<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//buildbreaksecure.org/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://buildbreaksecure.org/</loc>
		<lastmod>2025-06-02T04:09:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/visualize-sign-in-failures-due-to-conditional-access-policy/</loc>
		<lastmod>2025-05-16T09:15:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/list-data-connector-failures-in-the-last-three-days/</loc>
		<lastmod>2025-05-16T09:16:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/visualize-time-of-last-password-reset/</loc>
		<lastmod>2025-05-16T09:16:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/list-sign-ins-by-useragent/</loc>
		<lastmod>2025-05-16T09:17:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/visualize-mitre-attck-tactics-triggered-on-microsoft-sentinel-incidents/</loc>
		<lastmod>2025-05-16T09:17:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/list-all-role-additions/</loc>
		<lastmod>2025-05-16T09:18:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/list-all-global-admins-in-your-tenant/</loc>
		<lastmod>2025-05-16T09:18:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/visualize-daily-events-for-each-table/</loc>
		<lastmod>2025-05-16T09:18:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/visualize-daily-incident-triggers/</loc>
		<lastmod>2025-05-16T09:19:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/visualize-devices-that-initiate-the-most-cleartext-ldap-authentications/</loc>
		<lastmod>2025-05-16T09:19:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/list-most-triggered-incidents/</loc>
		<lastmod>2025-05-16T09:20:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/list-analytics-rules-failures/</loc>
		<lastmod>2025-05-16T09:20:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/list-analytics-rules-efficiency/</loc>
		<lastmod>2025-05-16T09:20:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/list-top-n-accounts-longest-period-without-password-reset/</loc>
		<lastmod>2025-05-16T09:20:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/list-statistics-of-on-boarded-devices-per-operating-system/</loc>
		<lastmod>2025-05-16T09:21:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/list-recently-found-devices-that-can-be-on-boarded/</loc>
		<lastmod>2025-05-16T09:21:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/list-on-boarded-devices-in-intune-and-microsoft-defender-for-endpoint/</loc>
		<lastmod>2025-05-16T09:22:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/list-new-useragent-used-based-on-signinlogs/</loc>
		<lastmod>2025-05-16T09:22:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/hunt-for-suspicious-smb-sessions/</loc>
		<lastmod>2025-05-16T09:23:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/visualize-antivirus-detection-by-day/</loc>
		<lastmod>2025-05-16T09:23:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/visualize-top-100-users-that-have-the-most-interactive-sign-ins/</loc>
		<lastmod>2025-05-16T09:23:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/hunt-for-newly-identified-lateral-movement-paths-to-sensitive-accounts/</loc>
		<lastmod>2025-05-16T09:24:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/list-successful-sign-in-from-a-new-country/</loc>
		<lastmod>2025-05-16T09:24:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/list-guest-users-with-azure-active-directory-roles/</loc>
		<lastmod>2025-05-16T09:25:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/list-top-10-users-with-the-most-ip-addresses-used-to-successfully-sign-in/</loc>
		<lastmod>2025-05-16T09:25:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/list-total-successful-sign-ins-by-operating-system/</loc>
		<lastmod>2025-05-16T09:26:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/list-security-alerts-triggered-by-users-at-risk/</loc>
		<lastmod>2025-05-16T09:26:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/hunt-for-malicious-http-traffic/</loc>
		<lastmod>2025-05-16T09:27:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/visualize-user-risk-in-the-last-90-days/</loc>
		<lastmod>2025-05-16T09:28:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/list-potential-adversary-in-the-middle-phishing/</loc>
		<lastmod>2025-05-16T09:28:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/list-total-events-by-table/</loc>
		<lastmod>2025-05-16T09:29:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/list-total-number-of-incidents-daily/</loc>
		<lastmod>2025-05-16T09:29:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/list-total-successful-sign-ins-by-browser/</loc>
		<lastmod>2025-05-16T09:29:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/list-conditional-access-policy-that-have-been-deleted/</loc>
		<lastmod>2025-05-16T09:30:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/list-conditional-access-policy-that-was-changed/</loc>
		<lastmod>2025-05-16T09:31:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/list-conditional-access-application-sign-in-failure/</loc>
		<lastmod>2025-05-16T09:31:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/detect-smb-file-copies/</loc>
		<lastmod>2025-05-16T09:32:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/list-data-connector-changed-from-failed-to-success-state/</loc>
		<lastmod>2025-05-16T09:33:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/list-conditional-access-user-sign-in-failure/</loc>
		<lastmod>2025-05-16T09:33:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/list-data-connector-changed-from-success-to-failed-state/</loc>
		<lastmod>2025-05-16T09:33:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/list-internet-facing-devices-with-vulnerabilities-that-have-an-exploit-available/</loc>
		<lastmod>2025-05-16T09:34:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/list-potential-kerberos-encryption-downgrade/</loc>
		<lastmod>2025-05-16T09:35:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/hunt-for-possible-web-shell-on-the-endpoint/</loc>
		<lastmod>2025-05-16T09:35:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/list-executable-email-attachment-received/</loc>
		<lastmod>2025-05-16T09:35:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/list-domain-user-account-added-to-sensitive-group-using-command-line/</loc>
		<lastmod>2025-05-16T09:36:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/list-malicious-network-traffic-detected-from-lan-to-wan-by-fortinet/</loc>
		<lastmod>2025-05-16T09:37:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/list-malicious-dns-name-detected-based-on-threat-intelligence-indicators-by-fortinet/</loc>
		<lastmod>2025-05-16T09:38:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/list-unwanted-or-malicious-applications-detected-by-fortinet/</loc>
		<lastmod>2025-05-16T09:39:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/detect-macro-attachment-opened-from-rare-sender/</loc>
		<lastmod>2025-05-16T09:39:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/list-local-user-account-created/</loc>
		<lastmod>2025-05-16T09:40:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/detect-runas-commands-with-saved-credentials/</loc>
		<lastmod>2025-05-16T09:41:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/hunt-for-potential-phishing-campaign/</loc>
		<lastmod>2025-05-16T09:43:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/list-user-account-added-to-sudoers-group/</loc>
		<lastmod>2025-05-16T09:43:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/list-user-account-added-to-sensitive-group/</loc>
		<lastmod>2025-05-16T09:44:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/list-user-account-added-to-administrators-group/</loc>
		<lastmod>2025-05-16T09:44:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/detect-scattered-spider-defense-evasion-via-conditional-access-policies/</loc>
		<lastmod>2025-05-16T09:45:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/detect-user-account-created-using-command-line/</loc>
		<lastmod>2025-05-16T09:45:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/list-triggered-safe-links-email-url-block/</loc>
		<lastmod>2025-05-16T09:46:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/list-automatically-closed-incidents/</loc>
		<lastmod>2025-05-16T09:54:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/nbi-data-breach-exposes-millions-of-filipino-records/</loc>
		<lastmod>2025-05-17T06:57:30+00:00</lastmod>
		<image:image>
			<image:loc>https://buildbreaksecure.org/wp-content/uploads/nbi-data-breach-exposes-millions-of-filipino-records.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://buildbreaksecure.org/wp-content/uploads/nbi-data-breach-exposes-millions-of-filipino-records-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://buildbreaksecure.org/wp-content/uploads/nbi-data-breach-exposes-millions-of-filipino-records-02.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/hunt-for-suspicious-encoded-powershell/</loc>
		<lastmod>2025-05-17T07:39:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/list-powershell-invoke-webrequest-execution/</loc>
		<lastmod>2025-05-17T07:39:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/detect-powershell-launching-scripts-from-windowsapps-directory-fin7/</loc>
		<lastmod>2025-05-17T07:40:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/microsoft-defender-xdr-error-exposes-1700-corporate-documents-in-public-leak/</loc>
		<lastmod>2025-05-18T03:01:30+00:00</lastmod>
		<image:image>
			<image:loc>https://buildbreaksecure.org/wp-content/uploads/defender0001.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/mitres-cve-program-gets-funding-extension-just-in-time/</loc>
		<lastmod>2025-05-18T03:02:25+00:00</lastmod>
		<image:image>
			<image:loc>https://buildbreaksecure.org/wp-content/uploads/mitres-cve-program-gets-funding-extension-just-in-time-01-e1747795759832.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://buildbreaksecure.org/wp-content/uploads/mitres-cve-program-gets-funding-extension-just-in-time-02-scaled.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/mitres-cve-contract-expires-internal-memo-leaked/</loc>
		<lastmod>2025-05-18T03:04:04+00:00</lastmod>
		<image:image>
			<image:loc>https://buildbreaksecure.org/wp-content/uploads/news20250416.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/monitor-active-cisa-exploited-cves-using-this-kql-query/</loc>
		<lastmod>2025-05-20T03:09:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/list-website-connections-allowed-by-symantec-endpoint-protection/</loc>
		<lastmod>2025-05-20T03:14:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/detect-malicious-scan-attempts-using-kql-in-symantec-endpoint-protection-logs/</loc>
		<lastmod>2025-05-20T03:14:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/list-unblocked-ngrok-activity-logged-by-symantec-endpoint-protection/</loc>
		<lastmod>2025-05-20T03:15:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/detect-adware-events-using-kql-in-symantec-endpoint-protection-logs/</loc>
		<lastmod>2025-05-20T03:15:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/detect-filezilla-sftp-risks-with-kql-in-symantec-logs/</loc>
		<lastmod>2025-05-20T03:15:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/detect-malicious-files-using-kql-in-vmware-carbon-black-app-control/</loc>
		<lastmod>2025-05-20T03:15:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/detect-suspicious-files-with-vmware-carbon-black-using-kql-query/</loc>
		<lastmod>2025-05-20T03:15:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/detect-banned-files-written-to-computer-using-kql-in-vmware-carbon-black-app-control/</loc>
		<lastmod>2025-05-20T03:15:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/kql-to-detect-suspicious-process-website-access-not-blocked-by-symantec/</loc>
		<lastmod>2025-05-20T03:15:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/monitoring-tamper-protection-triggers-via-kql-in-microsoft-sentinel/</loc>
		<lastmod>2025-05-20T03:15:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/suspicious-directory-traversal-detection-using-kql-in-symantec-logs/</loc>
		<lastmod>2025-05-20T03:16:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/list-p2p-torrent-traffic-not-blocked-by-symantec-endpoint-protection/</loc>
		<lastmod>2025-05-20T03:16:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/list-untrusted-ssh-file-transfer-protocol-connection-not-blocked-by-symantec-endpoint-protection/</loc>
		<lastmod>2025-05-20T03:16:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/detect-microsoft-teams-large-data-transfer-using-kql/</loc>
		<lastmod>2025-05-20T03:16:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/list-anti-malware-scan-interface-script-detection/</loc>
		<lastmod>2025-05-20T03:17:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/list-cloud-discovery-performed-by-user-at-risk/</loc>
		<lastmod>2025-05-20T03:17:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/list-cloud-persistence-activities-by-user-at-risk/</loc>
		<lastmod>2025-05-20T03:17:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/azure-monitor-agent-connector-failure-detection-with-kql/</loc>
		<lastmod>2025-05-20T03:18:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/hunt-for-all-executed-ldap-queries-from-a-compromised-device/</loc>
		<lastmod>2025-05-20T03:18:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/detect-anomalous-amount-of-ldap-traffic/</loc>
		<lastmod>2025-05-20T03:18:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/detect-anomalous-group-policy-discovery/</loc>
		<lastmod>2025-05-20T03:18:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/detect-azure-monitor-agent-connector-failures-in-commonsecuritylog/</loc>
		<lastmod>2025-05-20T03:19:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/investigate-brute-force-logins-followed-by-password-changes-using-kql/</loc>
		<lastmod>2025-05-20T03:19:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/identify-log-ingestion-delays-by-device-in-commonsecuritylog-with-kql/</loc>
		<lastmod>2025-05-20T03:19:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/top-mitre-techniques-triggered-using-kql-in-sentinel-and-defender/</loc>
		<lastmod>2025-05-20T03:19:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/list-ingestion-delays-of-all-analytics-rules/</loc>
		<lastmod>2025-05-20T03:20:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/kql-query-for-mitre-attck-techniques-on-microsoft-sentinel-incidents/</loc>
		<lastmod>2025-05-20T03:20:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/kql-query-to-monitor-password-never-expire-account-changes/</loc>
		<lastmod>2025-05-20T03:20:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/analyze-syslog-ingestion-delays-in-microsoft-sentinel-with-kql/</loc>
		<lastmod>2025-05-20T03:20:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/active-directory-group-additions-tracking-with-kql-queries/</loc>
		<lastmod>2025-05-20T03:21:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/detect-microsoft-teams-large-data-transfer-using-kql-v1-1/</loc>
		<lastmod>2025-05-20T06:07:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/troubleshooting-data-ingestion-lag-in-microsoft-sentinel-from-zscaler-logs/</loc>
		<lastmod>2025-05-21T00:37:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/powershell-finds-its-voice-talking-scripts-are-now-a-thing/</loc>
		<lastmod>2025-05-22T01:12:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/determining-the-right-time-to-implement-microsoft-sentinel/</loc>
		<lastmod>2025-05-23T03:56:23+00:00</lastmod>
		<image:image>
			<image:loc>https://buildbreaksecure.org/wp-content/uploads/determining-the-right-time-to-implement-microsoft-sentinel-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/what-is-break/</loc>
		<lastmod>2025-05-23T03:56:24+00:00</lastmod>
		<image:image>
			<image:loc>https://buildbreaksecure.org/wp-content/uploads/what-is-break-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/crafting-your-cyber-domain-without-breaking-the-bank/</loc>
		<lastmod>2025-05-23T03:56:26+00:00</lastmod>
		<image:image>
			<image:loc>https://buildbreaksecure.org/wp-content/uploads/005-title.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/safeguarding-our-childrens-online-presence-a-guide-to-homelab-protection/</loc>
		<lastmod>2025-05-23T03:56:27+00:00</lastmod>
		<image:image>
			<image:loc>https://buildbreaksecure.org/wp-content/uploads/004-title.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/why-i-started-a-homelab/</loc>
		<lastmod>2025-05-23T03:56:28+00:00</lastmod>
		<image:image>
			<image:loc>https://buildbreaksecure.org/wp-content/uploads/whyistartedmyhomelab.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/why-start-a-homelab/</loc>
		<lastmod>2025-05-23T03:56:29+00:00</lastmod>
		<image:image>
			<image:loc>https://buildbreaksecure.org/wp-content/uploads/whystartahomelab-title.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://buildbreaksecure.org/wp-content/uploads/coding-2-scaled.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://buildbreaksecure.org/wp-content/uploads/customization-scaled.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://buildbreaksecure.org/wp-content/uploads/advancement.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://buildbreaksecure.org/wp-content/uploads/innovation.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://buildbreaksecure.org/wp-content/uploads/piggybank.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/what-is-a-homelab/</loc>
		<lastmod>2025-05-23T03:56:30+00:00</lastmod>
		<image:image>
			<image:loc>https://buildbreaksecure.org/wp-content/uploads/whatisahomelab-title.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://buildbreaksecure.org/wp-content/uploads/messylab.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://buildbreaksecure.org/wp-content/uploads/coding-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/harden-windows-server-2025-baseline-settings-you-need-to-know/</loc>
		<lastmod>2025-05-23T04:11:40+00:00</lastmod>
		<image:image>
			<image:loc>https://buildbreaksecure.org/wp-content/uploads/harden-windows-server-2025-baseline-settings-you-need-to-know-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/windows-11-24h2-gpo-security-changes-explained/</loc>
		<lastmod>2025-05-23T04:12:11+00:00</lastmod>
		<image:image>
			<image:loc>https://buildbreaksecure.org/wp-content/uploads/windows-11-24h2-gpo-security-changes-explained-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/how-to-detect-and-prevent-kerberoasting-in-active-directory-environments/</loc>
		<lastmod>2025-05-23T07:07:15+00:00</lastmod>
		<image:image>
			<image:loc>https://buildbreaksecure.org/wp-content/uploads/how-to-detect-and-prevent-kerberoasting-in-active-directory-environments-01.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/how-as-rep-roasting-exploits-active-directory-and-ways-to-stop-it/</loc>
		<lastmod>2025-05-23T07:26:09+00:00</lastmod>
		<image:image>
			<image:loc>https://buildbreaksecure.org/wp-content/uploads/how-as-rep-roasting-exploits-active-directory-and-ways-to-stop-it-01.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/how-to-prevent-password-spraying-attacks-on-active-directory-accounts/</loc>
		<lastmod>2025-05-23T07:33:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/how-to-detect-and-mitigate-machineaccountquota-attacks-in-active-directory/</loc>
		<lastmod>2025-05-23T07:44:16+00:00</lastmod>
		<image:image>
			<image:loc>https://buildbreaksecure.org/wp-content/uploads/how-to-detect-and-mitigate-machineaccountquota-attacks-in-active-directory-01.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/detecting-and-preventing-unconstrained-delegation-exploits-in-active-directory/</loc>
		<lastmod>2025-05-23T08:00:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/learn-how-attackers-exploit-gpp-cpasswords-in-active-directory-and-discover-practical-mitigation-techniques/</loc>
		<lastmod>2025-05-23T08:10:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/understanding-active-directory-certificate-services-compromise-vectors/</loc>
		<lastmod>2025-05-23T08:34:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/golden-certificate-attacks-in-active-directory-explained-and-defended/</loc>
		<lastmod>2025-05-23T08:42:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/microsoft-telnet-server-bug-lets-attackers-bypass-guest-login-restrictions/</loc>
		<lastmod>2025-05-23T18:02:43+00:00</lastmod>
		<image:image>
			<image:loc>https://buildbreaksecure.org/wp-content/uploads/telnet0001.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/detect-qr-code-based-phishing-with-kql-in-microsoft-defender-xdr/</loc>
		<lastmod>2025-05-23T18:04:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/automate-security-operations-with-microsoft-power-automate/</loc>
		<lastmod>2025-06-01T14:51:06+00:00</lastmod>
		<image:image>
			<image:loc>https://buildbreaksecure.org/wp-content/uploads/get-started-on-microsoft-power-automate-02.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/get-started-on-microsoft-power-automate/</loc>
		<lastmod>2025-06-01T14:54:04+00:00</lastmod>
		<image:image>
			<image:loc>https://buildbreaksecure.org/wp-content/uploads/get-started-on-microsoft-power-automate-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://buildbreaksecure.org/wp-content/uploads/get-started-on-microsoft-power-automate-02.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://buildbreaksecure.org/wp-content/uploads/get-started-on-microsoft-power-automate-03.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/automate-sentinelone-incident-alerts-to-microsoft-teams-with-power-automate/</loc>
		<lastmod>2025-06-02T00:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://buildbreaksecure.org/wp-content/uploads/automatically-post-new-sentinelone-incidents-to-microsoft-teams-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://buildbreaksecure.org/wp-content/uploads/get-started-on-microsoft-power-automate-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://buildbreaksecure.org/wp-content/uploads/automatically-post-new-sentinelone-incidents-to-microsoft-teams-02.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://buildbreaksecure.org/wp-content/uploads/automatically-post-new-sentinelone-incidents-to-microsoft-teams-04.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://buildbreaksecure.org/wp-content/uploads/automatically-post-new-sentinelone-incidents-to-microsoft-teams-05.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://buildbreaksecure.org/wp-content/uploads/automatically-post-new-sentinelone-incidents-to-microsoft-teams-07.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://buildbreaksecure.org/wp-content/uploads/automatically-post-new-sentinelone-incidents-to-microsoft-teams-08.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://buildbreaksecure.org/wp-content/uploads/automatically-post-new-sentinelone-incidents-to-microsoft-teams-09.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://buildbreaksecure.org/wp-content/uploads/automatically-post-new-sentinelone-incidents-to-microsoft-teams-10.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://buildbreaksecure.org/wp-content/uploads/automatically-post-new-sentinelone-incidents-to-microsoft-teams-11.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://buildbreaksecure.org/wp-content/uploads/automatically-post-new-sentinelone-incidents-to-microsoft-teams-12.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://buildbreaksecure.org/wp-content/uploads/automatically-post-new-sentinelone-incidents-to-microsoft-teams-13.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://buildbreaksecure.org/wp-content/uploads/automatically-post-new-sentinelone-incidents-to-microsoft-teams-15.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://buildbreaksecure.org/streamline-sentinelone-endpoint-scans-with-power-automate/</loc>
		<lastmod>2025-06-02T04:09:07+00:00</lastmod>
		<image:image>
			<image:loc>https://buildbreaksecure.org/wp-content/uploads/automate-sentinelone-disk-scans-with-power-automate-13.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://buildbreaksecure.org/wp-content/uploads/get-started-on-microsoft-power-automate-01.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://buildbreaksecure.org/wp-content/uploads/automatically-post-new-sentinelone-incidents-to-microsoft-teams-02.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://buildbreaksecure.org/wp-content/uploads/automate-sentinelone-disk-scans-with-power-automate-03.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://buildbreaksecure.org/wp-content/uploads/automatically-post-new-sentinelone-incidents-to-microsoft-teams-08.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://buildbreaksecure.org/wp-content/uploads/automatically-post-new-sentinelone-incidents-to-microsoft-teams-07.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://buildbreaksecure.org/wp-content/uploads/automate-sentinelone-disk-scans-with-power-automate-11.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://buildbreaksecure.org/wp-content/uploads/automate-sentinelone-disk-scans-with-power-automate-05.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://buildbreaksecure.org/wp-content/uploads/automate-sentinelone-disk-scans-with-power-automate-06.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://buildbreaksecure.org/wp-content/uploads/automate-sentinelone-disk-scans-with-power-automate-07.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://buildbreaksecure.org/wp-content/uploads/automate-sentinelone-disk-scans-with-power-automate-10.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://buildbreaksecure.org/wp-content/uploads/automate-sentinelone-disk-scans-with-power-automate-08.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://buildbreaksecure.org/wp-content/uploads/automate-sentinelone-disk-scans-with-power-automate-09.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://buildbreaksecure.org/wp-content/uploads/automate-sentinelone-disk-scans-with-power-automate-14.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://buildbreaksecure.org/wp-content/uploads/automatically-post-new-sentinelone-incidents-to-microsoft-teams-13.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://buildbreaksecure.org/wp-content/uploads/automate-sentinelone-disk-scans-with-power-automate-15.jpg</image:loc>
		</image:image>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->