc>https://kb.cybertecsecurity.com/knowledge/mac-os-adding-user-to-sudo</loc><lastmod>2025-11-14</lastmod></url><url><loc>https://kb.cybertecsecurity.com/knowledge/birthday-attacks-against-tls-ciphers</loc><lastmod>2025-11-14</lastmod></url><url><loc>https://kb.cybertecsecurity.com/knowledge/create-a-device-compliant-conditional-access-policy</loc><lastmod>2025-11-14</lastmod></url><url><loc>https://kb.cybertecsecurity.com/knowledge/local-password-policy-on-windows</loc><lastmod>2025-11-14</lastmod></url><url><loc>https://kb.cybertecsecurity.com/knowledge/teams-rooms-mfa</loc><lastmod>2026-02-03</lastmod></url><url><loc>https://kb.cybertecsecurity.com/knowledge/microsoft-server-digitally-sign-communications</loc><lastmod>2025-11-14</lastmod></url><url><loc>https://kb.cybertecsecurity.com/knowledge/find-an-uninstall-command-in-registry</loc><lastmod>2025-11-14</lastmod></url><url><loc>https://kb.cybertecsecurity.com/knowledge/microsoft-365-conditional-access-mfa/2fa-and-security-defaults</loc><lastmod>2025-11-14</lastmod></url><url><loc>https://kb.cybertecsecurity.com/knowledge/whats-wrong-with-groups-in-ms365-security</loc><lastmod>2025-11-14</lastmod></url><url><loc>https://kb.cybertecsecurity.com/knowledge/how-to-start-the-assessment</loc><lastmod>2025-11-14</lastmod></url><url><loc>https://kb.cybertecsecurity.com/knowledge/microsoft-.net-cleanup-script</loc><lastmod>2025-11-14</lastmod></url><url><loc>https://kb.cybertecsecurity.com/knowledge/clean-microsoft-office-installation</loc><lastmod>2025-11-28</lastmod></url><url><loc>https://kb.cybertecsecurity.com/knowledge/home-working-controls</loc><lastmod>2025-11-14</lastmod></url><url><loc>https://kb.cybertecsecurity.com/knowledge/remove-microsoft-flash</loc><lastmod>2025-11-14</lastmod></url><url><loc>https://kb.cybertecsecurity.com/knowledge/legacy-device-isolation</loc><lastmod>2025-11-14</lastmod></url><url><loc>https://kb.cybertecsecurity.com/knowledge/mac-os-workstation-scanning-setup</loc><lastmod>2025-11-14</lastmod></url><url><loc>https://kb.cybertecsecurity.com/knowledge</loc><lastmod>2025-11-14</lastmod></url><url><loc>https://kb.cybertecsecurity.com/knowledge/what-ips-are-live-on-your-network</loc><lastmod>2026-02-20</lastmod></url><url><loc>https://kb.cybertecsecurity.com/knowledge/apple-macos-qualys-deployment-script</loc><lastmod>2025-11-14</lastmod></url><url><loc>https://kb.cybertecsecurity.com/knowledge/create-ios-filters-in-microsoft-intune</loc><lastmod>2025-11-14</lastmod></url><url><loc>https://kb.cybertecsecurity.com/knowledge/agent-setup-for-mac-os</loc><lastmod>2025-11-14</lastmod></url><url><loc>https://kb.cybertecsecurity.com/knowledge/administrative-accounts</loc><lastmod>2025-11-14</lastmod></url><url><loc>https://kb.cybertecsecurity.com/knowledge/we-use-a-key-pair-instead-of-passwords</loc><lastmod>2025-11-14</lastmod></url><url><loc>https://kb.cybertecsecurity.com/knowledge/entraid-/-ms365-device-check-script</loc><lastmod>2026-02-19</lastmod></url><url><loc>https://kb.cybertecsecurity.com/knowledge/removing-internet-explorer</loc><lastmod>2025-11-14</lastmod></url><url><loc>https://kb.cybertecsecurity.com/knowledge/good-passwords</loc><lastmod>2025-11-14</lastmod></url><url><loc>https://kb.cybertecsecurity.com/knowledge/multi-factor-authentication</loc><lastmod>2025-11-14</lastmod></url><url><loc>https://kb.cybertecsecurity.com/knowledge/removing-windows-store-apps</loc><lastmod>2025-11-14</lastmod></url><url><loc>https://kb.cybertecsecurity.com/knowledge/agent-setup-for-microsoft-windows</loc><lastmod>2025-11-14</lastmod></url><url><loc>https://kb.cybertecsecurity.com/knowledge/account-separation-requirements</loc><lastmod>2025-11-14</lastmod></url><url><loc>https://kb.cybertecsecurity.com/knowledge/enable-tls-1.2-on-your-windows-device</loc><lastmod>2025-11-14</lastmod></url><url><loc>https://kb.cybertecsecurity.com/knowledge/microsoft-windows-speculative-execution-check</loc><lastmod>2025-11-14</lastmod></url><url><loc>https://kb.cybertecsecurity.com/knowledge/changing-ssh-port-on-applemac</loc><lastmod>2025-11-14</lastmod></url><url><loc>https://kb.cybertecsecurity.com/knowledge/can-i-license-a-ms365-admin-account-for-email</loc><lastmod>2025-11-14</lastmod></url><url><loc>https://kb.cybertecsecurity.com/knowledge/agent-setup-for-linux</loc><lastmod>2025-11-14</lastmod></url><url><loc>https://kb.cybertecsecurity.com/knowledge/end-of-life-definition</loc><lastmod>2025-11-14</lastmod></url><url><loc>https://kb.cybertecsecurity.com/knowledge/what-devices-are-in-scope-in-cyber-essentials</loc><lastmod>2025-11-14</lastmod></url><url><loc>https://kb.cybertecsecurity.com/knowledge/disabling-tls-1.0</loc><lastmod>2025-11-14</lastmod></url><url><loc>https://kb.cybertecsecurity.com/knowledge/mail-filtering-recommendations</loc><lastmod>2025-11-14</lastmod></url><url><loc>https://kb.cybertecsecurity.com/knowledge/vulnerability-scanning-for-assessments</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://kb.cybertecsecurity.com/knowledge/what-do-our-assessors-see</loc><lastmod>2025-11-14</lastmod></url><url><loc>https://kb.cybertecsecurity.com/knowledge/cyber-tec-secuity-sub-processors</loc><lastmod>2025-11-14</lastmod></url><url><loc>https://kb.cybertecsecurity.com/knowledge/my-mac-asks-for-credentials-to-elevate-surely-that-is-secure</loc><lastmod>2025-11-14</lastmod></url><url><loc>https://kb.cybertecsecurity.com/knowledge/microsoft-store-apps-vulnerability-issues</loc><lastmod>2025-11-14</lastmod></url><url><loc>https://kb.cybertecsecurity.com/knowledge/preparing-for-assessment</loc><lastmod>2026-03-16</lastmod></url><url><loc>https://kb.cybertecsecurity.com/knowledge/pen-testing-risks</loc><lastmod>2025-11-14</lastmod></url><url><loc>https://kb.cybertecsecurity.com/knowledge/pin-enforcement-on-microsoft-365</loc><lastmod>2025-11-14</lastmod></url><url><loc>https://kb.cybertecsecurity.com/knowledge/windows-software-restriction-policy</loc><lastmod>2025-11-14</lastmod></url><url><loc>https://kb.cybertecsecurity.com/knowledge/disabling-smbv1</loc><lastmod>2026-03-06</lastmod></url><url><loc>https://kb.cybertecsecurity.com/knowledge/microsoft-office-unsupported-channel-version</loc><lastmod>2025-11-14</lastmod></url><url><loc>https://kb.cybertecsecurity.com/knowledge/sudo-/-sudoers-check-in-linux</loc><lastmod>2025-11-14</lastmod></url><url><loc>https://kb.cybertecsecurity.com/knowledge/qualys-technical-template-setup</loc><lastmod>2025-11-14</lastmod></url><url><loc>https://kb.cybertecsecurity.com/knowledge/creating-a-windows-admin-account</loc><lastmod>2025-11-14</lastmod></url><url><loc>https://kb.cybertecsecurity.com/knowledge/openvpn-as-a-service</loc><lastmod>2025-11-14</lastmod></url><url><loc>https://kb.cybertecsecurity.com/knowledge/linux-authentication-scanning-setup</loc><lastmod>2025-11-14</lastmod></url><url><loc>https://kb.cybertecsecurity.com/knowledge/raspberry-pi-requirements</loc><lastmod>2025-11-14</lastmod></url><url><loc>https://kb.cybertecsecurity.com/knowledge/what-are-the-best-practises-regarding-patching</loc><lastmod>2025-11-14</lastmod></url><url><loc>https://kb.cybertecsecurity.com/knowledge/microsoft-365-mfa-check</loc><lastmod>2026-02-19</lastmod></url><url><loc>https://kb.cybertecsecurity.com/knowledge/microsoft-windows-workstation-scanning-setup</loc><lastmod>2025-11-14</lastmod></url><url><loc>https://kb.cybertecsecurity.com/knowledge/azuread-common-password-blocking</loc><lastmod>2025-11-14</lastmod></url><url><loc>https://kb.cybertecsecurity.com/knowledge/unquoted-service-paths</loc><lastmod>2025-11-14</lastmod></url><url><loc>https://kb.cybertecsecurity.com/knowledge/remove-xbox-game-bar</loc><lastmod>2025-11-14</lastmod></url><url><loc>https://kb.cybertecsecurity.com/knowledge/qualys-ce-report-creation</loc><lastmod>2025-11-14</lastmod></url><url><loc>https://kb.cybertecsecurity.com/knowledge/surely-sudo-is-ok</loc><lastmod>2025-11-14</lastmod></url><url><loc>https://kb.cybertecsecurity.com/knowledge/disabling-registry-editor-for-users</loc><lastmod>2025-11-14</lastmod></url><url><loc>https://kb.cybertecsecurity.com/knowledge/kb-search-results</loc><lastmod>2025-11-14</lastmod></url><url><loc>https://kb.cybertecsecurity.com/knowledge/linux-adding-a-scanadmin-user</loc><lastmod>2025-11-14</lastmod></url><url><loc>https://kb.cybertecsecurity.com/knowledge/home-workers-info</loc><lastmod>2025-11-14</lastmod></url><url><loc>https://kb.cybertecsecurity.com/knowledge/what-security-controls-are-required-for-cloud-services</loc><lastmod>2025-11-14</lastmod></url><url><loc>https://kb.cybertecsecurity.com/knowledge/saq-helpers</loc><lastmod>2025-11-14</lastmod></url><url><loc>https://kb.cybertecsecurity.com/knowledge/enabling-cvss-within-qualys</loc><lastmod>2025-11-14</lastmod></url><url><loc>https://kb.cybertecsecurity.com/knowledge/kb-404</loc><lastmod>2025-11-14</lastmod></url><url><loc>https://kb.cybertecsecurity.com/knowledge/disabling-command-prompt-via-intune/endpoint-manager</loc><lastmod>2025-11-14</lastmod></url><url><loc>https://kb.cybertecsecurity.com/knowledge/contactor-devices-in-scope</loc><lastmod>2025-11-14</lastmod></url><url><loc>https://kb.cybertecsecurity.com/knowledge/descoped-networks</loc><lastmod>2025-11-14</lastmod></url><url><loc>https://kb.cybertecsecurity.com/knowledge/using-you-own-nessus-professional</loc><lastmod>2025-11-14</lastmod></url><url><loc>https://kb.cybertecsecurity.com/knowledge/enable-tls-1.1-on-windows</loc><lastmod>2025-11-14</lastmod></url><url><loc>https://kb.cybertecsecurity.com/knowledge/shared-local-admin-accounts-for-devices</loc><lastmod>2025-11-14</lastmod></url><url><loc>https://kb.cybertecsecurity.com/knowledge/setup-assessment-vpn-for-linux</loc><lastmod>2025-11-14</lastmod></url><url><loc>https://kb.cybertecsecurity.com/knowledge/testing-wmi</loc><lastmod>2025-11-14</lastmod></url><url><loc>https://kb.cybertecsecurity.com/knowledge/qualys-installation-batch-file</loc><lastmod>2025-11-14</lastmod></url><url><loc>https://kb.cybertecsecurity.com/knowledge/install-ssh-on-linux</loc><lastmod>2025-11-14</lastmod></url><url><loc>https://kb.cybertecsecurity.com/knowledge/setup-assessment-vpn-for-windows</loc><lastmod>2025-11-14</lastmod></url><url><loc>https://kb.cybertecsecurity.com/knowledge/cyber-essentials-plus-testing</loc><lastmod>2025-11-14</lastmod></url><url><loc>https://kb.cybertecsecurity.com/knowledge/2fa/mfa-in-school</loc><lastmod>2025-11-14</lastmod></url><url><loc>https://kb.cybertecsecurity.com/knowledge/windows-recovery-environment-cve-2024-38163</loc><lastmod>2025-11-14</lastmod></url><url><loc>https://kb.cybertecsecurity.com/knowledge/mac-os-enabling-ssh</loc><lastmod>2025-11-14</lastmod></url><url><loc>https://kb.cybertecsecurity.com/knowledge/disabling-cipher-suites</loc><lastmod>2025-11-14</lastmod></url><url><loc>https://kb.cybertecsecurity.com/knowledge/easy-qualys-manual-install-windows</loc><lastmod>2025-11-14</lastmod></url><url><loc>https://kb.cybertecsecurity.com/knowledge/usable-ip-addresses-for-scanning</loc><lastmod>2025-11-14</lastmod></url></urlset>