<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://blog.ciaops.com/2026/04/03/whats-actually-happening-to-msps/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/04/image_thumb-16.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/04/image-16.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2026-04-03T09:13:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2026/04/01/change-the-way-enter-works-when-writing-a-message-in-teams/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/04/image_thumb-7.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/04/image-7.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2026-04-01T23:53:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2026/04/04/mastering-teams-meetings-with-copilot/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/04/image_thumb-6.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/04/image-6.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2026-04-01T10:40:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2026/04/03/five-microsoft-teams-features-most-people-still-arent-using-but-should-be/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/04/image_thumb-4.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/04/image-4.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2026-04-01T05:48:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2026/04/02/why-ai-doesnt-give-the-same-answer-twice-and-why-thats-not-a-bug/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/04/image_thumb-3.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/04/image-3.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2026-04-01T01:12:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2026/04/01/you-already-have-copilot-youre-just-not-using-it-yet/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/04/image_thumb-2.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/04/image-2.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2026-03-31T23:53:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2026/03/31/ai-guilt-is-the-wrong-question-but-the-right-wake-up-call/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/03/image_thumb-59.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/03/image-59.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2026-03-31T10:14:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2026/03/31/march-microsoft-365-webinar-resources-7/</loc><lastmod>2026-03-31T05:27:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2026/03/27/new-publication-microsoft-defender-for-business-implementation-guide/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/03/blog_thumb-7.png</image:loc><image:title>blog_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/03/blog-7.png</image:loc><image:title>blog.png</image:title></image:image><lastmod>2026-03-26T04:32:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2026/03/26/its-not-about-more-information-and-there-is-no-magic-tactic/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/03/image_thumb-50.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/03/image-50.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2026-03-25T21:26:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2026/03/24/this-is-the-reality-now/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/03/image_thumb-47.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/03/image-47.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2026-03-23T19:19:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2026/03/23/why-microsoft-copilot-wins-because-copy-paste-isnt-a-workflow/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/03/image_thumb-46.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/03/image-46.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/03/image_thumb-45.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/03/image-45.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2026-03-22T21:37:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2026/03/22/cia-brief-20260322/</loc><lastmod>2026-03-22T00:53:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2026/03/18/new-publication-microsoft-intune-complete-getting-started-guide-for-msp-technicians/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/03/blog_thumb-6.png</image:loc><image:title>blog_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/03/blog-6.png</image:loc><image:title>blog.png</image:title></image:image><lastmod>2026-03-17T20:43:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2026/03/15/cia-brief-20260315/</loc><lastmod>2026-03-14T21:04:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2026/04/04/ai-fluency-isnt-optional-anymore-and-microsoft-365-copilot-is-where-it-starts/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/03/image_thumb-29.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/03/image-29.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2026-03-13T07:37:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2026/04/02/if-you-check-email-more-often-than-you-prompt-ai-youre-probably-falling-behind/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/03/image_thumb-28.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/03/image-28.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2026-03-13T07:24:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2026/04/03/grc-in-a-nutshell-and-how-microsoft-365-actually-makes-it-practical/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/03/image_thumb-27.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/03/image-27.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2026-03-13T07:06:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2026/04/01/why-running-your-msp-on-hard-mode-is-slowly-killing-it/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/03/image_thumb-26.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/03/image-26.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2026-03-13T06:32:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2026/03/13/the-six-human-abilities-that-matter-most-in-the-age-of-ai/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/03/image_thumb-25.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/03/image-25.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2026-03-13T02:02:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2026/03/31/ai-isnt-replacing-msps-its-exposing-the-ones-who-never-built-real-value/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/03/image_thumb-24.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/03/image-24.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2026-03-13T00:24:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2026/03/30/the-real-problem-isnt-the-tool-its-what-you-do-with-it/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/03/image_thumb-23.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/03/image-23.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2026-03-13T00:10:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2026/03/28/the-point-isnt-the-tool-its-what-you-do-with-it/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/03/image_thumb-22.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/03/image-22.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2026-03-13T00:01:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2026/03/27/staying-up-to-date-isnt-a-nice-to-have-for-msps-its-the-job/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/03/image_thumb-21.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/03/image-21.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2026-03-12T23:37:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2026/03/26/effective-time-management-isnt-about-working-harder-its-about-working-like-an-msp/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/03/image_thumb-20.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/03/image-20.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2026-03-12T23:28:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2026/03/25/having-to-say-something-vs-having-something-to-say/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/03/image_thumb-19.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/03/image-19.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2026-03-12T23:20:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2026/03/24/why-the-essential-eight-falls-short-for-microsoft-365-copilot/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/03/image_thumb-18.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/03/image-18.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2026-03-12T09:21:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2026/03/23/the-ai-leverage-gap-msps-cant-ignore-anymore/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/03/image_thumb-17.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/03/image-17.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2026-03-12T05:12:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2026/03/12/new-publication-advanced-ai-prompting-guide-for-microsoft-copilot/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/03/blog_thumb-4.png</image:loc><image:title>blog_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/03/blog-4.png</image:loc><image:title>blog.png</image:title></image:image><lastmod>2026-03-12T05:04:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2026/03/13/from-push-to-pull-a-more-effective-approach-to-prompting/</loc><lastmod>2026-03-12T04:54:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2026/03/22/finding-your-ikigai-as-an-msp-and-why-most-never-do/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/03/screenshot-2026-03-10-105700_thumb.png</image:loc><image:title>Screenshot-2026-03-10-105700_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/03/screenshot-2026-03-10-105700.png</image:loc><image:title>Screenshot-2026-03-10-105700.png</image:title></image:image><lastmod>2026-03-09T23:58:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2026/03/21/ai-isnt-killing-human-engagement-lazy-humans-are/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/03/image_thumb-16.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/03/image-16.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2026-03-09T23:09:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2026/03/20/if-you-want-the-sale-stop-talking-and-start-paying-attention/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/03/image_thumb-15.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/03/image-15.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2026-03-09T22:51:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2026/03/19/but-its-not-the-only-way/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/03/image_thumb-14.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/03/image-14.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2026-03-09T22:16:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2026/03/18/from-promises-to-proof-why-the-old-msp-sales-model-is-dead/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/03/image_thumb-13.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/03/image-13.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2026-03-09T22:05:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2026/03/17/scarcity-makes-you-chase-demand-lets-you-choose/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/03/image_thumb-12.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/03/image-12.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2026-03-09T21:59:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2026/03/16/the-new-msp-model-find-a-window-throw-a-brick/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/03/image_thumb-11.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/03/image-11.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2026-03-09T12:46:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2026/03/15/if-your-msp-sounds-like-everyone-else-it-doesnt-belong-in-the-market/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/03/image_thumb-10.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/03/image-10.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2026-03-09T12:35:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2026/03/14/youre-doing-sales-because-you-failed-at-marketing/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/03/image_thumb-9.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/03/image-9.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2026-03-09T12:28:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2026/03/13/im-watching-business-owners-work-harder-than-ever-and-get-less-done/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/03/image_thumb-8.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/03/image-8.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2026-03-13T03:20:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2026/03/12/why-finding-good-staff-isnt-the-real-problem-for-msps/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/03/image_thumb-7.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/03/image-7.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2026-03-09T11:47:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2026/03/11/ai-job-losses-and-the-fear-narrative-we-keep-getting-wrong/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/03/image_thumb-6.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/03/image-6.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2026-03-09T10:17:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2026/03/10/copilot-isnt-replacing-you-its-replacing-the-worst-parts-of-your-job/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/03/image_thumb-5.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/03/image-5.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2026-03-09T08:57:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2026/03/09/proving-roi-on-ai-simple-measures-that-actually-matter-for-small-business/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/03/image_thumb-4.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/03/image-4.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2026-03-08T22:03:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2026/03/08/cia-brief-20260308/</loc><lastmod>2026-03-08T12:06:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2026/03/08/why-you-should-stop-push-prompting-and-start-pull-prompting-your-ai/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/03/blog_thumb-3.png</image:loc><image:title>blog_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/03/blog-3.png</image:loc><image:title>blog.png</image:title></image:image><lastmod>2026-03-07T03:22:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2026/03/07/image-generation-analysis/</loc><lastmod>2026-03-06T21:52:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2026/03/07/comparing-ai-services-image-generation/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/03/image_thumb-3.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/03/image-3.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/03/image_thumb.jpg</image:loc><image:title>image_thumb.jpg</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/03/image.jpg</image:loc><image:title>image.jpg</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/03/image_thumb-2.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/03/image-2.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/03/espresso_technical_infographic_thumb.png</image:loc><image:title>espresso_technical_infographic_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/03/espresso_technical_infographic.png</image:loc><image:title>espresso_technical_infographic.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/03/blog_thumb-2.png</image:loc><image:title>blog_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/03/blog-2.png</image:loc><image:title>blog.png</image:title></image:image><lastmod>2026-03-06T21:26:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2026/03/06/new-publication-achieving-smb10012026-m365-powershell-automation-guide/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/03/blog_thumb-1.png</image:loc><image:title>blog_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/03/blog-1.png</image:loc><image:title>blog.png</image:title></image:image><lastmod>2026-03-06T11:34:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2026/03/03/ciaops-need-to-know-microsoft-365-webinar-march-7/</loc><lastmod>2026-03-02T21:43:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2026/03/03/ciaops-ai-dojo-010/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/03/blog_thumb.png</image:loc><image:title>blog_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/03/blog.png</image:loc><image:title>blog.png</image:title></image:image><lastmod>2026-03-02T21:27:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2026/03/01/cia-brief-20260301/</loc><lastmod>2026-02-28T21:52:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2026/02/25/new-publication-achieving-smb10012026-step-by-step-gui-based-instructions-for-msps-and-it-professionals/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/02/blog_thumb-4.png</image:loc><image:title>blog_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/02/blog-4.png</image:loc><image:title>blog.png</image:title></image:image><lastmod>2026-02-25T02:33:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2026/02/22/cia-brief-20260222/</loc><lastmod>2026-02-22T01:48:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2026/02/20/february-microsoft-365-webinar-resources-4/</loc><lastmod>2026-02-20T01:21:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2026/02/18/need-to-know-podcast-episode-361/</loc><lastmod>2026-02-17T21:12:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2026/02/16/new-publication-achieving-smb10012026-with-m365-business-premium/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/02/achieving-smb1001-2026-cover-blog_thumb.png</image:loc><image:title>achieving-smb1001-2026-cover-blog_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/02/achieving-smb1001-2026-cover-blog.png</image:loc><image:title>achieving-smb1001-2026-cover-blog.png</image:title></image:image><lastmod>2026-02-15T21:08:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2026/02/14/cia-brief-20260214/</loc><lastmod>2026-02-14T04:27:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2026/02/11/new-publication-selling-delivering-microsoft-365-copilot-with-ai-governance-for-smbs/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/02/blog_thumb-3.png</image:loc><image:title>blog_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/02/blog-3.png</image:loc><image:title>blog.png</image:title></image:image><lastmod>2026-02-11T04:38:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2026/02/09/cia-brief-20260209/</loc><lastmod>2026-02-08T20:57:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2026/02/07/unlocking-ai-power-my-first-attempt-at-a-multi-model-prompting-app-with-azure-ai-foundry/</loc><lastmod>2026-02-06T22:44:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2026/02/05/need-to-know-podcast-episode-360/</loc><lastmod>2026-02-05T05:48:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2026/02/05/ciaops-need-to-know-microsoft-365-webinar-february-6/</loc><lastmod>2026-02-04T21:16:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2026/02/05/ciaops-ai-dojo-009/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/02/blog_thumb-2.png</image:loc><image:title>blog_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/02/blog-2.png</image:loc><image:title>blog.png</image:title></image:image><lastmod>2026-02-04T21:05:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2026/02/04/new-publication-monitoring-and-reporting-microsoft-copilot-usage/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/02/blog_thumb-1.png</image:loc><image:title>blog_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/02/blog-1.png</image:loc><image:title>blog.png</image:title></image:image><lastmod>2026-02-04T04:06:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2026/02/02/powershell-script-to-extract-exchange-online-data-for-your-own-ai-analysis/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/02/screenshot-2026-02-01-214046_thumb.png</image:loc><image:title>Screenshot-2026-02-01-214046_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/02/screenshot-2026-02-01-214046.png</image:loc><image:title>Screenshot-2026-02-01-214046.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/02/screenshot-2026-02-01-213701_thumb.png</image:loc><image:title>Screenshot-2026-02-01-213701_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/02/screenshot-2026-02-01-213701.png</image:loc><image:title>Screenshot-2026-02-01-213701.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/02/screenshot-2026-02-01-213303_thumb.png</image:loc><image:title>Screenshot-2026-02-01-213303_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/02/screenshot-2026-02-01-213303.png</image:loc><image:title>Screenshot-2026-02-01-213303.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/02/screenshot-2026-02-01-213211_thumb.png</image:loc><image:title>Screenshot-2026-02-01-213211_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/02/screenshot-2026-02-01-213211.png</image:loc><image:title>Screenshot-2026-02-01-213211.png</image:title></image:image><lastmod>2026-02-01T20:55:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2026/02/01/getting-ai-foundry-local-working/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/02/screenshot-2026-02-01-083943_thumb.png</image:loc><image:title>Screenshot-2026-02-01-083943_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/02/screenshot-2026-02-01-083943.png</image:loc><image:title>Screenshot-2026-02-01-083943.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/02/screenshot-2026-02-01-082856_thumb.png</image:loc><image:title>Screenshot-2026-02-01-082856_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/02/screenshot-2026-02-01-082856.png</image:loc><image:title>Screenshot-2026-02-01-082856.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/02/screenshot-2026-02-01-082717_thumb.png</image:loc><image:title>Screenshot-2026-02-01-082717_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/02/screenshot-2026-02-01-082717.png</image:loc><image:title>Screenshot-2026-02-01-082717.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/02/screenshot-2026-02-01-082530_thumb.png</image:loc><image:title>Screenshot-2026-02-01-082530_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/02/screenshot-2026-02-01-082530.png</image:loc><image:title>Screenshot-2026-02-01-082530.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/02/screenshot-2026-02-01-082356_thumb.png</image:loc><image:title>Screenshot-2026-02-01-082356_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/02/screenshot-2026-02-01-082356.png</image:loc><image:title>Screenshot-2026-02-01-082356.png</image:title></image:image><lastmod>2026-01-31T21:59:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2026/01/31/cia-brief-20260131/</loc><lastmod>2026-01-30T21:48:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2026/01/30/january-microsoft-365-webinar-resources-7/</loc><lastmod>2026-01-30T02:26:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2026/01/28/robert-agent-2025-insights/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/01/bp1_thumb.png</image:loc><image:title>bp1_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/01/bp1.png</image:loc><image:title>bp1.png</image:title></image:image><lastmod>2026-01-28T04:57:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2026/01/27/new-publication-copilot-training-user-enablement-playbook-for-msps/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/01/screenshot-2026-01-27-133052_thumb.png</image:loc><image:title>Screenshot-2026-01-27-133052_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/01/screenshot-2026-01-27-133052.png</image:loc><image:title>Screenshot-2026-01-27-133052.png</image:title></image:image><lastmod>2026-01-27T02:34:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2026/01/26/need-to-know-podcast-episode-359/</loc><lastmod>2026-01-25T21:54:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2026/01/26/unlocking-microsoft-365-security-how-i-automated-ai-powered-risk-analysis-with-powershell/</loc><lastmod>2026-01-25T20:26:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2026/01/25/essential-8-ai-report-via-powershell/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/01/screenshot-2026-01-25-112919_thumb.png</image:loc><image:title>Screenshot-2026-01-25-112919_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/01/screenshot-2026-01-25-112919.png</image:loc><image:title>Screenshot-2026-01-25-112919.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/01/screenshot-2026-01-25-112744_thumb.png</image:loc><image:title>Screenshot-2026-01-25-112744_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/01/screenshot-2026-01-25-112744.png</image:loc><image:title>Screenshot-2026-01-25-112744.png</image:title></image:image><lastmod>2026-01-25T00:33:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2026/01/24/cia-brief-20260124/</loc><lastmod>2026-01-23T22:45:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2026/01/23/powershell-script-to-extract-m365-security-data-for-your-own-ai-analysis/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/01/screenshot-2026-01-23-080158_thumb.png</image:loc><image:title>Screenshot-2026-01-23-080158_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/01/screenshot-2026-01-23-080158.png</image:loc><image:title>Screenshot-2026-01-23-080158.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/01/screenshot-2026-01-23-075229_thumb.png</image:loc><image:title>Screenshot-2026-01-23-075229_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/01/screenshot-2026-01-23-075229.png</image:loc><image:title>Screenshot-2026-01-23-075229.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/01/screenshot-2026-01-23-074702_thumb.png</image:loc><image:title>Screenshot-2026-01-23-074702_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/01/screenshot-2026-01-23-074702.png</image:loc><image:title>Screenshot-2026-01-23-074702.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/01/screenshot-2026-01-23-074545_thumb.png</image:loc><image:title>Screenshot-2026-01-23-074545_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/01/screenshot-2026-01-23-074545.png</image:loc><image:title>Screenshot-2026-01-23-074545.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/01/screenshot-2026-01-23-074402_thumb.png</image:loc><image:title>Screenshot-2026-01-23-074402_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/01/screenshot-2026-01-23-074402.png</image:loc><image:title>Screenshot-2026-01-23-074402.png</image:title></image:image><lastmod>2026-01-22T21:12:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2026/01/22/combining-powershell-and-ai-for-m365-security-analysis/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/01/image_thumb-11.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/01/image-12.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/01/image_thumb-10.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/01/image-11.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/01/image_thumb-9.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/01/image-10.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/01/image_thumb-8.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/01/image-9.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/01/image_thumb-7.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/01/image-8.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2026-01-21T22:19:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2026/01/20/new-publication-ongoing-ai-support-optimization-playbook-for-msps/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/01/ongoing-cover-330_thumb.png</image:loc><image:title>ongoing-cover-330_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/01/ongoing-cover-330.png</image:loc><image:title>ongoing-cover-330.png</image:title></image:image><lastmod>2026-01-19T22:13:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2026/01/18/cia-brief-20260118/</loc><lastmod>2026-01-17T22:22:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2026/01/17/an-example-of-level-1-tech-support-with-copilot/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/01/untitled-picture1.png</image:loc><image:title>Untitled picture1</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/01/untitled-picture-1.png</image:loc><image:title>Untitled picture</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/01/untitled-picture.png</image:loc><image:title>Untitled picture</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/01/image-2.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/01/image_thumb-1.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/01/image-1.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/01/image_thumb.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/01/image.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2026-01-16T22:07:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2026/01/16/flight-school-mastering-copilot-for-it-pros-on-demand/</loc><lastmod>2026-01-16T03:54:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2026/01/14/new-publication-copilot-deployment-playbook-for-msps/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/01/blog_thumb-4.png</image:loc><image:title>blog_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/01/blog-4.png</image:loc><image:title>blog.png</image:title></image:image><lastmod>2026-01-13T22:15:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2026/01/12/my-tech-books-2026/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/01/blog_thumb-3.png</image:loc><image:title>blog_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/01/blog-3.png</image:loc><image:title>blog.png</image:title></image:image><lastmod>2026-01-12T10:56:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2026/01/12/cia-brief-20260112/</loc><lastmod>2026-01-11T21:21:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2026/01/09/my-podcasts-2026/</loc><lastmod>2026-01-09T05:42:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2026/01/09/microsoft-365-copilot-for-small-business-licensing-explained/</loc><lastmod>2026-01-09T03:19:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2026/01/08/my-tech-videos-2026/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/01/blog_thumb-2.png</image:loc><image:title>blog_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/01/blog-2.png</image:loc><image:title>blog.png</image:title></image:image><lastmod>2026-01-08T00:46:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2026/01/07/my-business-books-2026/</loc><lastmod>2026-01-06T22:43:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/resources/</loc><lastmod>2026-01-06T02:04:44+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://blog.ciaops.com/2026/01/06/new-publication-available/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/01/blog_thumb-1.png</image:loc><image:title>blog_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/01/blog-1.png</image:loc><image:title>blog.png</image:title></image:image><lastmod>2026-01-05T21:28:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2026/01/05/ciaops-need-to-know-microsoft-365-webinar-january-7/</loc><lastmod>2026-01-05T02:23:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2026/01/05/ciaops-ai-dojo-008/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/01/bp_thumb.png</image:loc><image:title>bp_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/01/bp.png</image:loc><image:title>bp.png</image:title></image:image><lastmod>2026-01-05T02:15:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2026/01/05/my-business-apps-2026/</loc><lastmod>2026-01-04T22:10:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2026/01/03/cia-brief-20260203/</loc><lastmod>2026-01-02T22:50:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2026/01/03/my-software-and-services-2026/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/01/screenshot-2026-01-03-080936_thumb.png</image:loc><image:title>Screenshot-2026-01-03-080936_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/01/screenshot-2026-01-03-080936.png</image:loc><image:title>Screenshot-2026-01-03-080936.png</image:title></image:image><lastmod>2026-01-02T21:37:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2026/01/02/my-gear-2026/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/01/blog_thumb.png</image:loc><image:title>blog_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2026/01/blog.png</image:loc><image:title>blog.png</image:title></image:image><lastmod>2026-01-01T22:51:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2026/01/01/my-stuff-2026/</loc><lastmod>2025-12-31T22:33:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/12/31/introduction-to-copilot-notebooks/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/12/blog_thumb.png</image:loc><image:title>blog_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/12/blog-5.png</image:loc><image:title>blog.png</image:title></image:image><lastmod>2025-12-30T23:03:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/12/30/november-microsoft-365-webinar-resources-7/</loc><lastmod>2025-12-30T02:42:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/12/26/unlock-new-revenue-with-ai-the-ultimate-playbook-for-msps-serving-smbs/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/12/cover440_thumb.png</image:loc><image:title>cover440_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/12/cover440.png</image:loc><image:title>cover440.png</image:title></image:image><lastmod>2025-12-25T21:51:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/12/23/m365-business-premium-compliance-guide-from-ciaops/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/12/design-6_thumb.png</image:loc><image:title>Design-6_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/12/design-6.png</image:loc><image:title>Design-6.png</image:title></image:image><lastmod>2025-12-22T21:13:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/12/27/step-by-step-program-for-msps-to-fulfill-priority-7-with-microsoft-365-business-premium/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/12/blog-4.png</image:loc><image:title>blog</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/12/image-11.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/12/image-13.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/12/image-12.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-12-21T21:19:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/12/26/step-by-step-program-to-achieve-priority-6-with-microsoft-365-business-premium/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/12/blog-3.png</image:loc><image:title>blog</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/12/image-10.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-12-21T20:59:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/12/25/step-by-step-program-to-achieve-priority-5-with-microsoft-365-business-premium/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/12/blog-2.png</image:loc><image:title>blog</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/12/image-9.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-12-20T23:15:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/12/21/cia-brief-20251221/</loc><lastmod>2025-12-20T20:51:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/12/24/step-by-step-program-to-achieve-priority-4-with-microsoft-365-business-premium/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/12/bp-3.png</image:loc><image:title>bp</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/12/image-8.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-12-20T09:09:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/12/23/step-by-step-program-to-achieve-priority-3-with-microsoft-365-business-premium/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/12/bp-2.png</image:loc><image:title>bp</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/12/image-7.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-12-20T04:59:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/12/22/step-by-step-program-to-achieve-priority-2-with-microsoft-365-business-premium/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/12/bp-1.png</image:loc><image:title>bp</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/12/image-6.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-12-20T04:40:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/12/21/step-by-step-program-for-msps-to-fulfill-priority-1-with-microsoft-365-business-premium/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/12/blog-1.png</image:loc><image:title>blog</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/12/image-5.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-12-20T00:36:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/12/20/key-priorities-for-msps-in-2026-a-global-outlook-smb-focus/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/12/blog.png</image:loc><image:title>blog</image:title></image:image><lastmod>2025-12-19T20:28:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/12/19/how-to-configure-microsoft-365-business-premium-to-block-ai-browsers-a-complete-guide-to-stopping-comet-and-other-agentic-browsers/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/12/image-1.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/12/image-4.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/12/image-3.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/12/image-2.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-12-18T21:43:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/12/18/incident-response-plan-with-m365-publication/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/12/insta-550_thumb.png</image:loc><image:title>Insta-550_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/12/insta-550.png</image:loc><image:title>Insta-550.png</image:title></image:image><lastmod>2025-12-18T04:23:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/12/17/need-to-know-podcast-episode-357/</loc><lastmod>2025-12-17T00:04:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/12/14/cia-brief-20251214/</loc><lastmod>2025-12-13T22:48:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/12/08/implementing-acsc-essential-eight-maturity-level-3-with-microsoft-365-business-premium-publication/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/12/bp_thumb.png</image:loc><image:title>bp_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/12/bp.png</image:loc><image:title>bp.png</image:title></image:image><lastmod>2025-12-08T06:07:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/12/06/cia-brief-20251206/</loc><lastmod>2025-12-05T22:01:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/12/02/ciaops-need-to-know-microsoft-365-webinar-december-7/</loc><lastmod>2025-12-02T01:01:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/12/02/ciaops-ai-dojo-006/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/12/image_thumb.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/12/image.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2025-12-02T04:29:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/07/03/does-a-m365-copilot-license-include-message-quotas/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/07/bp1_thumb-4.png</image:loc><image:title>bp1_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/07/bp1-4.png</image:loc><image:title>bp1.png</image:title></image:image><lastmod>2025-11-30T23:35:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/12/01/copilot-agents-licensing-usage-update/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/12/picture1_thumb.png</image:loc><image:title>Picture1_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/12/picture1.png</image:loc><image:title>Picture1.png</image:title></image:image><lastmod>2025-11-30T23:27:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/12/01/need-to-know-podcast-episode-356/</loc><lastmod>2025-11-30T22:19:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/11/26/asd-conditional-access-policies-comparison-script/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/11/screenshot-2025-11-26-092225_thumb.png</image:loc><image:title>Screenshot-2025-11-26-092225_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/11/screenshot-2025-11-26-092225.png</image:loc><image:title>Screenshot-2025-11-26-092225.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/11/screenshot-2025-11-26-092018_thumb.png</image:loc><image:title>Screenshot-2025-11-26-092018_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/11/screenshot-2025-11-26-092018.png</image:loc><image:title>Screenshot-2025-11-26-092018.png</image:title></image:image><lastmod>2025-11-25T22:29:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/11/25/asd-ios-compliance-policy-check-script/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/11/screenshot-2025-11-25-085940_thumb.png</image:loc><image:title>Screenshot-2025-11-25-085940_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/11/screenshot-2025-11-25-085940.png</image:loc><image:title>Screenshot-2025-11-25-085940.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/11/screenshot-2025-11-25-085221_thumb.png</image:loc><image:title>Screenshot-2025-11-25-085221_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/11/screenshot-2025-11-25-085221.png</image:loc><image:title>Screenshot-2025-11-25-085221.png</image:title></image:image><lastmod>2025-11-28T06:45:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/11/23/cia-brief-20251123/</loc><lastmod>2025-11-22T23:27:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/11/19/asd-windows-compliance-policy-check-script/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/11/screenshot-2025-11-19-101937_thumb.png</image:loc><image:title>Screenshot-2025-11-19-101937_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/11/screenshot-2025-11-19-101937.png</image:loc><image:title>Screenshot-2025-11-19-101937.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/11/screenshot-2025-11-19-101833_thumb.png</image:loc><image:title>Screenshot-2025-11-19-101833_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/11/screenshot-2025-11-19-101833.png</image:loc><image:title>Screenshot-2025-11-19-101833.png</image:title></image:image><lastmod>2025-11-18T23:21:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/11/17/need-to-know-podcast-episode-355/</loc><lastmod>2025-11-16T22:47:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/11/15/cia-brief-20251115/</loc><lastmod>2025-11-14T22:16:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/11/14/flight-school-mastering-copilot-for-it-pros/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/11/image_thumb-1.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/11/image-1.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2025-11-14T05:40:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/11/13/asd-owa-settings-check-script/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/11/screenshot-2025-11-13-074141_thumb.png</image:loc><image:title>Screenshot-2025-11-13-074141_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/11/screenshot-2025-11-13-074141.png</image:loc><image:title>Screenshot-2025-11-13-074141.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/11/screenshot-2025-11-13-073547_thumb.png</image:loc><image:title>Screenshot-2025-11-13-073547_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/11/screenshot-2025-11-13-073547.png</image:loc><image:title>Screenshot-2025-11-13-073547.png</image:title></image:image><lastmod>2025-11-12T20:43:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/11/13/disabling-office-macros-via-asr-to-meet-essential-eight-requirements/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/11/html-preview-5.png</image:loc><image:title>HTML-preview (5)</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/11/html-preview-4.png</image:loc><image:title>HTML-preview (4)</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/11/html-preview-3.png</image:loc><image:title>HTML-preview (3)</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/11/html-preview-2.png</image:loc><image:title>HTML-preview (2)</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/11/html-preview-1.png</image:loc><image:title>HTML-preview (1)</image:title></image:image><lastmod>2025-11-12T10:27:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/11/12/asd-mailflow-settings-check-sript/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/11/screenshot-2025-11-12-091607_thumb.png</image:loc><image:title>Screenshot-2025-11-12-091607_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/11/screenshot-2025-11-12-091607.png</image:loc><image:title>Screenshot-2025-11-12-091607.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/11/screenshot-2025-11-12-091022_thumb.png</image:loc><image:title>Screenshot-2025-11-12-091022_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/11/screenshot-2025-11-12-091022.png</image:loc><image:title>Screenshot-2025-11-12-091022.png</image:title></image:image><lastmod>2025-11-12T22:14:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/11/10/ciaops-academy-deprecation-notification/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/11/screenshot-2025-11-10-194840_thumb.png</image:loc><image:title>Screenshot-2025-11-10-194840_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/11/screenshot-2025-11-10-194840.png</image:loc><image:title>Screenshot-2025-11-10-194840.png</image:title></image:image><lastmod>2025-11-10T11:09:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/11/08/cia-brief-20251108/</loc><lastmod>2025-11-07T21:26:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/11/04/asd-remote-domains-check-script/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/11/screenshot-2025-11-04-100053_thumb.png</image:loc><image:title>Screenshot-2025-11-04-100053_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/11/screenshot-2025-11-04-100053.png</image:loc><image:title>Screenshot-2025-11-04-100053.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/11/screenshot-2025-11-04-095333_thumb.png</image:loc><image:title>Screenshot-2025-11-04-095333_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/11/screenshot-2025-11-04-095333.png</image:loc><image:title>Screenshot-2025-11-04-095333.png</image:title></image:image><lastmod>2025-11-03T23:19:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/11/03/ciaops-need-to-know-microsoft-365-webinar-november-7/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/11/cover-small440_thumb.png</image:loc><image:title>cover-small440_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/11/cover-small440.png</image:loc><image:title>cover-small440.png</image:title></image:image><lastmod>2025-11-03T04:28:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/11/03/ciaops-ai-dojo-006-news-from-ignite/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/11/image_thumb.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/11/image.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2025-11-03T03:45:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/11/01/cia-brief-20251101/</loc><lastmod>2025-10-31T23:15:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/10/31/october-microsoft-365-webinar-resources-7/</loc><lastmod>2025-10-31T06:31:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/10/29/sharepoint-online-playbook-fpr-smb/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/10/image_thumb.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/10/image-4.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2025-10-29T10:16:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/10/28/techwerks-29-21-november-2025/</loc><lastmod>2025-10-27T21:02:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/10/28/cia-brief-20251028/</loc><lastmod>2025-10-27T20:56:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/10/18/cia-brief-20251018/</loc><lastmod>2025-10-18T11:23:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/10/14/the-name-is-already-being-used-shared-mailbox-troubleshooting-script/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/10/screenshot-2025-10-14-165536_thumb.png</image:loc><image:title>Screenshot-2025-10-14-165536_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/10/screenshot-2025-10-14-165536.png</image:loc><image:title>Screenshot-2025-10-14-165536.png</image:title></image:image><lastmod>2025-10-14T05:57:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/10/13/ciaops-ai-dojo-005-mcp-servers/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/10/bp1_thumb.png</image:loc><image:title>bp1_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/10/bp1-3.png</image:loc><image:title>bp1.png</image:title></image:image><lastmod>2025-10-13T05:21:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/10/13/ciaops-need-to-know-microsoft-365-webinar-october-7/</loc><lastmod>2025-10-13T05:04:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/10/15/configuring-exchange-online-mailbox-logging-best-practices-and-step-by-step-guide/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/10/bp1-2.png</image:loc><image:title>bp1</image:title></image:image><lastmod>2025-10-12T23:07:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/10/13/cia-brief-20251013/</loc><lastmod>2025-10-12T21:29:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/10/14/implementing-a-phased-rollout-of-conditional-access-policies-requiring-device-compliance-in-microsoft-365/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/10/bp1-1.png</image:loc><image:title>bp1</image:title></image:image><lastmod>2025-10-12T03:15:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/10/13/implementing-risk-based-conditional-access-policies-for-small-business/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/10/bp1.png</image:loc><image:title>bp1</image:title></image:image><lastmod>2025-10-12T01:27:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/10/12/step-by-step-guide-setting-up-entra-id-conditional-access-for-small-businesses/</loc><lastmod>2025-10-12T00:56:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/10/07/need-to-know-podcast-episode-354/</loc><lastmod>2025-10-06T22:37:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/10/07/m365-business-premium-comparison-table-with-add-ons-defender-and-purview-suites/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/10/screenshot-2025-10-07-082341_thumb.png</image:loc><image:title>Screenshot-2025-10-07-082341_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/10/screenshot-2025-10-07-082341.png</image:loc><image:title>Screenshot-2025-10-07-082341.png</image:title></image:image><lastmod>2025-10-06T21:27:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/10/08/microsoft-defender-and-purview-suites-for-m365-business-premium-detailed-breakdown/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/10/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-10-05T03:12:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/10/04/cia-brief-20251004/</loc><lastmod>2025-10-03T22:22:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/10/07/microsoft-purview-audit-premium-for-smbs-on-microsoft-365-business-premium/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/09/image-12.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/09/image-11.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-09-30T08:32:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/10/06/microsoft-purview-ediscovery-premium-in-an-smb-environment-m365-business-premium/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/09/image-9.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/09/image-10.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-09-30T07:30:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/10/05/report-microsoft-purview-customer-key-in-an-smb-business-premium-environment/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/09/image-8.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/09/image-7.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-09-30T06:49:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/10/04/microsoft-purview-message-encryption-in-smb-setup-and-effective-use/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/09/image-6.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/09/image-5.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-09-30T05:12:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/09/30/inactive-users-report/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/09/screenshot-2025-09-30-143337_thumb.png</image:loc><image:title>Screenshot-2025-09-30-143337_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/09/screenshot-2025-09-30-143337.png</image:loc><image:title>Screenshot-2025-09-30-143337.png</image:title></image:image><lastmod>2025-09-30T04:42:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/10/03/microsoft-purview-suite-for-business-premium-features-smb-use-cases/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/09/image-2.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/09/image-3.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/09/image-4.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-09-29T07:27:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/10/02/microsoft-purview-records-management-data-lifecycle-management-for-smbs-in-australia/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/10/html-preview-17.png</image:loc><image:title>HTML-preview (17)</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/10/html-preview-16.png</image:loc><image:title>HTML-preview (16)</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/09/html-preview-15_thumb.png</image:loc><image:title>HTML-preview-15_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/09/html-preview-15.png</image:loc><image:title>HTML-preview-15.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/09/html-preview-14_thumb.png</image:loc><image:title>HTML-preview-14_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/09/html-preview-14.png</image:loc><image:title>HTML-preview-14.png</image:title></image:image><lastmod>2025-09-29T07:10:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/10/01/microsoft-purview-dspm-for-ai-in-smbs/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/10/html-preview-13.png</image:loc><image:title>HTML-preview (13)</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/10/html-preview-11.png</image:loc><image:title>HTML-preview (11)</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/10/html-preview-10.png</image:loc><image:title>HTML-preview (10)</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/09/html-preview-12_thumb.png</image:loc><image:title>HTML-preview-12_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/09/html-preview-12.png</image:loc><image:title>HTML-preview-12.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/09/html-preview-11_thumb-1.png</image:loc><image:title>HTML-preview-11_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/09/html-preview-11-1.png</image:loc><image:title>HTML-preview-11.png</image:title></image:image><lastmod>2025-09-29T06:35:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/09/30/microsoft-purview-communication-compliance-in-smbs-overview-setup-best-practices/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/09/html-preview-10-1.png</image:loc><image:title>HTML-preview (10)</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/09/html-preview-11_thumb.png</image:loc><image:title>HTML-preview-11_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/09/html-preview-11.png</image:loc><image:title>HTML-preview-11.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/09/html-preview-10_thumb.png</image:loc><image:title>HTML-preview-10_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/09/html-preview-10.png</image:loc><image:title>HTML-preview-10.png</image:title></image:image><lastmod>2025-09-29T03:56:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/09/29/microsoft-purview-insider-risk-management-for-smbs/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/09/html-preview-9_thumb.png</image:loc><image:title>HTML-preview-9_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/09/html-preview-9-1.png</image:loc><image:title>HTML-preview-9.png</image:title></image:image><lastmod>2025-09-28T21:49:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/09/28/cia-brief-20250928/</loc><lastmod>2025-09-27T23:17:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/09/27/microsoft-entra-id-p2-access-reviews-a-critical-evaluation-for-smb-customers-in-australia/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/09/html-preview-9.png</image:loc><image:title>HTML-preview (9)</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/09/html-preview-8.png</image:loc><image:title>HTML-preview (8)</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/09/html-preview-7.png</image:loc><image:title>HTML-preview (7)</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/09/html-preview-6.png</image:loc><image:title>HTML-preview (6)</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/09/html-preview-5.png</image:loc><image:title>HTML-preview (5)</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/09/html-preview-4.png</image:loc><image:title>HTML-preview (4)</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/09/html-preview-3.png</image:loc><image:title>HTML-preview (3)</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/09/html-preview-2.png</image:loc><image:title>HTML-preview (2)</image:title></image:image><lastmod>2025-09-27T05:19:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/09/27/microsoft-entra-id-p2-entitlement-management-an-honest-assessment-for-smbs/</loc><lastmod>2025-09-27T04:53:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/09/27/unlock-anthropic-ai-in-microsoft-copilot-step-by-step-setup-crucial-warnings/</loc><lastmod>2025-09-27T00:08:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/09/26/september-microsoft-365-webinar-resources-6/</loc><lastmod>2025-09-26T02:25:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/09/22/get-a-copy-of-my-comparing-ai-services/</loc><lastmod>2025-09-22T06:00:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/09/21/cia-brief-20250921/</loc><lastmod>2025-09-21T10:56:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/09/19/robert-agent-has-been-upgraded/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/09/screenshot-2025-09-19-174256_thumb.png</image:loc><image:title>Screenshot-2025-09-19-174256_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/09/screenshot-2025-09-19-174256.png</image:loc><image:title>Screenshot-2025-09-19-174256.png</image:title></image:image><lastmod>2025-09-19T09:19:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/09/15/improved-windows-defender-script/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/09/screenshot-2025-09-15-081733_thumb.png</image:loc><image:title>Screenshot-2025-09-15-081733_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/09/screenshot-2025-09-15-081733.png</image:loc><image:title>Screenshot-2025-09-15-081733.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/09/screenshot-2025-09-15-081243_thumb.png</image:loc><image:title>Screenshot-2025-09-15-081243_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/09/screenshot-2025-09-15-081243.png</image:loc><image:title>Screenshot-2025-09-15-081243.png</image:title></image:image><lastmod>2025-09-14T22:20:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/09/14/cia-brief-20250914/</loc><lastmod>2025-09-13T23:07:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/09/08/need-to-know-podcast-episode-353/</loc><lastmod>2025-09-08T01:22:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/09/08/comparison-of-ai-generated-articles/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/09/bp1_thumb-3.png</image:loc><image:title>bp1_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/09/bp1-4.png</image:loc><image:title>bp1.png</image:title></image:image><lastmod>2025-09-07T22:39:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/09/07/cia-brief-20250907/</loc><lastmod>2025-09-07T00:07:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/09/12/comparing-ai-services-an-objective-analysis/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/09/bp1_thumb-7.png</image:loc><image:title>bp1_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/09/bp1-8.png</image:loc><image:title>bp1.png</image:title></image:image><lastmod>2025-09-06T11:19:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/09/11/comparing-ai-services-the-final-analysis/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/09/bp1_thumb-6.png</image:loc><image:title>bp1_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/09/bp1-7.png</image:loc><image:title>bp1.png</image:title></image:image><lastmod>2025-09-11T11:56:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/09/07/an-analysis-of-how-ai-service-vary/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/09/bp1_thumb-2.png</image:loc><image:title>bp1_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/09/bp1-3.png</image:loc><image:title>bp1.png</image:title></image:image><lastmod>2025-09-05T23:58:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/09/10/comparing-ai-services-a-third-analysis/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/09/bp1_thumb-5.png</image:loc><image:title>bp1_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/09/bp1-6.png</image:loc><image:title>bp1.png</image:title></image:image><lastmod>2025-09-05T23:44:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/09/09/an-alternate-analysis-of-ai-services/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/09/bp1_thumb-4.png</image:loc><image:title>bp1_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/09/bp1-5.png</image:loc><image:title>bp1.png</image:title></image:image><lastmod>2025-09-05T23:36:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/09/06/testing-the-differences-between-ai-services/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/09/bp1_thumb-1.png</image:loc><image:title>bp1_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/09/bp1-2.png</image:loc><image:title>bp1.png</image:title></image:image><lastmod>2025-09-05T22:06:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/09/06/updated-global-secure-access-clients/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/09/image_thumb-1.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/09/image-1.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/09/image_thumb.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/09/image.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2025-09-05T21:50:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/09/03/the-secret-to-crafting-powerful-ai-prompts-the-4-part-framework/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/09/bp1_thumb.png</image:loc><image:title>bp1_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/09/bp1-1.png</image:loc><image:title>bp1.png</image:title></image:image><lastmod>2025-09-02T21:52:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/09/04/configuring-robust-anti-malware-policies-in-exchange-online-protection-eop-with-enhancements-from-microsoft-defender-for-office-365-mdo/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/08/bp1-18.png</image:loc><image:title>bp1</image:title></image:image><lastmod>2025-08-29T06:21:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/09/03/why-the-perimeter-is-no-longer-the-control-that-matters-most/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/08/bp1.jpg</image:loc><image:title>bp1</image:title></image:image><lastmod>2025-08-28T12:01:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/09/02/m365-business-premium-includes-so-many-advanced-security-controls-that-previously-required-on-premises-network-appliances/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/09/bp1.png</image:loc><image:title>bp1</image:title></image:image><lastmod>2025-08-28T11:52:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/08/28/microsoft-365-business-premium-vs-hardware-firewalls-for-smbs/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/08/bp1-17.png</image:loc><image:title>bp1</image:title></image:image><lastmod>2025-08-28T11:44:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/08/31/how-m365-redefines-the-need-for-expensive-hardware/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/08/bp1-16.png</image:loc><image:title>bp1</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/08/bp1-14.png</image:loc><image:title>bp1</image:title></image:image><lastmod>2025-08-28T06:25:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/09/01/cybersecurity-for-the-modern-smb-a-strategic-analysis-of-m365-business-premium-vs-high-end-hardware-firewalls/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/08/bp1-15.png</image:loc><image:title>bp1</image:title></image:image><lastmod>2025-08-28T06:18:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/08/30/why-business-premium-can-replace-most-perimeter-security-for-typical-smbs/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/08/bp1-13.png</image:loc><image:title>bp1</image:title></image:image><lastmod>2025-08-28T04:18:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/08/29/security-without-the-high%e2%80%91priced-firewall-m365-business-premium-vs-traditional-firewalls-for-smbs/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/08/bp1-12.png</image:loc><image:title>bp1</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/08/image-29.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/08/image-28.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-08-28T04:10:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/08/27/unlocking-gpt-5-in-copilot-studio-step-by-step-guide-to-early-access-and-advanced-ai-features/</loc><lastmod>2025-08-27T01:34:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/08/28/prompts-to-use-to-get-powershell-scripts-from-your-asd-agent/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/08/bp1-11.png</image:loc><image:title>bp1</image:title></image:image><lastmod>2025-08-26T21:09:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/08/27/10-ready-to-use-prompts-you-can-ask-your-asd-aligned-security-agent/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/08/bp1-10.png</image:loc><image:title>bp1</image:title></image:image><lastmod>2025-08-26T21:08:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/08/26/creating-a-microsoft-copilot-chat-agent-for-m365-security-asd-secure-cloud-blueprint/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/08/html-preview.png</image:loc><image:title>HTML-preview</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/08/bp1-9.png</image:loc><image:title>bp1</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/08/image-26.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/08/image-27.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-08-25T22:45:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/08/25/impact-of-ai-on-smb-msp-help-desks-and-the-role-of-microsoft-365-copilot/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/08/bp1-7.png</image:loc><image:title>bp1</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/08/image-24.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/08/image-22.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/08/image-23.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-08-24T21:34:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/08/24/cia-brief-20250824/</loc><lastmod>2025-08-24T05:44:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/08/20/need-to-know-podcast-episode-352/</loc><lastmod>2025-08-19T23:51:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/08/17/cia-brief-20250817/</loc><lastmod>2025-08-16T22:15:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/08/16/building-a-collaborative-microsoft-365-copilot-agent-a-step-by-step-guide/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/08/html-preview-8.png</image:loc><image:title>HTML-preview (8)</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/08/bp1-6.png</image:loc><image:title>bp1</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/08/image-20.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/08/image-21.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-08-15T22:40:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/08/12/comprehensive-guide-to-microsoft-autopilot-v2-deployment-in-microsoft-365-business/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/08/bp1-5.png</image:loc><image:title>bp1</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/08/image-17.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/08/image-16.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/08/image-18.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/08/image-19.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/08/image-12.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/08/image-13.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/08/image-14.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/08/image-15.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-08-12T00:35:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/08/09/cia-brief-20250809/</loc><lastmod>2025-08-08T23:33:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/08/07/troubleshooting-microsoft-defender-for-business-step-by-step-guide/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/08/screenshot-2025-08-07-075636.png</image:loc><image:title>Screenshot 2025-08-07 075636</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/08/html-preview-7.png</image:loc><image:title>HTML-preview (7)</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/08/bp1-4.png</image:loc><image:title>bp1</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/08/image-10.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/08/image-9.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/08/image-11.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/08/image-8.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-08-06T21:53:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/08/06/crafting-effective-instructions-for-copilot-studio-agents/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/08/bp1-3.png</image:loc><image:title>bp1</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/08/image-6.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/08/image-7.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/08/image-5.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-08-06T11:47:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/08/05/ciaops-ai-dojo-003-copilot-chat-agent-builder/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/08/bp1_thumb.png</image:loc><image:title>bp1_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/08/bp1-2.png</image:loc><image:title>bp1.png</image:title></image:image><lastmod>2025-08-04T22:51:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/08/05/coexistence-of-microsoft-defender-for-business-with-third-party-antivirus-solutions/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/08/bp1-1.png</image:loc><image:title>bp1</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/08/image-4.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-08-04T22:12:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/08/04/need-to-know-podcast-episode-351/</loc><lastmod>2025-08-03T22:15:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/08/04/blocking-emails-by-region-and-language-in-exchange-online-anti-spam-policies/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/08/bp1.png</image:loc><image:title>bp1</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/08/image-2.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/08/image-3.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-08-03T10:11:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/08/03/cia-brief-20250803/</loc><lastmod>2025-08-03T00:38:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/08/02/update-powershell-pnp-connection-script/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/08/image_thumb-1.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/08/image-1.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/08/image_thumb.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/08/image.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2025-08-02T00:13:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/08/02/lifecycle-of-a-microsoft-365-business-premium-tenant-after-license-expiry/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/07/bp1-35.png</image:loc><image:title>bp1</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/07/html-preview-6.png</image:loc><image:title>HTML-preview (6)</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/07/html-preview-5.png</image:loc><image:title>HTML-preview (5)</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/07/html-preview-4.png</image:loc><image:title>HTML-preview (4)</image:title></image:image><lastmod>2025-08-01T23:28:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/07/31/robert-agent-now-recommends-improved-questions/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/07/image_thumb.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/07/image-25.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/07/bp1_thumb-25.png</image:loc><image:title>bp1_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/07/bp1-36.png</image:loc><image:title>bp1.png</image:title></image:image><lastmod>2025-07-31T10:42:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/08/01/analysis-of-intune-android-compliance-policy-settings-for-strong-security/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/07/bp1-33.png</image:loc><image:title>bp1</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/07/screenshot-2025-07-29-081857.png</image:loc><image:title>Screenshot 2025-07-29 081857</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/07/html-preview-1.png</image:loc><image:title>HTML-preview (1)</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/07/image-24.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/07/image-23.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-07-28T22:19:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/07/31/analysis-of-ios-intune-compliance-policy-for-strong-security/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/07/bp1-32.png</image:loc><image:title>bp1</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/07/image-19.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/07/image-20.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-07-28T21:42:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/07/30/analysis-of-intune-windows-10-11-compliance-policy-settings-for-strong-security/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/07/bp1-31.png</image:loc><image:title>bp1</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/07/image-18.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/07/bp1_thumb-24.png</image:loc><image:title>bp1_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/07/bp1-30.png</image:loc><image:title>bp1.png</image:title></image:image><lastmod>2025-07-28T05:38:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/07/29/using-ai-tools-vs-search-engines-a-comprehensive-guide/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/07/bp1-29.png</image:loc><image:title>bp1</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/07/image-16.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/07/image-17.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/07/bp1_thumb-23.png</image:loc><image:title>bp1_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/07/bp1-28.png</image:loc><image:title>bp1.png</image:title></image:image><lastmod>2025-07-27T22:43:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/07/28/how-i-built-a-free-microsoft-365-copilot-chat-agent-to-instantly-search-my-blog/</loc><lastmod>2025-07-27T22:14:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/07/27/cia-brief-20250727/</loc><lastmod>2025-07-26T23:24:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/07/26/optimizing-microsoft-365-support-engagement-for-smb-msps-step-by-step-guide-best-practices/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/07/bp1-27.png</image:loc><image:title>bp1</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/07/image-15.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/07/image-14.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/07/image-13.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/07/bp1_thumb-18.png</image:loc><image:title>bp1_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/07/bp1-18.png</image:loc><image:title>bp1.png</image:title></image:image><lastmod>2025-07-22T23:23:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/07/25/blocking-applications-on-windows-devices-using-intune-m365-business-premium/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/07/bp1-26.png</image:loc><image:title>bp1</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/07/image-11.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/07/image-12.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/07/image-10.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/07/bp1_thumb-17.png</image:loc><image:title>bp1_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/07/bp1-17.png</image:loc><image:title>bp1.png</image:title></image:image><lastmod>2025-07-22T23:22:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/07/24/roadmap-to-mastering-microsoft-365-copilot-for-small-business-users/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/07/bp1-25.png</image:loc><image:title>bp1</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/07/image-8.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/07/image-7.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/07/image-9.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/07/bp1_thumb-15.png</image:loc><image:title>bp1_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/07/bp1-15.png</image:loc><image:title>bp1.png</image:title></image:image><lastmod>2025-07-22T23:21:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/07/23/sharepoint-online-permissions-troubleshooting-best-practices-for-smb/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/07/bp1-24.png</image:loc><image:title>bp1</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/07/image-6.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/07/image-5.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/07/bp1_thumb-14.png</image:loc><image:title>bp1_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/07/bp1-14.png</image:loc><image:title>bp1.png</image:title></image:image><lastmod>2025-07-22T23:17:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/07/22/configuring-and-using-encrypted-email-office-365-message-encryption-with-m365-business-premium/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/07/bp1-22.png</image:loc><image:title>bp1</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/07/image-1.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/07/image-4.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/07/image.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/07/image-2.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/07/image-3.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/07/bp1_thumb-21.png</image:loc><image:title>bp1_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/07/bp1-21.png</image:loc><image:title>bp1.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/07/bp1_thumb-13.png</image:loc><image:title>bp1_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/07/bp1-13.png</image:loc><image:title>bp1.png</image:title></image:image><lastmod>2025-07-21T23:45:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/07/21/need-to-know-podcast-episode-350/</loc><lastmod>2025-07-21T11:55:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/07/21/test-your-microsoft-365-speed-in-seconds-for-free/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/07/bp1_thumb-20.png</image:loc><image:title>bp1_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/07/bp1-20.png</image:loc><image:title>bp1.png</image:title></image:image><lastmod>2025-07-21T06:56:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/07/20/cia-brief-20250720/</loc><lastmod>2025-07-19T23:14:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/07/18/new-defender-for-office-365-dashboard/</loc><lastmod>2025-07-17T23:05:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/07/27/when-to-use-microsoft-365-copilot-versus-a-dedicated-agent/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/07/bp1_thumb-19.png</image:loc><image:title>bp1_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/07/bp1-19.png</image:loc><image:title>bp1.png</image:title></image:image><lastmod>2025-07-16T22:58:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/07/17/comprehensive-application-control-for-windows-with-microsoft-365-business-premium/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/07/bp1_thumb-7.png</image:loc><image:title>bp1_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/07/bp1-7.png</image:loc><image:title>bp1.png</image:title></image:image><lastmod>2025-07-16T22:36:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/07/16/ciaops-ai-dojo-002-vibe-coding-with-vs-code-automate-smarter-with-powershell/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/07/bp1_thumb-16.png</image:loc><image:title>bp1_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/07/bp1-16.png</image:loc><image:title>bp1.png</image:title></image:image><lastmod>2025-07-15T23:01:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/07/16/troubleshooting-email-delivery-failures-in-exchange-online-internal-to-external/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/07/bp1_thumb-6.png</image:loc><image:title>bp1_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/07/bp1-6.png</image:loc><image:title>bp1.png</image:title></image:image><lastmod>2025-07-15T22:36:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/07/15/strategic-imperatives-for-small-msps-ensuring-relevance-and-profitability-with-microsoft-technologies-in-2025/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/07/bp1_thumb-5.png</image:loc><image:title>bp1_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/07/bp1-5.png</image:loc><image:title>bp1.png</image:title></image:image><lastmod>2025-07-14T22:42:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/07/14/unlocking-the-power-of-microsoft-loop-overcoming-limitations-with-external-users/</loc><lastmod>2025-07-13T23:16:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/07/14/impact-of-microsoft-365-copilot-licensing-on-copilot-studio-agent-responses-in-microsoft-teams/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/07/bp1_thumb-3.png</image:loc><image:title>bp1_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/07/bp1-3.png</image:loc><image:title>bp1.png</image:title></image:image><lastmod>2025-07-13T22:50:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/07/13/the-critical-nature-of-website-ownership-attestation-in-microsoft-copilot-studio-for-public-knowledge-sources/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/07/bp1_thumb-2.png</image:loc><image:title>bp1_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/07/bp1-2.png</image:loc><image:title>bp1.png</image:title></image:image><lastmod>2025-07-12T23:02:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/07/12/cia-brief-20250712/</loc><lastmod>2025-07-12T04:10:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/07/12/navigating-copilot-studio-agent-access-data-grounding-and-licensing-for-unlicensed-users/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/07/bp1_thumb-1.png</image:loc><image:title>bp1_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/07/bp1-1.png</image:loc><image:title>bp1.png</image:title></image:image><lastmod>2025-07-12T00:15:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/07/11/mvp-2025-26/</loc><lastmod>2025-07-10T23:30:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/07/10/m365-copilot-reasoning-agents-limits/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/07/bp1_thumb-12.png</image:loc><image:title>bp1_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/07/bp1-12.png</image:loc><image:title>bp1.png</image:title></image:image><lastmod>2025-07-10T05:05:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/07/10/robert-agent-in-action/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/07/screenshot-2025-07-10-130823_thumb.png</image:loc><image:title>Screenshot-2025-07-10-130823_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/07/screenshot-2025-07-10-130823.png</image:loc><image:title>Screenshot-2025-07-10-130823.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/07/screenshot-2025-07-10-130705_thumb.png</image:loc><image:title>Screenshot-2025-07-10-130705_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/07/screenshot-2025-07-10-130705.png</image:loc><image:title>Screenshot-2025-07-10-130705.png</image:title></image:image><lastmod>2025-07-10T03:11:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/07/21/everyday-copilot-example-prompts-for-smb/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/07/bp1_thumb-11.png</image:loc><image:title>bp1_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/07/bp1-11.png</image:loc><image:title>bp1.png</image:title></image:image><lastmod>2025-07-09T21:56:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/07/20/how-smbs-can-use-ai-with-security/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/07/bp1_thumb-10.png</image:loc><image:title>bp1_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/07/bp1-10.png</image:loc><image:title>bp1.png</image:title></image:image><lastmod>2025-07-09T21:41:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/07/08/m365-copilot-chat-vs-copilot-research-agent-use-cases-and-examples/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/06/bp1_thumb-34.png</image:loc><image:title>bp1_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/06/bp1-34.png</image:loc><image:title>bp1.png</image:title></image:image><lastmod>2025-07-07T22:46:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/07/07/need-to-know-podcast-episode-349/</loc><lastmod>2025-07-06T23:53:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/07/19/unlocking-productivity-sharepoint-teams-and-onedrive-best-practices-for-smbs-with-m365-business-premium/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/07/bp1_thumb-9.png</image:loc><image:title>bp1_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/07/bp1-9.png</image:loc><image:title>bp1.png</image:title></image:image><lastmod>2025-07-06T01:06:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/07/05/cia-brief-20250705/</loc><lastmod>2025-07-05T00:23:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/07/18/using-multiple-authenticator-apps-with-one-microsoft-365-account-guide-for-msps/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/07/bp1_thumb-8.png</image:loc><image:title>bp1_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/07/bp1-8.png</image:loc><image:title>bp1.png</image:title></image:image><lastmod>2025-07-04T23:53:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/07/11/exchange-online-powershell-configuration-rules-and-policy-relationship/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/06/bp1_thumb-39.png</image:loc><image:title>bp1_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/06/bp1-39.png</image:loc><image:title>bp1.png</image:title></image:image><lastmod>2025-07-03T03:55:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/07/03/ciaops-ai-dojo-001-recording/</loc><lastmod>2025-07-03T02:17:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/07/03/integrating-microsoft-learn-docs-with-copilot-studio-using-mcp/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/07/bp1_thumb2_thumb.png</image:loc><image:title>bp1_thumb2_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/07/bp1_thumb2.png</image:loc><image:title>bp1_thumb2.png</image:title></image:image><lastmod>2025-07-02T22:09:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/07/02/ciaops-need-to-know-microsoft-365-webinar-july-7/</loc><lastmod>2025-07-02T07:18:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/07/01/cia-brief-20250701/</loc><lastmod>2025-06-30T22:24:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/07/10/exchange-online-mail-flow-rules-basics/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/06/bp1_thumb-38.png</image:loc><image:title>bp1_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/06/bp1-38.png</image:loc><image:title>bp1.png</image:title></image:image><lastmod>2025-06-30T01:01:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/07/09/small-business-big-ai-impact-understanding-the-ai-mcp-server/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/06/bp1_thumb-37.png</image:loc><image:title>bp1_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/06/bp1-37.png</image:loc><image:title>bp1.png</image:title></image:image><lastmod>2025-06-29T23:41:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/06/30/unlocking-the-power-of-microsoft-365-copilot-a-deep-dive-into-the-analyst-agent/</loc><lastmod>2025-06-29T23:21:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/07/02/blocking-applications-on-windows-devices-with-intune-mdm-vs-mam-approaches/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/06/bp_thumb.png</image:loc><image:title>bp_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/06/bp.png</image:loc><image:title>bp.png</image:title></image:image><lastmod>2025-06-29T00:03:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/06/26/how-i-13xd-my-code-with-ai/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/06/bp1_thumb-36.png</image:loc><image:title>bp1_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/06/bp1-36.png</image:loc><image:title>bp1.png</image:title></image:image><lastmod>2025-06-26T11:41:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/06/26/measuring-the-success-of-teams-adoption/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/06/bp1_thumb-21.png</image:loc><image:title>bp1_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/06/bp1-21.png</image:loc><image:title>bp1.png</image:title></image:image><lastmod>2025-06-25T23:06:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/06/25/introducing-the-ciaops-ai-dojo-empowering-everyone-to-harness-the-power-of-ai/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/06/bp1_thumb-35.png</image:loc><image:title>bp1_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/06/bp1-35.png</image:loc><image:title>bp1.png</image:title></image:image><lastmod>2025-06-25T05:08:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/05/26/best-practices-for-configuring-anti-spam-policy-settings-in-microsoft-exchange-online/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/05/bp1_thumb-1.png</image:loc><image:title>bp1_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/05/bp1-1.png</image:loc><image:title>bp1.png</image:title></image:image><lastmod>2025-06-23T22:38:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/07/06/convincing-smbs-to-invest-in-m365-business-premium-strategies-and-steps/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/06/bp1_thumb-32.png</image:loc><image:title>bp1_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/06/bp1-32.png</image:loc><image:title>bp1.png</image:title></image:image><lastmod>2025-06-23T06:03:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/06/23/need-to-know-podcast-episode-348-2/</loc><lastmod>2025-06-23T04:58:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/06/24/ciaops-ai-dojo-teaser-3/</loc><lastmod>2025-06-22T23:22:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/06/23/need-to-know-podcast-episode-348/</loc><lastmod>2025-06-22T12:09:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/06/22/byod-iphone-onboarding-checklist-microsoft-365-business-premium/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/06/bp1_thumb-16.png</image:loc><image:title>bp1_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/06/bp1-16.png</image:loc><image:title>bp1.png</image:title></image:image><lastmod>2025-06-21T23:11:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/06/21/cia-brief-20250621/</loc><lastmod>2025-06-20T23:44:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/06/20/ciaops-ai-dojo-teaser-2/</loc><lastmod>2025-06-19T23:13:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/06/19/ciaops-ai-dojo-teaser-1/</loc><lastmod>2025-06-19T01:47:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/07/07/securing-microsoft-365-copilot-in-a-small-business-environment/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/06/bp1_thumb-33.png</image:loc><image:title>bp1_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/06/bp1-33.png</image:loc><image:title>bp1.png</image:title></image:image><lastmod>2025-06-16T23:02:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/06/17/restrict-sharepoint-content-discovery-for-copilot/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/06/image_thumb.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/06/image.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2025-06-16T22:26:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/06/16/cia-brief-20250616/</loc><lastmod>2025-06-15T21:55:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/07/05/security-measures-protecting-files-in-microsoft-365/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/06/bp1_thumb-31.png</image:loc><image:title>bp1_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/06/bp1-31.png</image:loc><image:title>bp1.png</image:title></image:image><lastmod>2025-06-14T05:10:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/07/04/exchange-online-email-flow-end-to-end-process-and-security-measures/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/06/bp1_thumb-30.png</image:loc><image:title>bp1_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/06/bp1-30.png</image:loc><image:title>bp1.png</image:title></image:image><lastmod>2025-06-14T04:55:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/06/14/unlocking-the-power-of-microsoft-365-copilot-notebooks-a-game-changer-for-podcasters/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/06/bp1_thumb-29.png</image:loc><image:title>bp1_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/06/bp1-29.png</image:loc><image:title>bp1.png</image:title></image:image><lastmod>2025-06-14T00:22:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/06/11/get-your-m365-questions-answered-via-email-2/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/06/bp1_thumb-28.png</image:loc><image:title>bp1_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/06/bp1-28.png</image:loc><image:title>bp1.png</image:title></image:image><lastmod>2025-06-13T04:23:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/07/03/from-skepticism-to-success-overcoming-apprehension-towards-ai-in-your-team/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/06/bp1_thumb-27.png</image:loc><image:title>bp1_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/06/bp1-27.png</image:loc><image:title>bp1.png</image:title></image:image><lastmod>2025-06-13T03:01:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/07/01/the-ai-advantage-democratizing-expertise-and-reducing-costs-for-small-businesses/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/06/bp1_thumb-26.png</image:loc><image:title>bp1_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/06/bp1-26.png</image:loc><image:title>bp1.png</image:title></image:image><lastmod>2025-06-13T02:26:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/06/30/leveraging-ai-for-mundane-tasks-how-m365-copilot-boosts-smb-efficiency-and-client-focus/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/06/bp1_thumb-25.png</image:loc><image:title>bp1_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/06/bp1-25.png</image:loc><image:title>bp1.png</image:title></image:image><lastmod>2025-06-13T01:50:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/06/29/reimagine-dont-just-automate-ai-as-a-core-partner-for-smb-transformation/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/06/bp1_thumb-24.png</image:loc><image:title>bp1_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/06/bp1-24.png</image:loc><image:title>bp1.png</image:title></image:image><lastmod>2025-06-13T01:26:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/06/28/ai-for-smbs-how-to-punch-above-your-weight-with-digital-labour/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/06/bp1_thumb-23.png</image:loc><image:title>bp1_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/06/bp1-23.png</image:loc><image:title>bp1.png</image:title></image:image><lastmod>2025-06-13T01:09:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/06/27/get-your-m365-questions-answered-via-email/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/06/bp1_thumb-22.png</image:loc><image:title>bp1_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/06/bp1-22.png</image:loc><image:title>bp1.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/06/bp1_thumb-19.png</image:loc><image:title>bp1_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/06/bp1-19.png</image:loc><image:title>bp1.png</image:title></image:image><lastmod>2025-06-13T00:25:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/06/25/developing-engagement-and-adoption-of-microsoft-teams-in-a-small-business/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/06/bp1_thumb-20.png</image:loc><image:title>bp1_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/06/bp1-20.png</image:loc><image:title>bp1.png</image:title></image:image><lastmod>2025-06-12T00:09:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/06/24/onboarding-checklist-for-byod-windows-devices-microsoft-365-business-premium/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/06/bp1_thumb-18.png</image:loc><image:title>bp1_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/06/bp1-18.png</image:loc><image:title>bp1.png</image:title></image:image><lastmod>2025-06-10T00:02:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/06/23/onboarding-checklist-for-byod-android-devices-m365-business-premium/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/06/bp1_thumb-17.png</image:loc><image:title>bp1_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/06/bp1-17.png</image:loc><image:title>bp1.png</image:title></image:image><lastmod>2025-06-09T23:56:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/06/21/onboarding-a-windows-device-into-m365-business-premium-step-by-step-checklist/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/06/bp1_thumb-15.png</image:loc><image:title>bp1_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/06/bp1-15.png</image:loc><image:title>bp1.png</image:title></image:image><lastmod>2025-06-09T00:36:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/06/20/comprehensive-android-device-onboarding-checklist-for-m365-business-premium/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/06/bp1_thumb-14.png</image:loc><image:title>bp1_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/06/bp1-14.png</image:loc><image:title>bp1.png</image:title></image:image><lastmod>2025-06-09T00:13:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/06/19/iphone-onboarding-into-m365-business-premium-step-by-step-guide/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/06/bp1_thumb-13.png</image:loc><image:title>bp1_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/06/bp1-13.png</image:loc><image:title>bp1.png</image:title></image:image><lastmod>2025-06-08T23:59:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/06/18/common-tasks-in-smbs-for-automation-with-copilot-studio/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/06/bp1_thumb-12.png</image:loc><image:title>bp1_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/06/bp1-12.png</image:loc><image:title>bp1.png</image:title></image:image><lastmod>2025-06-08T02:57:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/06/17/recovering-deleted-files-and-maximizing-retention-in-sharepoint-online/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/06/bp1_thumb-11.png</image:loc><image:title>bp1_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/06/bp1-11.png</image:loc><image:title>bp1.png</image:title></image:image><lastmod>2025-06-07T00:33:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/06/08/cia-brief-20250608/</loc><lastmod>2025-06-06T23:52:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/06/07/need-to-know-podcast-episode-346-2/</loc><lastmod>2025-06-06T23:38:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/06/06/getting-started-with-microsoft-365-copilot-first-steps-for-end-users/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/06/bp1_thumb-10.png</image:loc><image:title>bp1_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/06/bp1-10.png</image:loc><image:title>bp1.png</image:title></image:image><lastmod>2025-06-06T00:10:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/06/16/troubleshooting-guide-onedrive-sharepoint-sync-and-office-save-issues-in-m365/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/06/bp1_thumb-9.png</image:loc><image:title>bp1_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/06/bp1-9.png</image:loc><image:title>bp1.png</image:title></image:image><lastmod>2025-06-05T22:23:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/06/15/microsoft-exposure-management-enhancing-smb-security/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/06/bp1_thumb-8.png</image:loc><image:title>bp1_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/06/bp1-8.png</image:loc><image:title>bp1.png</image:title></image:image><lastmod>2025-06-04T01:13:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/06/14/microsoft-smb-partner-incentives-for-csp-partners-financial-incentives/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/06/bp1_thumb-7.png</image:loc><image:title>bp1_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/06/bp1-7.png</image:loc><image:title>bp1.png</image:title></image:image><lastmod>2025-06-03T03:03:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/06/13/maximizing-microsoft-365-business-premium-training-resources-for-admins-and-end-users/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/06/bp1_thumb-6.png</image:loc><image:title>bp1_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/06/bp1-6.png</image:loc><image:title>bp1.png</image:title></image:image><lastmod>2025-06-03T02:10:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/06/12/monitoring-health-usage-and-security-in-microsoft-365-business-premium/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/06/bp1_thumb-5.png</image:loc><image:title>bp1_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/06/bp1-5.png</image:loc><image:title>bp1.png</image:title></image:image><lastmod>2025-06-02T06:48:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/06/11/comparison-of-compliance-features-microsoft-365-business-premium-vs-enterprise-e3-e5/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/06/bp1_thumb-4.png</image:loc><image:title>bp1_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/06/bp1-4.png</image:loc><image:title>bp1.png</image:title></image:image><lastmod>2025-06-02T06:18:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/06/10/azure-information-protection-aip-integration-with-m365-business-premium-data-classification-labelling/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/06/bp1_thumb-3.png</image:loc><image:title>bp1_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/06/bp1-3.png</image:loc><image:title>bp1.png</image:title></image:image><lastmod>2025-06-02T05:57:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/06/02/ciaops-need-to-know-microsoft-365-webinar-june-6/</loc><lastmod>2025-06-02T04:48:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/06/09/data-loss-prevention-dlp-in-m365-business-premium-comprehensive-guide/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/06/bp1_thumb-2.png</image:loc><image:title>bp1_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/06/bp1-2.png</image:loc><image:title>bp1.png</image:title></image:image><lastmod>2025-06-02T03:06:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/06/07/secure-access-for-smb-customers-pim-for-msps-with-microsoft-lighthouse-and-gdap/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/05/bp1_thumb-12.png</image:loc><image:title>bp1_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/05/bp1-12.png</image:loc><image:title>bp1.png</image:title></image:image><lastmod>2025-06-02T01:47:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/06/04/red-teaming-microsoft-365-business-premium-importance-techniques-and-best-practices/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/05/bp1_thumb-11.png</image:loc><image:title>bp1_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/05/bp1-11.png</image:loc><image:title>bp1.png</image:title></image:image><lastmod>2025-06-02T01:47:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/06/05/microsoft-defender-for-business-endpoint-protection-capabilities-and-comparison/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/06/bp1_thumb-1.png</image:loc><image:title>bp1_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/06/bp1-1.png</image:loc><image:title>bp1.png</image:title></image:image><lastmod>2025-06-02T01:45:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/06/02/cia-brief-20250602/</loc><lastmod>2025-06-01T23:47:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/06/08/recovering-missing-or-deleted-items-in-an-exchange-online-mailbox-m365-business-premium/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/06/bp1_thumb.png</image:loc><image:title>bp1_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/06/bp1.png</image:loc><image:title>bp1.png</image:title></image:image><lastmod>2025-06-01T02:18:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/06/03/ensuring-browser-extension-security-in-a-microsoft-365-business-premium-environment/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/05/bp1_thumb-10.png</image:loc><image:title>bp1_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/05/bp1-10.png</image:loc><image:title>bp1.png</image:title></image:image><lastmod>2025-05-29T03:27:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/06/02/securing-microsoft-edge-browser-with-m365-business-premium-best-practices-deployment-guide/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/05/bp1_thumb-9.png</image:loc><image:title>bp1_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/05/bp1-9.png</image:loc><image:title>bp1.png</image:title></image:image><lastmod>2025-05-29T02:50:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/06/01/defender-for-office-365-malicious-email-protection-in-m365-business-premium/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/05/bp1_thumb-8.png</image:loc><image:title>bp1_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/05/bp1-8.png</image:loc><image:title>bp1.png</image:title></image:image><lastmod>2025-05-29T02:32:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/05/31/security-incident-response-in-a-microsoft-365-business-environment/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/05/bp1_thumb-7.png</image:loc><image:title>bp1_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/05/bp1-7.png</image:loc><image:title>bp1.png</image:title></image:image><lastmod>2025-05-29T01:27:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/05/29/disadvantages-of-using-third%e2%80%91party-antivirus-vs-microsoft-defender-for-business/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/05/bp1_thumb-5.png</image:loc><image:title>bp1_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/05/bp1-5.png</image:loc><image:title>bp1.png</image:title></image:image><lastmod>2025-05-29T01:10:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/05/30/automated-response-in-microsoft-defender-for-business-comprehensive-overview/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/05/bp1_thumb-6.png</image:loc><image:title>bp1_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/05/bp1-6.png</image:loc><image:title>bp1.png</image:title></image:image><lastmod>2025-05-29T01:05:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/05/28/expertise-as-a-commodity-in-the-ai-era/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/05/bp1_thumb-3.png</image:loc><image:title>bp1_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/05/bp1-3.png</image:loc><image:title>bp1.png</image:title></image:image><lastmod>2025-05-27T21:48:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/05/28/outsourced-soc-for-smbs-and-msps-pros-cons-and-the-microsoft-365-factor/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/05/bp1_thumb-4.png</image:loc><image:title>bp1_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/05/bp1-4.png</image:loc><image:title>bp1.png</image:title></image:image><lastmod>2025-05-27T21:02:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/05/27/may-microsoft-365-webinar-resources-6/</loc><lastmod>2025-05-27T06:32:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/05/27/powershell-script-for-analyzing-exchange-online-email-headers/</loc><lastmod>2025-05-27T06:22:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/05/27/analyzing-exchange-online-email-headers-for-junk-quarantine-reasons/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/05/bp1_thumb-2.png</image:loc><image:title>bp1_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/05/bp1-2.png</image:loc><image:title>bp1.png</image:title></image:image><lastmod>2025-05-26T23:29:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/05/24/cia-brief-20250524/</loc><lastmod>2025-05-24T00:20:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/05/24/handling-a-suspected-user-account-breach-in-microsoft-365-business-premium/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/05/bp_thumb-4.png</image:loc><image:title>bp_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/05/bp-4.png</image:loc><image:title>bp.png</image:title></image:image><lastmod>2025-05-24T00:00:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/05/23/microsoft-365-logging-capabilities-and-how-to-fully-enable-them/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/05/bp_thumb-3.png</image:loc><image:title>bp_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/05/bp-3.png</image:loc><image:title>bp.png</image:title></image:image><lastmod>2025-05-23T04:50:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/05/21/protecting-smbs-with-microsoft-defender-for-cloud-apps/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/05/bp_thumb-2.png</image:loc><image:title>bp_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/05/bp-2.png</image:loc><image:title>bp.png</image:title></image:image><lastmod>2025-05-21T13:04:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/05/20/microsoft-defender-for-office-365-plan-1-vs-plan-2-comparison-and-smb-implementation-guide/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/05/bp_thumb-1.png</image:loc><image:title>bp_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/05/bp-1.png</image:loc><image:title>bp.png</image:title></image:image><lastmod>2025-05-19T22:58:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/05/19/need-to-know-podcast-episode-346/</loc><lastmod>2025-05-18T23:44:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/05/19/microsoft-entra-entitlement-management-for-smb-enhancing-security-and-step-by-step-configuration/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/05/a-cartoon-style-illu_thumb.png</image:loc><image:title>A-cartoon-style-illu_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/05/a-cartoon-style-illu.png</image:loc><image:title>A-cartoon-style-illu.png</image:title></image:image><lastmod>2025-05-18T22:53:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/05/18/enhancing-smb-security-with-microsoft-entra-identity-protection/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/05/screenshot-2025-05-18-080444_thumb.png</image:loc><image:title>Screenshot-2025-05-18-080444_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/05/screenshot-2025-05-18-080444.png</image:loc><image:title>Screenshot-2025-05-18-080444.png</image:title></image:image><lastmod>2025-05-17T22:14:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/05/17/cia-brief-20250517/</loc><lastmod>2025-05-17T01:11:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/05/17/elevating-smb-security-how-privileged-identity-management-pim-provides-maximum-protection/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/05/bp_thumb.png</image:loc><image:title>bp_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/05/bp.png</image:loc><image:title>bp.png</image:title></image:image><lastmod>2025-05-16T21:58:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/05/16/a-guide-to-microsoft-entra-private-access-for-on-premise-servers/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/05/image_thumb-9.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/05/image-9.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2025-05-16T01:01:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/05/15/replacing-radius-for-wireless-security-with-intune-suite-cloud-pki-a-certificate-based-approach/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/05/image_thumb-8.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/05/image-8.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2025-05-14T23:02:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/05/14/managing-byod-devices-in-an-m365-business-premium-environment/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/05/image_thumb-7.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/05/image-7.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2025-05-14T13:40:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/05/13/how-hackers-are-leveraging-artificial-intelligence-ai-to-target-small-businesses-smbs/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/05/image_thumb-6.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/05/image-6.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2025-05-13T00:29:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/05/12/updating-and-patching-software-with-intune/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/05/image_thumb-5.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/05/image-5.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2025-05-11T22:34:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/05/11/how-windows-vbs-helps-prevent-token-theft/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/05/dragon_thumb.jpg</image:loc><image:title>dragon_thumb.jpg</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/05/dragon.jpg</image:loc><image:title>dragon.jpg</image:title></image:image><lastmod>2025-05-11T21:56:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/05/10/cia-brief-20250510/</loc><lastmod>2025-05-09T23:56:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/05/10/how-microsoft-defender-for-cloud-apps-fortifies-microsoft-365/</loc><lastmod>2025-05-09T23:17:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/05/09/security-requirements-for-microsoft-partners-and-their-customers/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/05/bp1_thumb.png</image:loc><image:title>bp1_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/05/bp1.png</image:loc><image:title>bp1.png</image:title></image:image><lastmod>2025-05-09T04:33:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/05/09/how-to-enrol-a-device-in-intune-that-has-previously-been-joined-to-entra-id/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/05/screenshot-2025-05-09-091912_thumb.png</image:loc><image:title>Screenshot-2025-05-09-091912_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/05/screenshot-2025-05-09-091912.png</image:loc><image:title>Screenshot-2025-05-09-091912.png</image:title></image:image><lastmod>2025-05-08T23:17:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/05/08/benefits-of-using-kql-to-improve-the-security/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/05/screenshot-2025-05-08-091712_thumb.png</image:loc><image:title>Screenshot-2025-05-08-091712_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/05/screenshot-2025-05-08-091712.png</image:loc><image:title>Screenshot-2025-05-08-091712.png</image:title></image:image><lastmod>2025-05-07T23:20:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/05/07/how-effective-is-enabling-windows-attack-surface-reduction-in-preventing-a-windows-device-from-malware/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/05/image_thumb-4.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/05/image-4.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2025-05-07T05:59:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/05/06/getting-started-with-the-microsoft-power-platform/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/05/image_thumb-3.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/05/image-3.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2025-05-06T03:16:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/05/05/need-to-know-podcast-episode-345/</loc><lastmod>2025-05-05T01:02:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/05/05/enforce-device-compliance-and-app-protection-policies-on-byod-with-m365-business-premium/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/05/image_thumb-2.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/05/image-2.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2025-05-04T23:55:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/05/04/storage-limits-for-microsoft-365-business-premium-and-microsoft-365-enterprise-e5/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/05/storage_thumb.png</image:loc><image:title>storage_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/05/storage.png</image:loc><image:title>storage.png</image:title></image:image><lastmod>2025-05-03T23:47:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/05/03/cia-brief-20250503/</loc><lastmod>2025-05-02T23:02:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/05/03/getting-beyond-just-emails-with-microsoft-365/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/05/bp1_thumb.jpg</image:loc><image:title>bp1_thumb.jpg</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/05/bp1.jpg</image:loc><image:title>bp1.jpg</image:title></image:image><lastmod>2025-05-02T22:20:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/05/02/ciaops-need-to-know-microsoft-365-webinar-may-5/</loc><lastmod>2025-05-02T05:06:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/05/02/starting-point-for-implementing-intune-security-policies/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/05/image_thumb-1.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/05/image-1.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2025-05-01T23:26:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/05/01/the-evolving-landscape-of-it-security-is-a-multi-vendor-approach-still-the-gold-standard-for-risk-reduction/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/05/screenshot-2025-05-01-145421_thumb.png</image:loc><image:title>Screenshot-2025-05-01-145421_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/05/screenshot-2025-05-01-145421.png</image:loc><image:title>Screenshot-2025-05-01-145421.png</image:title></image:image><lastmod>2025-05-01T04:55:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/05/01/why-using-add-shortcut-to-my-files-in-onedrive-for-business-is-generally-considered-a-best-practice-over-syncing-entire-individual-sharepoint-document-libraries-directly/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/05/image_thumb.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/05/image.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2025-05-14T08:20:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/04/30/join-me-at-channel-guru/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/04/chg-logo-symbol-only_fa_rgb_hr_thumb.png</image:loc><image:title>CHG-Logo-Symbol-Only_FA_RGB_HR_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/04/chg-logo-symbol-only_fa_rgb_hr.png</image:loc><image:title>CHG-Logo-Symbol-Only_FA_RGB_HR.png</image:title></image:image><lastmod>2025-04-30T10:48:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/04/30/minimum-viable-configuration-for-microsoft-sentinel/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/04/mvc-sent_thumb.png</image:loc><image:title>mvc-sent_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/04/mvc-sent.png</image:loc><image:title>mvc-sent.png</image:title></image:image><lastmod>2025-04-29T21:39:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/04/29/creating-an-automated-agent-to-post-historical-computer-events-in-teams-daily-2/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/04/image_thumb-12.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/04/image-12.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2025-04-29T07:41:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/04/29/how-your-business-can-unlock-more-potential-from-microsoft-onenote/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/04/image_thumb-11.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/04/image-11.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2025-04-28T23:51:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/04/28/how-to-configure-microsoft-365-for-maximum-native-data-recovery/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/04/image_thumb-10.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/04/image-10.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2025-04-28T02:05:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/04/28/creating-an-automated-agent-to-post-historical-computer-events-in-teams-daily/</loc><lastmod>2025-04-28T01:58:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/04/27/best-ways-to-monitor-and-audit-permissions-across-a-sharepoint-environment-in-microsoft-365/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/04/image_thumb-9.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/04/image-9.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2025-04-26T23:21:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/04/26/cia-brief-20250426/</loc><lastmod>2025-04-26T00:34:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/04/26/copilot-agent-stuck-on-waiting-for-user/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/04/screenshot-2025-04-26-084309_thumb.png</image:loc><image:title>Screenshot-2025-04-26-084309_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/04/screenshot-2025-04-26-084309.png</image:loc><image:title>Screenshot-2025-04-26-084309.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/04/screenshot-2025-04-26-084517_thumb.png</image:loc><image:title>Screenshot-2025-04-26-084517_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/04/screenshot-2025-04-26-084517.png</image:loc><image:title>Screenshot-2025-04-26-084517.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/04/screenshot-2025-04-26-084153_thumb.png</image:loc><image:title>Screenshot-2025-04-26-084153_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/04/screenshot-2025-04-26-084153.png</image:loc><image:title>Screenshot-2025-04-26-084153.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/04/screenshot-2025-04-26-084058_thumb.png</image:loc><image:title>Screenshot-2025-04-26-084058_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/04/screenshot-2025-04-26-084058.png</image:loc><image:title>Screenshot-2025-04-26-084058.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/04/screenshot-2025-04-26-082748_thumb.png</image:loc><image:title>Screenshot-2025-04-26-082748_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/04/screenshot-2025-04-26-082748.png</image:loc><image:title>Screenshot-2025-04-26-082748.png</image:title></image:image><lastmod>2025-04-25T22:49:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/04/26/what-is-the-ideal-structure-for-collaboration-services-in-microsoft-365/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/04/image_thumb-8.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/04/image-8.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2025-04-25T22:08:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/04/25/use-ai-to-provide-better-spam-protection-and-detection-with-exchange-onlin/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/04/image_thumb-7.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/04/image-7.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2025-04-24T23:08:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/04/25/honouring-the-anzac-legacy-reflections-on-anzac-day-2025/</loc><lastmod>2025-04-24T22:58:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/04/24/how-to-manage-multiple-m365-tenants-using-inbuilt-microsoft-tools/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/04/image_thumb-6.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/04/image-6.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2025-04-23T22:16:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/04/23/april-microsoft-365-webinar-resources-6/</loc><lastmod>2025-04-23T02:27:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/04/23/governing-ai-usage-with-microsoft-365-business-premium/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/04/image_thumb-5.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/04/image-5.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2025-04-22T23:36:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/04/22/microsoft-global-secure-access-and-m365-business-premium/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/04/image_thumb-4.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/04/image-4.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2025-04-21T23:44:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/04/21/passkeys-in-microsoft-entra-id-formerly-azure-active-directory/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/04/image_thumb-3.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/04/image-3.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2025-04-21T04:23:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/04/21/need-to-know-podcast-episode-344/</loc><lastmod>2025-04-21T01:00:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/04/19/cia-brief-20250419/</loc><lastmod>2025-04-19T01:03:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/04/18/likelihood-of-smb-msp-survival/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/04/image_thumb-2.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/04/image-2.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2025-04-18T02:42:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/04/18/powershell-script-to-report-entraid-signin-script-update/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/04/screenshot-2025-04-18-100555_thumb.png</image:loc><image:title>Screenshot-2025-04-18-100555_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/04/screenshot-2025-04-18-100555.png</image:loc><image:title>Screenshot-2025-04-18-100555.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/04/screenshot-2025-04-18-100356_thumb.png</image:loc><image:title>Screenshot-2025-04-18-100356_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/04/screenshot-2025-04-18-100356.png</image:loc><image:title>Screenshot-2025-04-18-100356.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/04/screenshot-2025-04-18-095201_thumb.png</image:loc><image:title>Screenshot-2025-04-18-095201_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/04/screenshot-2025-04-18-095201.png</image:loc><image:title>Screenshot-2025-04-18-095201.png</image:title></image:image><lastmod>2025-04-18T00:17:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/04/14/enhancing-your-copilot-studio-agent-with-topics-and-actions/</loc><lastmod>2025-04-14T01:28:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/04/12/cia-brief-20250412/</loc><lastmod>2025-04-11T23:50:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/04/08/techwerks-27/</loc><lastmod>2025-04-08T00:33:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/04/07/need-to-know-podcast-episode-343/</loc><lastmod>2025-04-06T23:06:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/04/07/cia-brief-20250407/</loc><lastmod>2025-04-06T21:22:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/04/04/microsoft-365-e5-versus-business-premium-with-e5-security-add-on-a-comparative-analysis-for-small-businesses/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/04/image_thumb-1.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/04/image-1.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2025-04-04T09:37:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/04/04/ciaops-need-to-know-microsoft-365-webinar-april-6/</loc><lastmod>2025-04-04T03:28:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/04/01/script-to-delete-old-installed-powershell-module-versions/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/04/image_thumb.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/04/image.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2025-04-01T08:46:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/03/31/exploring-ais-new-capabilities-by-troubleshooting-microsoft-365/</loc><lastmod>2025-03-30T21:33:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/03/29/cia-brief-20250329/</loc><lastmod>2025-03-28T22:19:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/03/28/report-installed-powershell-module-versions/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/03/screenshot-2025-03-28-152200_thumb.png</image:loc><image:title>Screenshot-2025-03-28-152200_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/03/screenshot-2025-03-28-152200.png</image:loc><image:title>Screenshot-2025-03-28-152200.png</image:title></image:image><lastmod>2025-03-28T04:26:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/03/28/march-microsoft-365-webinar-resources-6/</loc><lastmod>2025-03-28T04:06:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/03/24/need-to-know-podcast-episode-342/</loc><lastmod>2025-03-23T23:36:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/03/22/cia-brief-20250322/</loc><lastmod>2025-03-22T02:10:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/03/21/asd-configuration-policy-templates-for-intune/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/03/image_thumb-1.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/03/image-1.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2025-03-20T21:16:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/03/17/mastering-autonomous-actions-with-copilot-studio-a-step-by-step-guide/</loc><lastmod>2025-03-16T23:47:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/03/15/cia-brief-20250315/</loc><lastmod>2025-03-14T21:42:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/03/13/copilot-studio-payg-costs/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/03/screenshot-2025-03-13-134801_thumb.png</image:loc><image:title>Screenshot-2025-03-13-134801_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/03/screenshot-2025-03-13-134801.png</image:loc><image:title>Screenshot-2025-03-13-134801.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/03/screenshot-2025-03-13-141024_thumb.png</image:loc><image:title>Screenshot-2025-03-13-141024_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/03/screenshot-2025-03-13-141024.png</image:loc><image:title>Screenshot-2025-03-13-141024.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/03/screenshot-2025-03-13-141042_thumb.png</image:loc><image:title>Screenshot-2025-03-13-141042_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/03/screenshot-2025-03-13-141042.png</image:loc><image:title>Screenshot-2025-03-13-141042.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/03/screenshot-2025-03-13-140428_thumb.png</image:loc><image:title>Screenshot-2025-03-13-140428_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/03/screenshot-2025-03-13-140428.png</image:loc><image:title>Screenshot-2025-03-13-140428.png</image:title></image:image><lastmod>2025-03-14T13:41:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/03/14/sharepoint-agents-payg-costs/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/03/image_thumb.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/03/image.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2025-03-14T05:39:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/03/10/need-to-know-podcast-episode-341/</loc><lastmod>2025-03-09T22:36:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/03/08/cia-brief-20250308/</loc><lastmod>2025-03-07T22:38:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/03/07/powershell-script-to-check-office-macro-settings/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/03/screenshot-2025-03-07-184045_thumb.png</image:loc><image:title>Screenshot-2025-03-07-184045_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/03/screenshot-2025-03-07-184045.png</image:loc><image:title>Screenshot-2025-03-07-184045.png</image:title></image:image><lastmod>2025-03-07T07:42:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/03/07/cant-swap-azure-subscriptions/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/03/screenshot-2025-03-07-154142_thumb.png</image:loc><image:title>Screenshot-2025-03-07-154142_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/03/screenshot-2025-03-07-154142.png</image:loc><image:title>Screenshot-2025-03-07-154142.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/03/screenshot-2025-03-07-153419_thumb.png</image:loc><image:title>Screenshot-2025-03-07-153419_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/03/screenshot-2025-03-07-153419.png</image:loc><image:title>Screenshot-2025-03-07-153419.png</image:title></image:image><lastmod>2025-03-07T04:49:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/03/05/ciaops-need-to-know-microsoft-365-webinar-march-6/</loc><lastmod>2025-03-05T05:09:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/03/03/configuring-microsoft-365-payg-bizchat-agents/</loc><lastmod>2025-03-03T00:41:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/03/01/cia-brief-20250301/</loc><lastmod>2025-03-01T09:51:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/02/25/a-better-kql-query-to-report-failed-login-by-country/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/02/image_thumb-10.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/02/image-10.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/02/image_thumb-9.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/02/image-9.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2025-02-25T01:25:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/02/25/testing-sensitive-information-types-in-microsoft-purview/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/02/image_thumb-8.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/02/image-8.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/02/image_thumb-7.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/02/image-7.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/02/image_thumb-6.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/02/image-6.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/02/image_thumb-5.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/02/image-5.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/02/image_thumb-4.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/02/image-4.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2025-02-24T20:58:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/02/24/need-to-know-podcast-episode-340/</loc><lastmod>2025-02-23T22:32:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/02/22/cia-brief-20250222/</loc><lastmod>2025-02-21T22:40:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/02/22/updated-windows-for-endpoint-security-baseline/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/02/image_thumb-3.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/02/image-3.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/02/image_thumb-2.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/02/image-2.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2025-05-04T11:10:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/02/21/january-microsoft-365-webinar-resources-6/</loc><lastmod>2025-02-21T22:10:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/02/15/copilot-for-m365-administration/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/02/image_thumb-1.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/02/image-1.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/02/image_thumb.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/02/image.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2025-02-14T23:57:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/02/15/cia-brief-20250215/</loc><lastmod>2025-02-14T23:44:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/02/10/need-to-know-podcast-episode-339/</loc><lastmod>2025-02-09T22:16:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/02/08/cia-brief-20250208/</loc><lastmod>2025-02-07T21:09:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/02/06/ciaops-need-to-know-microsoft-365-webinar-february-5/</loc><lastmod>2025-02-05T23:13:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/02/05/why-i-can-now-delete-a-power-platform-payg-billing-plan/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/02/screenshot-2025-02-05-201444_thumb.jpg</image:loc><image:title>Screenshot-2025-02-05-201444_thumb.jpg</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/02/screenshot-2025-02-05-201444.jpg</image:loc><image:title>Screenshot-2025-02-05-201444.jpg</image:title></image:image><lastmod>2025-02-05T09:15:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/01/17/why-cant-i-delete-a-power-platform-payg-billing-plan/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/01/screenshot-2025-01-17-155808_thumb.png</image:loc><image:title>Screenshot-2025-01-17-155808_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/01/screenshot-2025-01-17-155808.png</image:loc><image:title>Screenshot-2025-01-17-155808.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/01/screenshot-2025-01-17-155502_thumb.png</image:loc><image:title>Screenshot-2025-01-17-155502_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/01/screenshot-2025-01-17-155502.png</image:loc><image:title>Screenshot-2025-01-17-155502.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/01/screenshot-2025-01-17-155309_thumb.png</image:loc><image:title>Screenshot-2025-01-17-155309_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/01/screenshot-2025-01-17-155309.png</image:loc><image:title>Screenshot-2025-01-17-155309.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/01/screenshot-2025-01-17-154952_thumb.jpg</image:loc><image:title>Screenshot-2025-01-17-154952_thumb.jpg</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/01/screenshot-2025-01-17-154952.jpg</image:loc><image:title>Screenshot-2025-01-17-154952.jpg</image:title></image:image><lastmod>2025-02-05T09:12:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/02/05/configuring-microsoft-365-payg-sharepoint-agents/</loc><lastmod>2025-02-04T23:58:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/02/03/cia-brief-20250203/</loc><lastmod>2025-02-02T21:35:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/01/30/configuring-microsoft-365-copilot-chat-payg-agent/</loc><lastmod>2025-01-29T22:35:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/01/27/need-to-know-podcast-episode-338/</loc><lastmod>2025-01-26T22:29:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/01/25/cia-brief-20250125/</loc><lastmod>2025-01-24T22:26:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/01/23/the-impact-of-ai-on-the-msp-business-model/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/01/image_thumb-18.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/01/image-18.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2025-01-22T23:13:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/01/22/configuring-microsoft-365-copilot-chat-payg/</loc><lastmod>2025-01-21T23:04:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/01/19/keeping-tabs-on-azure-costs-via-email/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/01/screenshot-2025-01-19-100531_thumb.png</image:loc><image:title>Screenshot-2025-01-19-100531_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/01/screenshot-2025-01-19-100531.png</image:loc><image:title>Screenshot-2025-01-19-100531.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/01/screenshot-2025-01-19-100809_thumb.png</image:loc><image:title>Screenshot-2025-01-19-100809_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/01/screenshot-2025-01-19-100809.png</image:loc><image:title>Screenshot-2025-01-19-100809.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/01/screenshot-2025-01-19-100354_thumb.png</image:loc><image:title>Screenshot-2025-01-19-100354_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/01/screenshot-2025-01-19-100354.png</image:loc><image:title>Screenshot-2025-01-19-100354.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/01/screenshot-2025-01-19-100019_thumb.png</image:loc><image:title>Screenshot-2025-01-19-100019_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/01/screenshot-2025-01-19-100019.png</image:loc><image:title>Screenshot-2025-01-19-100019.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/01/screenshot-2025-01-19-095742_thumb.jpg</image:loc><image:title>Screenshot-2025-01-19-095742_thumb.jpg</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/01/screenshot-2025-01-19-095742.jpg</image:loc><image:title>Screenshot-2025-01-19-095742.jpg</image:title></image:image><lastmod>2025-01-18T23:16:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/01/18/cia-brief-20250118/</loc><lastmod>2025-01-17T22:33:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/01/18/checking-your-environment-for-oversharing/</loc><lastmod>2025-01-17T22:01:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/01/16/new-mailbox-logging-settings/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/01/screenshot-2025-01-16-165155_thumb.png</image:loc><image:title>Screenshot-2025-01-16-165155_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/01/screenshot-2025-01-16-165155.png</image:loc><image:title>Screenshot-2025-01-16-165155.png</image:title></image:image><lastmod>2025-01-16T05:53:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/01/13/need-to-know-podcast-episode-337/</loc><lastmod>2025-01-12T23:17:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/01/11/cia-brief-20250111/</loc><lastmod>2025-01-10T23:18:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/01/11/the-missed-smb-ai-opportunity/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/01/image_thumb-17.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/01/image-17.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/01/image_thumb-16.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/01/image-16.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/01/image_thumb-15.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/01/image-15.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/01/image_thumb-14.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/01/image-14.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/01/image_thumb-13.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/01/image-13.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2025-01-10T21:43:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/01/11/my-tech-books-2025/</loc><lastmod>2025-01-10T19:54:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/01/10/distributed-password-cracking-attempts-detected-by-sentinel/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/01/image_thumb-12.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/01/image-12.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/01/image_thumb-11.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/01/image-11.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2025-01-10T05:37:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/01/10/my-teams-copilot-can-now-interpret-images/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/01/image_thumb-10.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/01/image-10.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/01/image_thumb-9.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/01/image-9.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2025-01-09T22:45:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/01/10/viewing-copilot-prompt-and-responses-across-the-organisation/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/01/image_thumb-8.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/01/image-8.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/01/image_thumb-7.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/01/image-7.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/01/image_thumb-6.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/01/image-6.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/01/image_thumb-5.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/01/image-5.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2025-01-09T19:27:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/01/09/updated-defender-for-endpoint-security-baseline/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/01/image_thumb-4.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/01/image-4.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2025-01-09T03:33:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/01/09/my-podcasts-2025/</loc><lastmod>2025-01-09T03:20:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/01/08/configuring-dlp-with-microsoft-365-copilot/</loc><lastmod>2025-01-08T00:08:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/01/08/my-tech-videos-2025/</loc><lastmod>2025-01-07T21:42:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/01/07/copilot-pages-missing/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/01/image_thumb-3.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/01/image-3.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/01/image_thumb-2.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/01/image-2.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/01/image_thumb-1.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/01/image-1.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2025-01-07T04:51:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/01/06/my-business-books-2025/</loc><lastmod>2025-01-06T02:43:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/01/06/copilot-pages-not-appears-in-edge-inprivate/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/01/screenshot-2025-01-06-075045_thumb.png</image:loc><image:title>Screenshot-2025-01-06-075045_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/01/screenshot-2025-01-06-075045.png</image:loc><image:title>Screenshot-2025-01-06-075045.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/01/screenshot-2025-01-06-074835_thumb.png</image:loc><image:title>Screenshot-2025-01-06-074835_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/01/screenshot-2025-01-06-074835.png</image:loc><image:title>Screenshot-2025-01-06-074835.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/01/screenshot-2025-01-06-074632_thumb.png</image:loc><image:title>Screenshot-2025-01-06-074632_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/01/screenshot-2025-01-06-074632.png</image:loc><image:title>Screenshot-2025-01-06-074632.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/01/screenshot-2025-01-06-074453_thumb.png</image:loc><image:title>Screenshot-2025-01-06-074453_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/01/screenshot-2025-01-06-074453.png</image:loc><image:title>Screenshot-2025-01-06-074453.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/01/screenshot-2025-01-06-074334_thumb.png</image:loc><image:title>Screenshot-2025-01-06-074334_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/01/screenshot-2025-01-06-074334.png</image:loc><image:title>Screenshot-2025-01-06-074334.png</image:title></image:image><lastmod>2025-01-05T21:27:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/01/04/my-business-apps-2025/</loc><lastmod>2025-01-04T01:55:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/01/04/cia-brief-20250104/</loc><lastmod>2025-01-03T23:38:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/01/03/ciaops-need-to-know-microsoft-365-webinar-january-6/</loc><lastmod>2025-01-02T22:26:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/01/03/my-software-and-services-2025/</loc><lastmod>2025-01-02T22:06:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/01/02/talent-versus-skill/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/01/image_thumb.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2025/01/image.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2025-01-01T21:39:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/01/02/my-gear-2025/</loc><lastmod>2025-01-02T00:21:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/01/01/understanding-ai/</loc><lastmod>2024-12-31T23:28:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2025/01/01/my-stuff-2025/</loc><lastmod>2024-12-31T22:11:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/12/31/need-to-know-podcast-episode-336/</loc><lastmod>2024-12-30T23:48:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/12/28/cia-brief-20241228/</loc><lastmod>2024-12-27T23:53:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/12/27/december-microsoft-365-webinar-resources-6/</loc><lastmod>2024-12-27T02:01:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/12/21/cia-brief-20241221/</loc><lastmod>2024-12-21T01:12:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/12/19/need-to-know-podcast-episode-335/</loc><lastmod>2024-12-18T23:52:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/12/19/free-github-copilot-for-vs-code/</loc><lastmod>2024-12-18T23:09:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/12/18/an-approach-to-copilot-implementation-in-smb/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/12/image_thumb-17.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/12/image-17.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2024-12-17T20:58:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/12/14/need-to-know-podcast-episode-333/</loc><lastmod>2024-12-15T22:14:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/12/16/need-to-know-podcast-episode-334/</loc><lastmod>2024-12-15T22:11:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/12/14/cia-brief-20241214/</loc><lastmod>2024-12-13T22:54:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/12/13/how-to-build-a-microsoft-licensing-agent/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/12/image_thumb-16.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/12/image-16.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/12/image_thumb-15.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/12/image-15.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/12/image_thumb-14.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/12/image-14.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/12/image_thumb-13.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/12/image-13.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/12/image_thumb-12.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/12/image-12.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2024-12-13T03:22:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/12/13/script-to-report-tenant-directory-activity/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/12/image_thumb-5.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/12/image-5.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2024-12-12T21:23:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/12/12/script-to-report-tenant-signins/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/12/image_thumb-4.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/12/image-4.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2024-12-12T06:36:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/12/10/script-to-report-tenant-users/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/12/image_thumb-3.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/12/image-3.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2024-12-10T05:31:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/12/09/script-to-report-tenant-devices/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/12/image_thumb-2.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/12/image-2.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/12/image_thumb-1.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/12/image-1.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2024-12-09T04:09:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/12/09/ciaops-summer-school-2025-is-open-for-enrolments/</loc><lastmod>2024-12-09T02:17:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/12/08/cia-brief-20241208/</loc><lastmod>2024-12-07T22:57:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/12/07/script-to-report-tenant-licenses/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/12/image_thumb.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/12/image.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2024-12-06T22:13:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/12/02/ciaops-need-to-know-microsoft-365-webinar-december-6/</loc><lastmod>2024-12-02T03:46:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/12/02/need-to-know-podcast-episode-332/</loc><lastmod>2024-12-01T22:51:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/11/30/cia-brief-20241129/</loc><lastmod>2024-11-29T23:31:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/11/30/november-microsoft-365-webinar-resources-6/</loc><lastmod>2024-11-29T23:29:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/11/29/ciaops-need-to-know-microsoft-365-webinar-november-6/</loc><lastmod>2024-11-28T22:20:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/11/28/entra-global-secure-access-client-for-ios-now-in-preview/</loc><lastmod>2024-11-28T00:23:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/11/24/cia-brief-20241124/</loc><lastmod>2024-11-24T11:33:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/11/16/cia-brief-20241116/</loc><lastmod>2024-11-15T21:34:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/11/11/remembrance-action/</loc><lastmod>2024-11-11T11:25:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/11/11/need-to-know-podcast-episode-331/</loc><lastmod>2024-11-10T22:45:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/11/09/cia-brief-20241109/</loc><lastmod>2024-11-08T22:24:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/11/05/new-secure-score-report-script/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/11/image_thumb.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/11/image.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2024-11-05T03:58:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/11/02/ciaops-brief-20241102/</loc><lastmod>2024-11-01T21:22:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/11/01/october-microsoft-365-webinar-resources-6/</loc><lastmod>2024-11-01T05:07:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/10/29/recent-presentation-resources/</loc><lastmod>2024-10-29T11:46:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/10/28/need-to-know-podcast-episode-330/</loc><lastmod>2024-10-27T20:35:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/10/27/ciaops-brief-20241027/</loc><lastmod>2024-10-26T20:59:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/10/21/add-onenote-integration-to-new-outlook/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/10/image_thumb-18.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/10/image-18.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/10/image_thumb-17.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/10/image-17.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/10/image_thumb-16.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/10/image-16.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/10/image_thumb-15.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/10/image-15.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2024-10-21T22:55:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/10/19/ciaops-brief-20241019/</loc><lastmod>2024-10-18T21:34:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/10/18/bulk-senders-insight-in-exchange-online/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/10/image_thumb-14.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/10/image-14.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/10/image_thumb-13.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/10/image-13.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/10/image_thumb-12.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/10/image-12.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/10/image_thumb-11.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/10/image-11.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2024-10-17T21:39:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/10/17/shortcuts-in-onedrive-for-business-get-the-benefits-of-copilot-for-microsoft-365/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/10/image_thumb-10.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/10/image-10.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/10/image_thumb-9.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/10/image-9.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/10/image_thumb-8.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/10/image-8.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/10/image_thumb-7.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/10/image-7.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2024-10-17T09:22:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/10/14/need-to-know-podcast-episode-329/</loc><lastmod>2024-10-13T21:06:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/10/12/ciaops-brief-20241012/</loc><lastmod>2024-10-11T21:39:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/10/10/find-the-largest-files-in-onedrive-for-business/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/10/image_thumb-6.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/10/image-6.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/10/image_thumb-5.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/10/image-5.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/10/image_thumb-4.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/10/image-4.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2024-10-09T21:14:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/10/08/ciaops-need-to-know-microsoft-365-webinar-october-6/</loc><lastmod>2024-10-07T20:17:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/10/07/script-to-create-entraid-reset-app/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/10/image_thumb-3.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/10/image-3.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/10/image_thumb-2.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/10/image-2.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/10/image_thumb-1.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/10/image-1.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/10/image_thumb.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/10/image.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2024-10-06T22:30:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/10/05/ciaops-brief-20241005/</loc><lastmod>2024-10-05T01:45:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/09/30/using-powershell-to-allow-user-enablement/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/09/image_thumb-18.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/09/image-18.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/09/image_thumb-17.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/09/image-17.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/09/image_thumb-16.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/09/image-16.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/09/screenshot-2024-09-30-072151_thumb.png</image:loc><image:title>Screenshot-2024-09-30-072151_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/09/screenshot-2024-09-30-072151.png</image:loc><image:title>Screenshot-2024-09-30-072151.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/09/screenshot-2024-09-30-072052_thumb.png</image:loc><image:title>Screenshot-2024-09-30-072052_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/09/screenshot-2024-09-30-072052.png</image:loc><image:title>Screenshot-2024-09-30-072052.png</image:title></image:image><lastmod>2024-10-06T23:19:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/09/30/need-to-know-podcast-episode-328/</loc><lastmod>2024-09-29T20:50:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/09/28/ciaops-brief-20240928/</loc><lastmod>2024-09-27T22:00:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/09/26/create-an-entraid-app-to-alow-user-enablement/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/09/image_thumb-14.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/09/image-14.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/09/image_thumb-13.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/09/image-13.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/09/image_thumb-12.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/09/image-12.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/09/image_thumb-11.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/09/image-11.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/09/image_thumb-10.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/09/image-10.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2024-09-27T14:41:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/09/25/excluding-a-user-from-attack-disruption/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/09/screenshot-2024-09-25-070945_thumb.png</image:loc><image:title>Screenshot-2024-09-25-070945_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/09/screenshot-2024-09-25-070945.png</image:loc><image:title>Screenshot-2024-09-25-070945.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/09/screenshot-2024-09-25-071244_thumb.png</image:loc><image:title>Screenshot-2024-09-25-071244_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/09/screenshot-2024-09-25-071244.png</image:loc><image:title>Screenshot-2024-09-25-071244.png</image:title></image:image><lastmod>2024-09-24T21:22:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/09/23/my-kingdom-for-a-global-admin-login/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/09/image_thumb-1.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/09/image-1.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/09/image_thumb.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/09/image.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2024-09-22T21:39:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/09/21/ciaops-brief-20240921/</loc><lastmod>2024-09-21T02:09:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/09/08/ciaops-brief-20240908/</loc><lastmod>2024-09-08T01:30:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/08/31/need-to-know-podcast-episode-327/</loc><lastmod>2024-08-31T12:08:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/08/31/ciaops-brief-20240831/</loc><lastmod>2024-08-31T10:28:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/08/29/august-microsoft-365-webinar-resources-6/</loc><lastmod>2024-08-29T05:29:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/08/27/check-windows-attack-surface-reduction-asr-enablement/</loc><lastmod>2024-08-26T22:28:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/08/24/ciaops-brief-20240817-2/</loc><lastmod>2024-08-23T22:17:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/08/24/get-teams-meeting-attendees-video/</loc><lastmod>2024-08-23T22:12:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/08/19/ciaops-need-to-know-podcast-now-available-on-spotify/</loc><lastmod>2024-08-18T21:07:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/08/18/need-to-know-podcast-episode-326/</loc><lastmod>2024-08-18T12:50:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/08/17/ciaops-brief-20240817/</loc><lastmod>2024-08-16T21:41:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/08/16/disabling-linkedin-account-connections-in-microsoft-365-video/</loc><lastmod>2024-08-15T22:53:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/08/13/disable-linkedin-integrations-in-microsoft-365/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/08/image-23.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/08/image-22.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/08/image-21.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/08/image-20.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/08/image-19.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/08/image-18.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/08/image-17.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/08/image-16.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/08/image-15.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/08/image-14.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2024-08-13T07:16:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/08/11/set-exchange-online-quarantine-notification-period/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/08/image_thumb-3.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/08/image-3.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/08/image_thumb-2.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/08/image-2.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/08/image_thumb-1.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/08/image-1.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/08/image_thumb.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/08/image.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2024-08-11T02:09:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/08/10/ciaops-brief-20240810/</loc><lastmod>2024-08-09T22:24:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/08/06/validate-email-address-format-with-powershell/</loc><lastmod>2024-08-14T05:23:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/08/04/need-to-know-podcast-episode-324/</loc><lastmod>2024-08-04T01:08:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/08/03/ciaops-brief-20240803/</loc><lastmod>2024-08-02T21:02:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/08/01/ciaops-need-to-know-microsoft-365-webinar-august-6/</loc><lastmod>2024-07-31T22:31:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/07/30/copilot-plugins-make-all-the-difference/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/07/image_thumb-28.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/07/image-28.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/07/image_thumb-27.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/07/image-27.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/07/image_thumb-26.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/07/image-26.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/07/image_thumb-25.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/07/image-25.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/07/image_thumb-24.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/07/image-24.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2024-07-29T23:52:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/07/29/check-mailbox-auditing-settings-using-powershell/</loc><lastmod>2024-07-28T23:00:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/07/28/ciaops-brief-20240728/</loc><lastmod>2024-07-27T22:29:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/07/27/viva-engage-copilot-adoption-community-setup/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/07/image_thumb-23.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/07/image-23.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/07/image_thumb-22.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/07/image-22.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/07/image_thumb-21.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/07/image-21.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2024-07-26T21:19:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/07/27/getting-global-administrators-using-the-graph/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/07/image_thumb-20.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/07/image-20.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2024-07-26T20:56:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/07/12/kql-query-to-report-failed-login-by-country/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/07/image_thumb-7.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/07/image-7.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2024-07-26T20:30:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/07/26/july-microsoft-365-webinar-resources-6/</loc><lastmod>2024-07-26T04:50:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/07/21/need-to-know-podcast-episode-323/</loc><lastmod>2024-07-21T00:21:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/07/21/ciaops-brief-20240721/</loc><lastmod>2024-07-20T22:21:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/07/20/staged-defender-updates-with-intune/</loc><lastmod>2024-07-19T23:29:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/07/17/reading-from-the-ciaops-best-practices-repo/</loc><lastmod>2024-07-17T04:35:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/07/16/odfb-summary-script/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/07/image_thumb-19.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/07/image-19.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/07/image_thumb-18.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/07/image-18.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/07/image_thumb-17.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/07/image-17.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/07/image_thumb-16.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/07/image-16.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/07/image_thumb-15.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/07/image-15.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2024-07-16T00:31:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/07/15/new-ciaops-copilot-for-m365-course/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/07/mountains_thumb.jpg</image:loc><image:title>mountains_thumb.jpg</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/07/mountains.jpg</image:loc><image:title>mountains.jpg</image:title></image:image><lastmod>2024-07-15T03:20:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/07/13/ciaops-brief-20240713/</loc><lastmod>2024-07-12T22:58:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/07/13/yet-another-reason-to-love-onenote/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/07/image_thumb-14.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/07/image-14.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/07/image_thumb-13.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/07/image-13.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/07/image_thumb-12.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/07/image-12.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/07/image_thumb-11.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/07/image-11.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/07/image_thumb-10.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/07/image-10.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2024-07-12T22:51:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/07/12/connecting-defender-easm-logs-to-sentinel-workspace/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/07/image_thumb-6.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/07/image-6.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/07/image_thumb-5.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/07/image-5.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/07/image_thumb-4.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/07/image-4.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/07/image_thumb-3.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/07/image-3.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/07/image_thumb-2.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/07/image-2.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2024-07-12T08:43:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/07/11/mvp-2024-25/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/07/image_thumb.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/07/image.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2024-07-12T04:12:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/07/06/need-to-know-podcast-episode-322/</loc><lastmod>2024-07-06T00:07:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/07/06/ciaops-brief-20240706/</loc><lastmod>2024-07-05T23:15:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/07/02/ciaops-need-to-know-microsoft-365-webinar-july-6/</loc><lastmod>2024-07-01T22:54:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/07/01/an-ai-crescendo-attack-demo/</loc><lastmod>2024-07-01T12:09:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/06/30/introduction-to-microsoft-copilot-for-security/</loc><lastmod>2024-06-30T02:19:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/06/29/ciaops-brief-20240628/</loc><lastmod>2024-06-29T12:55:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/06/28/june-microsoft-365-webinar-resources-5/</loc><lastmod>2024-06-28T02:29:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/06/23/need-to-know-podcast-episode-321/</loc><lastmod>2024-06-23T12:58:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/06/22/ciaops-brief-20240622/</loc><lastmod>2024-06-22T05:20:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/06/15/ciaops-brief-20240615/</loc><lastmod>2024-06-15T02:58:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/06/08/ciaops-brief-20240608/</loc><lastmod>2024-06-08T02:27:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/06/05/ciaops-need-to-know-microsoft-365-webinar-june-5/</loc><lastmod>2024-06-05T11:39:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/06/03/need-to-know-podcast-episode-320/</loc><lastmod>2024-06-02T22:43:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/05/21/need-to-know-podcast-episode-319-2-2/</loc><lastmod>2024-06-02T22:42:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/06/01/ciaops-brief-20240601/</loc><lastmod>2024-06-01T03:39:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/06/01/may-microsoft-365-webinar-resources-5/</loc><lastmod>2024-05-31T22:01:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/05/31/defender-for-cloud-app-connectors/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/05/image_thumb-3.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/05/image-7.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/05/image-6.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/05/image_thumb-2.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/05/image-5.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/05/image-4.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/05/image_thumb-1.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/05/image-3.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/05/image-2.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/05/image_thumb.png</image:loc><image:title>image_thumb.png</image:title></image:image><lastmod>2024-05-30T22:51:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/05/25/ciaops-brief-20240525/</loc><lastmod>2024-05-25T03:55:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/05/18/ciaops-brief-20240518/</loc><lastmod>2024-05-17T23:04:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/05/12/ciaops-brief-20240512/</loc><lastmod>2024-05-12T04:46:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/05/01/ciaops-need-to-know-microsoft-365-webinar-may-4/</loc><lastmod>2024-05-06T06:07:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/05/04/ciaops-brief-20240504/</loc><lastmod>2024-05-04T03:10:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/05/02/techwerks-24/</loc><lastmod>2024-05-02T04:45:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/04/27/ciaops-brief-20240427/</loc><lastmod>2024-04-27T02:24:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/04/26/april-microsoft-365-webinar-resources-5/</loc><lastmod>2024-04-26T06:12:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/04/25/service/</loc><lastmod>2024-04-25T03:45:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/04/21/need-to-know-podcast-episode-318/</loc><lastmod>2024-04-21T04:04:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/04/20/ciaops-brief-20240420/</loc><lastmod>2024-04-21T03:59:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/04/16/configuring-a-budget-for-copilot-for-security/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/04/screenshot-2024-04-16-122538_thumb.png</image:loc><image:title>Screenshot-2024-04-16-122538_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/04/screenshot-2024-04-16-122538.png</image:loc><image:title>Screenshot-2024-04-16-122538.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/04/screenshot-2024-04-16-122404_thumb.png</image:loc><image:title>Screenshot-2024-04-16-122404_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/04/screenshot-2024-04-16-122404.png</image:loc><image:title>Screenshot-2024-04-16-122404.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/04/screenshot-2024-04-16-121946_thumb.png</image:loc><image:title>Screenshot-2024-04-16-121946_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/04/screenshot-2024-04-16-121946.png</image:loc><image:title>Screenshot-2024-04-16-121946.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/04/screenshot-2024-04-16-121617_thumb.png</image:loc><image:title>Screenshot-2024-04-16-121617_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/04/screenshot-2024-04-16-121617.png</image:loc><image:title>Screenshot-2024-04-16-121617.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/04/screenshot-2024-04-16-121310_thumb.png</image:loc><image:title>Screenshot-2024-04-16-121310_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/04/screenshot-2024-04-16-121310.png</image:loc><image:title>Screenshot-2024-04-16-121310.png</image:title></image:image><lastmod>2024-04-16T02:33:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/04/13/ciaops-brief-20240413/</loc><lastmod>2024-04-15T04:15:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/04/09/copilot-for-microsoft-365-the-low-down-for-smb-2/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/04/image-50.png</image:loc><image:title>image-50</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/04/image-49.png</image:loc><image:title>image-49</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/04/image-51.png</image:loc><image:title>image-51</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/04/image-41.png</image:loc><image:title>image-41</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/04/image-42.png</image:loc><image:title>image-42</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/04/image-43.png</image:loc><image:title>image-43</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/04/image-44.png</image:loc><image:title>image-44</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/04/image-46.png</image:loc><image:title>image-46</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/04/image-45.png</image:loc><image:title>image-45</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/04/image-47.png</image:loc><image:title>image-47</image:title></image:image><lastmod>2024-04-09T09:23:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/04/08/copilot-for-security-the-low-down-for-smb/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/04/image_thumb-33.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/04/image-36.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/04/image_thumb-32.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/04/image-35.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2024-04-08T04:20:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/04/07/ciaops-need-to-know-microsoft-365-webinar-april-5/</loc><lastmod>2024-04-07T10:32:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/04/06/ciaops-brief-20240406/</loc><lastmod>2024-04-05T22:34:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/04/03/new-endpoint-security-windows-baseline/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/04/image_thumb-31.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/04/image-34.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/04/image_thumb-30.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/04/image-33.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/04/image_thumb-29.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/04/image-32.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2024-04-03T04:46:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/04/03/copilot-for-security-the-day-after/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/04/image-31.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/04/image-30.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/04/image_thumb-28.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/04/image-29.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/04/image_thumb-27.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/04/image-28.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/04/image_thumb-26.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/04/image-27.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/04/image_thumb-25.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/04/image-26.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2024-04-03T03:10:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/04/02/a-day-with-copilot-for-security/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/04/image_thumb-16.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/04/image-16.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/04/image_thumb-15.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/04/image-15.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/04/image_thumb-14.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/04/image-14.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/04/image_thumb-13.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/04/image-13.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/04/image_thumb-12.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/04/image-12.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2024-04-02T04:06:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/03/30/need-to-know-podcast-episode-317/</loc><lastmod>2024-03-30T03:01:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/03/30/ciaops-brief-20240330/</loc><lastmod>2024-03-30T02:55:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/03/29/time-to-enable-more-logging/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/03/image_thumb-4.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/03/image-5.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/03/image_thumb-3.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/03/image-4.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/03/image_thumb-2.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/03/image-3.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/03/image_thumb-1.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/03/image-2.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2024-03-29T09:07:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/03/28/march-microsoft-365-webinar-resources-5/</loc><lastmod>2024-03-28T04:15:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/03/27/centralised-microsoft-365-add-in-deployments-with-powershell/</loc><lastmod>2024-03-27T02:43:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/03/23/ciaops-brief-20240323/</loc><lastmod>2024-03-23T10:06:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/03/16/ciaops-brief-20240316/</loc><lastmod>2024-03-15T21:16:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/03/12/blockmsolpowershell-blocks-all-users-if-set-to-true/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/03/screenshot-2024-03-12-205633_thumb.png</image:loc><image:title>Screenshot-2024-03-12-205633_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/03/screenshot-2024-03-12-205633.png</image:loc><image:title>Screenshot-2024-03-12-205633.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/03/screenshot-2024-03-12-210611_thumb.png</image:loc><image:title>Screenshot-2024-03-12-210611_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/03/screenshot-2024-03-12-210611.png</image:loc><image:title>Screenshot-2024-03-12-210611.png</image:title></image:image><lastmod>2024-03-12T10:29:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/03/12/ciaops-m365-best-practice-repo-is-now-available/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/03/image_thumb.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/03/image-1.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/03/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2024-03-12T06:20:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/03/09/cia-brief-240309/</loc><lastmod>2024-03-09T02:01:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/03/04/ciaops-need-to-know-microsoft-365-webinar-march-5/</loc><lastmod>2024-03-04T03:37:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/03/03/cia-brief-240303/</loc><lastmod>2024-03-03T23:13:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/03/04/need-to-know-podcast-episode-316/</loc><lastmod>2024-03-03T23:09:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/02/25/cia-brief-240225/</loc><lastmod>2024-02-24T23:15:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/02/20/february-microsoft-365-webinar-resources-3/</loc><lastmod>2024-02-20T04:33:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/02/19/need-to-know-podcast-episode-315/</loc><lastmod>2024-02-18T23:34:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/02/19/cia-brief-240219/</loc><lastmod>2024-02-18T22:24:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/02/12/intune-enterprise-app-management/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/02/image_thumb-42.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/02/image-42.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/02/image_thumb-41.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/02/image-41.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/02/image_thumb-40.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/02/image-40.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/02/image_thumb-39.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/02/image-39.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/02/image_thumb-38.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/02/image-38.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2024-02-12T04:30:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/02/10/cia-brief-240210/</loc><lastmod>2024-02-10T01:41:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/02/09/copilot-for-microsoft-365-in-classic-outlook/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/02/image_thumb-19.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/02/image-19.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/02/image_thumb-18.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/02/image-18.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/02/image_thumb-17.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/02/image-17.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/02/image_thumb-16.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/02/image-16.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2024-02-09T05:08:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/02/05/need-to-know-podcast-episode-314/</loc><lastmod>2024-02-05T05:20:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/02/03/cia-brief-240203/</loc><lastmod>2024-02-03T02:50:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/02/02/ciaops-need-to-know-microsoft-365-webinar-february-4/</loc><lastmod>2024-02-03T01:50:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/02/01/microsoft-365-backup-restore-process/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/02/image_thumb-15.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/02/image-15.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/02/image_thumb-14.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/02/image-14.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/02/image_thumb-13.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/02/image-13.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/02/image_thumb-12.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/02/image-12.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/02/image_thumb-11.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/02/image-11.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2024-02-01T06:48:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/01/31/january-microsoft-365-webinar-resources-5/</loc><lastmod>2024-01-31T04:20:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/01/30/setting-microsoft-365-backup-policies/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/01/image_thumb-51.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/01/image-51.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/01/image_thumb-50.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/01/image-50.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/01/image_thumb-49.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/01/image-49.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/01/image_thumb-48.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/01/image-48.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/01/image_thumb-47.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/01/image-47.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2024-01-30T04:29:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/01/27/cia-brief-240127/</loc><lastmod>2024-01-27T02:17:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/01/26/microsoft-365-backup-pricing/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/01/image_thumb-41.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/01/image-41.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/01/image_thumb-40.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/01/image-40.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2024-01-26T08:25:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/01/25/techwerks-23/</loc><lastmod>2024-01-25T04:08:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/01/25/secure-more-with-secure-score-in-m365-online-course/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/01/designer_thumb.jpg</image:loc><image:title>Designer_thumb.jpg</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/01/designer.jpg</image:loc><image:title>Designer.jpg</image:title></image:image><lastmod>2024-01-25T03:51:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/01/23/ive-moved-sec-test/</loc><lastmod>2024-01-23T06:32:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/01/20/need-to-know-podcast-episode-313/</loc><lastmod>2024-01-20T02:17:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/01/20/cia-brief-240120/</loc><lastmod>2024-01-20T02:10:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/01/19/set-up-microsoft-365-backup/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/01/image_thumb-39.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/01/image-39.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/01/image_thumb-38.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/01/image-38.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/01/image_thumb-37.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/01/image-37.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/01/image_thumb-36.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/01/image-36.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/01/image_thumb-35.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/01/image-35.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2024-01-19T02:11:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/01/17/adding-copilot-button-to-desktop-applications/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/01/image_thumb-31.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/01/image-31.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/01/image_thumb-30.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/01/image-30.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/01/image_thumb-29.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/01/image-29.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/01/image_thumb-28.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/01/image-28.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/01/image_thumb-27.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/01/image-27.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2024-01-17T04:14:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/01/13/cia-brief-240113/</loc><lastmod>2024-01-13T01:55:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/01/12/my-tech-books-2024/</loc><lastmod>2024-01-12T03:18:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/01/11/defender-for-office-365-anti-phishing-policies-can-protect-externals-as-well/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/01/image_thumb-14.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/01/image-14.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/01/image_thumb-13.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/01/image-13.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2024-01-11T04:52:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/01/11/my-podcasts-2024/</loc><lastmod>2024-01-11T04:17:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/01/09/my-tech-videos-2024/</loc><lastmod>2024-01-09T03:11:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/01/09/issues-with-microsoft-defender-on-ios/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/01/image_thumb-12.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/01/image-12.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/01/image_thumb-11.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/01/image-11.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2024-01-09T02:53:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/01/08/my-business-books-2024/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/01/image_thumb-10.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/01/image-10.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2024-01-08T04:00:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/01/06/cia-brief-240106/</loc><lastmod>2024-01-06T02:27:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/01/06/need-to-know-podcast-episode-312/</loc><lastmod>2024-01-06T02:16:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/01/05/enabling-microsoft-syntex-payg/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/01/image_thumb-9.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/01/image-9.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/01/image_thumb-8.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/01/image-8.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/01/image_thumb-7.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/01/image-7.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/01/image_thumb-6.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/01/image-6.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/01/image_thumb-5.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/01/image-5.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2024-01-05T08:34:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/01/05/my-apps-2024/</loc><lastmod>2024-01-05T07:37:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/01/03/my-software-and-services-2024/</loc><lastmod>2024-01-03T04:08:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/01/03/using-powershell-to-get-secure-score-history/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/01/image_thumb.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/01/image.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2024-01-03T03:33:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/01/02/ciaops-need-to-know-microsoft-365-webinar-january-5/</loc><lastmod>2024-01-02T05:04:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/01/02/my-gear-2024/</loc><lastmod>2024-01-02T04:59:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/01/01/ciaopslabs-is-open-for-business/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/01/horse_thumb.jpg</image:loc><image:title>horse_thumb.jpg</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2024/01/horse.jpg</image:loc><image:title>horse.jpg</image:title></image:image><lastmod>2024-01-01T03:42:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2024/01/01/my-stuff-2024/</loc><lastmod>2024-01-01T03:09:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/12/31/cia-brief-231231/</loc><lastmod>2023-12-31T09:34:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/12/29/december-microsoft-365-webinar-resources-5/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/12/image_thumb-5.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/12/image-5.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2023-12-29T05:27:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/12/28/joined-devices-not-appearing-in-intune/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/12/image_thumb-4.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/12/image-4.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/12/image_thumb-3.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/12/image-3.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/12/image_thumb-2.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/12/image-2.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2024-01-09T21:44:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/12/23/need-to-know-podcast-episode-311/</loc><lastmod>2023-12-23T03:32:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/12/23/cia-brief-231223/</loc><lastmod>2023-12-23T03:26:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/12/17/cia-brief-231217/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/12/image_thumb-1.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/12/image-1.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2023-12-17T01:32:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/12/11/ciaops-summer-school-is-open-for-enrolments/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/12/image_thumb.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/12/image.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2023-12-11T05:36:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/12/09/cia-brief-231209/</loc><lastmod>2023-12-09T00:00:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/12/04/ciaops-need-to-know-microsoft-365-webinar-december-5/</loc><lastmod>2023-12-03T22:11:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/12/02/cia-brief-231201/</loc><lastmod>2023-12-01T22:52:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/11/30/november-microsoft-365-webinar-resources-5/</loc><lastmod>2023-11-30T10:58:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/11/26/cia-brief-231126/</loc><lastmod>2023-11-26T12:23:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/11/18/cia-brief-231118/</loc><lastmod>2023-11-17T22:34:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/11/11/we-shall-remember-them-5/</loc><lastmod>2023-11-10T23:12:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/11/11/cia-brief-231111/</loc><lastmod>2023-11-10T22:30:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/11/07/accessing-azure-key-vault-via-power-automate/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/11/image_thumb-37.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/11/image-38.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/11/image_thumb-36.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/11/image-37.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/11/image_thumb-35.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/11/image-36.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/11/image_thumb-34.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/11/image-35.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/11/image_thumb-33.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/11/image-34.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2023-11-06T21:33:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/11/06/ciaops-need-to-know-microsoft-365-webinar-november-5/</loc><lastmod>2023-11-06T03:24:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/11/06/adding-a-secret-to-an-azure-key-vault/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/11/image_thumb-26.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/11/image-26.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/11/image_thumb-25.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/11/image-25.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/11/image_thumb-24.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/11/image-24.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/11/image_thumb-23.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/11/image-23.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/11/image_thumb-22.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/11/image-22.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2023-11-05T22:20:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/11/04/create-a-new-azure-key-vault-video/</loc><lastmod>2023-11-03T23:17:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/11/04/cia-brief-231104/</loc><lastmod>2023-11-30T04:15:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/11/03/create-a-new-azure-key-vault/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/11/image_thumb-18.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/11/image-18.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/11/image_thumb-17.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/11/image-17.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/11/image_thumb-16.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/11/image-16.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/11/image_thumb-15.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/11/image-15.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/11/image_thumb-14.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/11/image-14.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2023-11-03T03:59:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/11/02/cia-brief-is-coming/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/11/image_thumb.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/11/image.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2023-11-01T23:12:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/10/31/october-microsoft-365-webinar-resources-5/</loc><lastmod>2023-10-31T11:03:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/10/30/ciaops-need-to-know-microsoft-365-webinar-october-5/</loc><lastmod>2023-10-30T02:55:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/10/25/monitoring-a-break-glass-account-with-sentinel/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/10/image_thumb-33.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/10/image-33.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/10/image_thumb-32.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/10/image-32.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/10/image_thumb-31.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/10/image-31.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/10/image_thumb-30.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/10/image-30.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/10/image_thumb-29.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/10/image-29.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2023-10-24T21:19:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/10/24/monitoring-a-break-glass-account-with-defender-for-cloud-apps/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/10/image_thumb-24.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/10/image-24.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/10/image_thumb-23.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/10/image-23.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/10/image_thumb-22.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/10/image-22.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/10/image_thumb-21.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/10/image-21.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/10/image_thumb-20.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/10/image-20.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2023-10-24T03:06:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/10/23/copilot-appearance-for-smb-will-require-patience/</loc><lastmod>2023-10-23T09:30:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/10/14/using-sentinel-to-determine-application-usage/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/10/image_thumb-17.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/10/image-17.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2023-10-13T21:21:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/10/13/block-applications-on-windows-devices-using-intune/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/10/image_thumb-16.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/10/image-16.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/10/image_thumb-15.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/10/image-15.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/10/image_thumb-14.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/10/image-14.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/10/image_thumb-13.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/10/image-13.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2025-01-09T18:36:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/10/12/setting-edge-as-the-default-browser-using-intune/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/10/image_thumb-12.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/10/image-12.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/10/image_thumb-11.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/10/image-11.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/10/image_thumb-10.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/10/image-10.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/10/image_thumb-9.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/10/image-9.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/10/image_thumb-8.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/10/image-8.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2023-10-12T10:18:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/10/03/setting-an-individual-attack-surface-reduction-asr-rule-in-intune/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/10/image_thumb-6.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/10/image-6.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/10/image_thumb-5.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/10/image-5.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/10/image_thumb-4.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/10/image-4.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/10/image_thumb-3.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/10/image-3.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/10/image_thumb-2.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/10/image-2.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2023-10-03T11:55:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/09/30/setting-an-edge-security-baseline-with-intune/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/09/image_thumb-24.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/09/image-24.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/09/image_thumb-23.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/09/image-23.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/09/image_thumb-22.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/09/image-22.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/09/image_thumb-21.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/09/image-21.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/09/image_thumb-20.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/09/image-20.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2024-06-27T10:26:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/09/29/managing-browser-extensions-in-edge-with-intune/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/09/capture-1_thumb.png</image:loc><image:title>Capture-1_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/09/capture-1.png</image:loc><image:title>Capture-1.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/09/capture_thumb.png</image:loc><image:title>Capture_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/09/capture.png</image:loc><image:title>Capture.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/09/image_thumb-18.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/09/image-18.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/09/image_thumb-17.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/09/image-17.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/09/image_thumb-16.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/09/image-16.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2023-09-29T07:15:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/09/29/september-microsoft-365-webinar-resources-5/</loc><lastmod>2023-09-29T06:17:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/09/28/setting-the-default-search-engine-in-edge-with-intune/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/09/capture2_thumb.png</image:loc><image:title>Capture2_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/09/capture2.png</image:loc><image:title>Capture2.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/09/image_thumb-12.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/09/image-12.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/09/image_thumb-11.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/09/image-11.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/09/image_thumb-10.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/09/image-10.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/09/image_thumb-9.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/09/image-9.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2023-09-28T04:55:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/09/27/controlling-local-user-group-membership-with-intune/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/09/image_thumb-7.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/09/image-7.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/09/image_thumb-6.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/09/image-6.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/09/image_thumb-5.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/09/image-5.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2023-09-27T00:16:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/09/26/controlling-local-admin-with-laps-and-intune/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/09/image_thumb-4.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/09/image-4.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/09/image_thumb-3.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/09/image-3.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/09/image_thumb-2.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/09/image-2.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/09/image_thumb-1.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/09/image-1.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/09/image_thumb.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/09/image.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2023-09-25T23:29:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/09/17/dont-over-look-a-good-naming-convention/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/09/pexels-george-becker-243337_thumb.jpg</image:loc><image:title>pexels-george-becker-243337_thumb.jpg</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/09/pexels-george-becker-243337.jpg</image:loc><image:title>pexels-george-becker-243337.jpg</image:title></image:image><lastmod>2023-09-17T02:08:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/09/14/start-with-intune-compliance-policies/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/09/screenshot-2023-09-14-103209_thumb.png</image:loc><image:title>Screenshot-2023-09-14-103209_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/09/screenshot-2023-09-14-103209.png</image:loc><image:title>Screenshot-2023-09-14-103209.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/09/screenshot-2023-09-14-102823_thumb.png</image:loc><image:title>Screenshot-2023-09-14-102823_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/09/screenshot-2023-09-14-102823.png</image:loc><image:title>Screenshot-2023-09-14-102823.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/09/screenshot-2023-09-14-102330_thumb.png</image:loc><image:title>Screenshot-2023-09-14-102330_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/09/screenshot-2023-09-14-102330.png</image:loc><image:title>Screenshot-2023-09-14-102330.png</image:title></image:image><lastmod>2023-09-14T00:38:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/09/11/need-to-know-podcast-episode-310/</loc><lastmod>2023-09-10T22:41:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/09/08/techwerks-21/</loc><lastmod>2023-09-08T04:28:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/09/01/ciaops-need-to-know-microsoft-365-webinar-august-5/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/09/laptop-eyes-technology-computer_thumb_thumb.jpg</image:loc><image:title>laptop-eyes-technology-computer_thumb_thumb.jpg</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/09/laptop-eyes-technology-computer_thumb.jpg</image:loc><image:title>laptop-eyes-technology-computer_thumb.jpg</image:title></image:image><lastmod>2023-09-01T04:50:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/08/31/august-microsoft-365-webinar-resources-5/</loc><lastmod>2023-08-31T04:22:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/08/25/windows-phone-link-is-cool/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/08/image_thumb.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/08/image.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2023-08-24T21:32:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/08/24/need-to-know-podcast-episode-309/</loc><lastmod>2023-08-23T23:23:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/08/12/ai-is-simply-another-it-tool/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/08/pexels-pixabay-162553_thumb.jpg</image:loc><image:title>pexels-pixabay-162553_thumb.jpg</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/08/pexels-pixabay-162553.jpg</image:loc><image:title>pexels-pixabay-162553.jpg</image:title></image:image><lastmod>2023-08-12T00:32:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/08/07/need-to-know-podcast-episode-308/</loc><lastmod>2023-08-06T23:27:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/04/27/connect-power-automate-to-twitter-using-a-bring-your-own-app-approach/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/04/image_thumb-55.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/04/image-61.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/04/image_thumb-54.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/04/image-60.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/04/image_thumb-53.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/04/image-59.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/04/image_thumb-52.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/04/image-58.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/04/image_thumb-51.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/04/image-57.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2023-10-12T09:35:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/07/29/july-microsoft-365-webinar-resources-5/</loc><lastmod>2023-07-28T14:11:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/07/24/need-to-know-podcast-episode-307/</loc><lastmod>2023-07-23T23:17:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/07/18/techwerks-20/</loc><lastmod>2023-07-17T23:52:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/07/17/run-on-demand-powershell-scripts-from-intune/</loc><lastmod>2023-07-16T22:43:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/07/12/iot-motors/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/07/board.png</image:loc><image:title>board</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/07/2023-07-12_23-56-20-1.png</image:loc><image:title>2023-07-12_23-56-20-1</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/07/2023-07-12_23-56-20.png</image:loc><image:title>2023-07-12_23-56-20</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/07/robotrover-2.gif</image:loc><image:title>robotrover-2</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/07/image-10.png</image:loc><image:title>image-10</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/07/robotrover_thumb-1.gif</image:loc><image:title>robotrover_thumb.gif</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/07/robotrover-1.gif</image:loc><image:title>robotrover.gif</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/07/robotrover_thumb.gif</image:loc><image:title>robotrover_thumb.gif</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/07/robotrover.gif</image:loc><image:title>robotrover.gif</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/07/image_thumb-9.png</image:loc><image:title>image_thumb.png</image:title></image:image><lastmod>2023-07-12T13:59:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/07/10/need-to-know-podcast-episode-306/</loc><lastmod>2023-07-12T22:44:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/07/07/mvp-2023-24/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/07/2023-microsoft-most-valuable-professional-mvp_thumb.png</image:loc><image:title>2023-microsoft-most-valuable-professional-mvp_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/07/2023-microsoft-most-valuable-professional-mvp.png</image:loc><image:title>2023-microsoft-most-valuable-professional-mvp.png</image:title></image:image><lastmod>2023-07-07T02:34:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/07/06/reset-sharepoint-online-document-library-permissions-script/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/07/image_thumb-7.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/07/image-7.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/07/image_thumb-6.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/07/image-6.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/07/image_thumb-5.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/07/image-5.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/07/image_thumb-4.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/07/image-4.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/07/image_thumb-3.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/07/image-3.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2023-07-06T13:32:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/07/06/connect-to-pnp-powershell-script/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/07/image_thumb-1.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/07/image-1.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/07/image_thumb.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/07/image.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2023-07-06T12:52:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/07/04/ciaops-need-to-know-microsoft-365-webinar-july-5/</loc><lastmod>2023-07-03T21:26:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/07/04/june-microsoft-365-webinar-resources-4/</loc><lastmod>2023-07-03T21:23:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/06/29/basic-event-capture-in-microsoft-365/</loc><lastmod>2023-06-29T00:56:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/06/26/need-to-know-podcast-episode-305/</loc><lastmod>2023-06-26T01:40:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/06/23/powershell-connection-to-m365-compliance-center-no-longer-users-winrm/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/06/image_thumb-28.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/06/image-28.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/06/image_thumb-27.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/06/image-27.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2023-06-23T03:58:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/06/21/basic-windows-application-control-using-intune-policies/</loc><lastmod>2023-06-21T00:25:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/06/16/change-in-the-share-to-specific-users-process-in-sharepoint-online-and-onedrive-for-business/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/06/image_thumb-26.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/06/image-26.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/06/image_thumb-25.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/06/image-25.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/06/image_thumb-24.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/06/image-24.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/06/image_thumb-23.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/06/image-23.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/06/image_thumb-22.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/06/image-22.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2023-06-16T08:08:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/06/12/need-to-know-podcast-episode-304/</loc><lastmod>2023-06-12T01:29:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2018/01/12/free-legacy-sharepoint-documentation-and-training/</loc><lastmod>2023-06-09T22:50:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/06/09/announcing-the-ciaops-power-automate-online-course/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/06/image_thumb-12.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/06/image-12.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2023-06-09T07:13:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/06/07/device-actions-during-an-incident/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/06/image_thumb-11.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/06/image-11.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/06/image_thumb-10.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/06/image-10.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/06/image_thumb-9.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/06/image-9.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/06/image_thumb-8.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/06/image-8.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/06/image_thumb-7.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/06/image-7.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2023-06-07T00:18:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/06/05/power-automate-email-arrive-action-file-size-only-4-bytes/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/06/image_thumb-3.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/06/image-3.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/06/image_thumb-2.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/06/image-2.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/06/image_thumb-1.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/06/image-1.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2023-06-05T01:58:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/06/01/subscribing-a-sparkfun-thingplus-esp32-s2-wroom-to-adafruit-io/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/06/switchled_thumb.gif</image:loc><image:title>switchled_thumb.gif</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/06/switchled.gif</image:loc><image:title>switchled.gif</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/06/image_thumb.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/06/image.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2023-06-01T04:35:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/06/01/ciaops-need-to-know-microsoft-365-webinar-june-4/</loc><lastmod>2023-06-01T03:29:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/05/31/connecting-a-sparkfun-thingplus-esp32-s2-wroom-to-adafruit-io/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/05/image_thumb-21.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/05/image-21.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/05/image_thumb-20.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/05/image-20.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/05/image_thumb-19.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/05/image-19.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2023-05-31T05:01:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/05/30/an-overview-of-winget/</loc><lastmod>2023-05-30T01:33:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/05/30/need-to-know-podcast-episode-303/</loc><lastmod>2023-05-30T01:06:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/05/27/introduction-to-exchange-online-protection/</loc><lastmod>2023-05-27T00:06:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/05/26/may-microsoft-365-webinar-resources-4/</loc><lastmod>2023-05-26T03:56:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/05/25/get-teams-meeting-attendees-via-powershell-and-the-microsoft-graph/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/05/image_thumb-18.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/05/image-18.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/05/image_thumb-17.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/05/image-17.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/05/image_thumb-16.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/05/image-16.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2024-08-23T22:08:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/05/15/using-the-defender-for-endpoint-api-and-powershell-updated/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/05/image_thumb-15.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/05/image-15.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/05/image_thumb-14.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/05/image-14.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/05/image_thumb-13.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/05/image-13.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/05/image_thumb-12.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/05/image-12.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/05/image_thumb-11.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/05/image-11.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2023-05-15T06:34:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/06/15/using-the-defender-for-endpoint-api-and-powershell/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/06/image_thumb-42.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/06/image-42.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/06/image_thumb-41.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/06/image-41.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/06/image_thumb-40.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/06/image-40.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/06/image_thumb-39.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/06/image-39.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/06/image_thumb-38.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/06/image-38.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2023-05-15T06:33:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/05/15/need-to-know-podcast-episode-302/</loc><lastmod>2023-05-15T01:29:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/05/02/ciaops-need-to-know-microsoft-365-webinar-may-3/</loc><lastmod>2023-05-02T05:48:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/05/02/adoption-with-fun-and-openai/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/05/image_thumb-8.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/05/image-8.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/05/image_thumb-7.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/05/image-7.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/05/image_thumb-6.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/05/image-6.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/05/image_thumb-5.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/05/image-5.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/05/image_thumb-4.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/05/image-4.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2023-09-14T22:33:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/05/01/need-to-know-podcast-episode-301/</loc><lastmod>2023-05-01T00:26:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/04/28/april-microsoft-365-webinar-resources-4/</loc><lastmod>2023-04-28T06:08:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/04/26/power-automate-twitter-connector-failing/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/04/image_thumb-30.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/04/image-36.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2023-04-26T20:54:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/04/25/anzac-day-2023/</loc><lastmod>2023-04-25T03:03:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/12/08/adoption-with-fun/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/12/image_thumb-12.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/12/image-12.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/12/image_thumb-11.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/12/image-11.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/12/image_thumb-10.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/12/image-10.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/12/image_thumb-9.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/12/image-9.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/12/image_thumb-8.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/12/image-8.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2023-04-22T11:17:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/04/22/adoption-with-fun-and-astronomy/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/04/image_thumb-29.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/04/image-35.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/04/image_thumb-28.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/04/image-34.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/04/image_thumb-27.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/04/image-33.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/04/image_thumb-26.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/04/image-32.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/04/image-31.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/04/image_thumb-25.png</image:loc><image:title>image_thumb.png</image:title></image:image><lastmod>2023-04-22T11:14:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/04/13/connecting-a-sparkfun-thingplus-esp32-s2-wroom-to-azure-iot-central/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/04/image_thumb-19.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/04/image-20.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/04/image_thumb-18.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/04/image-19.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/04/image_thumb-17.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/04/image-18.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/04/image_thumb-16.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/04/image-17.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/04/image_thumb-15.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/04/image-16.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2023-04-13T08:16:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/04/11/need-to-know-podcast-episode-300/</loc><lastmod>2023-04-11T01:26:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/04/07/intune-suite-rollout-roadmap/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/04/image_thumb-11.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/04/image-12.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/04/image-11.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2023-04-07T02:36:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/04/04/getting-endpoint-privilege-management-rule-policies-working/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/04/screenshot-2023-04-04-182512_thumb.png</image:loc><image:title>Screenshot-2023-04-04-182512_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/04/screenshot-2023-04-04-182512.png</image:loc><image:title>Screenshot-2023-04-04-182512.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/04/screenshot-2023-04-04-182359_thumb.png</image:loc><image:title>Screenshot-2023-04-04-182359_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/04/screenshot-2023-04-04-182359.png</image:loc><image:title>Screenshot-2023-04-04-182359.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/04/screenshot-2023-04-04-182221_thumb.png</image:loc><image:title>Screenshot-2023-04-04-182221_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/04/screenshot-2023-04-04-182221.png</image:loc><image:title>Screenshot-2023-04-04-182221.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/04/screenshot-2023-04-04-182041_thumb.png</image:loc><image:title>Screenshot-2023-04-04-182041_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/04/screenshot-2023-04-04-182041.png</image:loc><image:title>Screenshot-2023-04-04-182041.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/04/screenshot-2023-04-04-181930_thumb.png</image:loc><image:title>Screenshot-2023-04-04-181930_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/04/screenshot-2023-04-04-181930.png</image:loc><image:title>Screenshot-2023-04-04-181930.png</image:title></image:image><lastmod>2023-04-04T09:06:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/04/04/getting-endpoint-privilege-management-working/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/04/screenshot-2023-04-04-153409_thumb.png</image:loc><image:title>Screenshot-2023-04-04-153409_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/04/screenshot-2023-04-04-153409.png</image:loc><image:title>Screenshot-2023-04-04-153409.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/04/screenshot-2023-04-04-153323_thumb.png</image:loc><image:title>Screenshot-2023-04-04-153323_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/04/screenshot-2023-04-04-153323.png</image:loc><image:title>Screenshot-2023-04-04-153323.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/04/screenshot-2023-04-04-153137_thumb.png</image:loc><image:title>Screenshot-2023-04-04-153137_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/04/screenshot-2023-04-04-153137.png</image:loc><image:title>Screenshot-2023-04-04-153137.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/04/screenshot-2023-04-04-153056_thumb.png</image:loc><image:title>Screenshot-2023-04-04-153056_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/04/screenshot-2023-04-04-153056.png</image:loc><image:title>Screenshot-2023-04-04-153056.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/04/screenshot-2023-04-04-153526_thumb.png</image:loc><image:title>Screenshot-2023-04-04-153526_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/04/screenshot-2023-04-04-153526.png</image:loc><image:title>Screenshot-2023-04-04-153526.png</image:title></image:image><lastmod>2023-04-04T21:22:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/04/04/ciaops-need-to-know-microsoft-365-webinar-april-4/</loc><lastmod>2023-04-04T05:39:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/03/28/march-microsoft-365-webinar-resources-4/</loc><lastmod>2023-03-28T05:16:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/03/26/blocking-command-prompt-on-windows-with-an-intune-device-configuration-profile/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/03/capture2_thumb.png</image:loc><image:title>Capture2_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/03/capture2.png</image:loc><image:title>Capture2.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/03/image_thumb-31.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/03/image-31.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/03/image_thumb-30.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/03/image-30.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/03/image_thumb-29.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/03/image-29.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/03/image_thumb-28.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/03/image-28.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2023-03-25T22:54:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/03/26/blocking-registry-edits-on-windows-with-an-intune-device-configuration-profile/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/03/capture1_thumb.png</image:loc><image:title>Capture1_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/03/capture1.png</image:loc><image:title>Capture1.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/03/image_thumb-26.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/03/image-26.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/03/image_thumb-25.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/03/image-25.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/03/image_thumb-24.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/03/image-24.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/03/image_thumb-23.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/03/image-23.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2023-03-25T21:52:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/03/22/techwerks-19/</loc><lastmod>2023-03-20T23:49:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/03/21/blocking-usb-devices-on-windows-with-an-intune-device-configuration-profile/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/03/screenshot-2023-03-20-145033_thumb-1.png</image:loc><image:title>Screenshot-2023-03-20-145033_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/03/screenshot-2023-03-20-145033-1.png</image:loc><image:title>Screenshot-2023-03-20-145033.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/03/image_thumb-18.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/03/image-18.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/03/image_thumb-17.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/03/image-17.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/03/image_thumb-16.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/03/image-16.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/03/image_thumb-15.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/03/image-15.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2023-03-20T05:20:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/03/20/blocking-usb-devices-on-windows-with-an-intune-endpoint-security-policy/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/03/screenshot-2023-03-20-145033_thumb.png</image:loc><image:title>Screenshot-2023-03-20-145033_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/03/screenshot-2023-03-20-145033.png</image:loc><image:title>Screenshot-2023-03-20-145033.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/03/image_thumb-9.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/03/image-9.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/03/image_thumb-8.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/03/image-8.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/03/image_thumb-7.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/03/image-7.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/03/image_thumb-6.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/03/image-6.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2023-03-20T04:29:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/03/20/need-to-know-podcast-episode-299/</loc><lastmod>2023-03-19T21:55:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/03/13/exchange-online-malware-filters/</loc><lastmod>2023-03-12T21:36:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/03/08/ciaops-need-to-know-microsoft-365-webinar-march-4/</loc><lastmod>2023-03-07T19:55:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/03/06/need-to-know-podcast-episode-298/</loc><lastmod>2023-03-10T21:19:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/02/27/exchange-online-spam-filters/</loc><lastmod>2023-02-27T00:17:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/02/19/need-to-know-podcast-episode-297/</loc><lastmod>2023-02-19T00:20:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/02/13/an-introduction-to-power-automate/</loc><lastmod>2023-02-12T23:15:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/02/08/new-iot-device-with-a-servo-motor/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/02/servo_thumb.gif</image:loc><image:title>servo_thumb.gif</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/02/servo.gif</image:loc><image:title>servo.gif</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/02/image_thumb-1.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/02/image-1.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/02/image_thumb.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/02/image.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2023-02-08T02:43:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/02/07/microsoft-365-incident-response-training-now-on-demand/</loc><lastmod>2023-02-06T21:35:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/02/06/need-to-know-podcast-episode-296/</loc><lastmod>2023-02-06T04:25:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/02/06/ciaops-need-to-know-microsoft-365-webinar-february-3/</loc><lastmod>2023-02-06T04:21:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/01/30/intune-remote-help-introduction/</loc><lastmod>2023-01-29T23:05:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/01/27/january-microsoft-365-webinar-resources-4/</loc><lastmod>2023-01-27T04:24:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/01/26/platformio-code-compiles-but-fails-to-execute-when-uploaded/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/01/image_thumb-4.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/01/image-4.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2023-01-26T09:32:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/01/22/need-to-know-podcast-episode-295/</loc><lastmod>2023-01-22T11:16:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/01/20/microsoft-defender-for-endpoint-the-ultimate-solution-for-endpoint-security/</loc><lastmod>2023-01-20T01:21:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/01/17/my-tech-books-2023/</loc><lastmod>2023-01-16T23:52:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/01/16/microsoft-365-collaboration-framework-training/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/01/pexels-pixabay-416405_thumb.jpg</image:loc><image:title>pexels-pixabay-416405_thumb.jpg</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/01/pexels-pixabay-416405.jpg</image:loc><image:title>pexels-pixabay-416405.jpg</image:title></image:image><lastmod>2023-01-15T23:09:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/01/14/my-podcasts-2023/</loc><lastmod>2023-01-14T13:12:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/01/13/my-tech-videos-2023/</loc><lastmod>2023-01-13T02:35:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/01/12/blocking-web-sites-with-defender-for-cloud-apps/</loc><lastmod>2023-01-11T23:54:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/01/09/sc-900-exam-now-has-free-practice-tests/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/01/image_thumb-3.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/01/image-3.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2023-01-08T23:53:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/01/09/need-to-know-podcast-episode-294/</loc><lastmod>2023-01-08T23:42:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/01/09/my-business-books-2023/</loc><lastmod>2023-01-08T21:49:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/01/06/evaluating-saas-application-using-defender-for-cloud-apps/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/01/image_thumb-2.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/01/image-2.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/01/image_thumb-1.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/01/image-1.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/01/image_thumb.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/01/image.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2023-01-06T04:37:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/01/05/my-apps-2023/</loc><lastmod>2023-01-05T03:57:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/01/04/defender-for-office-365-automated-investigations/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/01/pexels-cottonbro-studio-5532675_thumb.jpg</image:loc><image:title>pexels-cottonbro-studio-5532675_thumb.jpg</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2023/01/pexels-cottonbro-studio-5532675.jpg</image:loc><image:title>pexels-cottonbro-studio-5532675.jpg</image:title></image:image><lastmod>2023-01-04T04:44:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/01/03/ciaops-need-to-know-microsoft-365-webinar-january-4/</loc><lastmod>2023-01-03T02:08:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/01/03/my-software-and-services-2023/</loc><lastmod>2023-01-02T23:41:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/01/02/my-gear-2023/</loc><lastmod>2023-01-01T22:29:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2023/01/01/my-stuff-2023/</loc><lastmod>2023-01-01T00:38:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/12/29/creating-microsoft-teams-general-guidelines/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/12/pexels-photoscom-93400_thumb-1.jpg</image:loc><image:title>pexels-photoscom-93400_thumb.jpg</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/12/pexels-photoscom-93400-1.jpg</image:loc><image:title>pexels-photoscom-93400.jpg</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/12/pexels-photoscom-93400_thumb.jpg</image:loc><image:title>pexels-photoscom-93400_thumb.jpg</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/12/pexels-photoscom-93400.jpg</image:loc><image:title>pexels-photoscom-93400.jpg</image:title></image:image><lastmod>2022-12-28T23:52:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/12/26/need-to-know-podcast-episode-293/</loc><lastmod>2022-12-26T02:43:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/12/24/connecting-to-azure-iot-hub/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/12/image_thumb-22.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/12/image-23.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/12/image_thumb-21.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/12/image-22.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/12/image_thumb-20.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/12/image-21.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/12/image_thumb-19.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/12/image-20.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/12/image_thumb-18.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/12/image-19.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2022-12-23T23:30:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/12/08/office-365-company-branding-requirements-have-changed/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/12/image_thumb.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/12/image.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2022-12-21T21:30:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/12/20/adafruit-huzzah-temperature-senor/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/12/image_thumb-6.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/12/image-7.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/12/image_thumb-5.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/12/image-6.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/12/image-5.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2022-12-20T05:30:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/12/16/december-microsoft-365-webinar-resources-4/</loc><lastmod>2022-12-16T01:23:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/12/14/defender-easm-adds-billable-assets-blade/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/12/image_thumb-4.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/12/image-4.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/12/image_thumb-3.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/12/image-3.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2022-12-13T22:11:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/12/13/need-to-know-podcast-episode-292/</loc><lastmod>2022-12-13T02:56:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/12/13/external-email-indicator-needs-refinement/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/12/image_thumb-2.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/12/image-2.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/12/image_thumb-1.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/12/image-1.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2022-12-12T23:32:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/12/01/ciaops-need-to-know-microsoft-365-webinar-december-4/</loc><lastmod>2022-12-01T04:15:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/12/01/microsoft-365-incident-response-training/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/12/pexels-pixabay-69934_thumb.jpg</image:loc><image:title>pexels-pixabay-69934_thumb.jpg</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/12/pexels-pixabay-69934.jpg</image:loc><image:title>pexels-pixabay-69934.jpg</image:title></image:image><lastmod>2022-12-02T06:16:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/11/27/need-to-know-podcast-episode-291/</loc><lastmod>2022-11-27T12:03:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/11/21/enhanced-phishing-protection-in-windows-11-22h2/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/11/image_thumb-17.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/11/image-17.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/11/image_thumb-16.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/11/image-16.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2022-11-20T23:58:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/11/18/adafruit-huzzah-input-from-button/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/11/ledclick_thumb.gif</image:loc><image:title>ledclick_thumb.gif</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/11/ledclick.gif</image:loc><image:title>ledclick.gif</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/11/image_thumb-15.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/11/image-15.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2022-11-21T19:59:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/11/18/november-microsoft-365-webinar-resources-4/</loc><lastmod>2022-11-18T03:31:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/11/14/need-to-know-podcast-episode-290/</loc><lastmod>2022-11-13T21:58:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/11/13/adafruit-huzzah-wifi/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/11/image_thumb-14.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/11/image-14.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2022-11-13T10:01:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/11/12/power-automate-payg-costs/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/11/image_thumb-13.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/11/image-13.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/11/image_thumb-12.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/11/image-12.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/11/image_thumb-11.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/11/image-11.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/11/image_thumb-10.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/11/image-10.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/11/image_thumb-9.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/11/image-9.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2022-11-11T23:04:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/11/11/we-shall-remember-them-4/</loc><lastmod>2022-11-11T12:28:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/11/07/windows-11-hyper-v-guest-configuration/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/11/image_thumb-6.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/11/image-6.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/11/image_thumb-5.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/11/image-5.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/11/image_thumb-4.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/11/image-4.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/11/image_thumb-3.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/11/image-3.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2022-11-07T04:32:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/11/04/external-flashing-led/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/11/iot-flash_thumb.gif</image:loc><image:title>iot-flash_thumb.gif</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/11/iot-flash.gif</image:loc><image:title>iot-flash.gif</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/11/image_thumb-2.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/11/image-2.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/11/image_thumb-1.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/11/image-1.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2022-11-05T09:26:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/11/02/ciaops-need-to-know-microsoft-365-webinar-november-4/</loc><lastmod>2022-11-02T02:03:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/11/02/ciaops-merch-store/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/11/image_thumb.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/11/image.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2022-11-01T23:24:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/10/30/need-to-know-podcast-episode-289/</loc><lastmod>2022-10-30T00:32:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/10/29/getting-started-automating-microsoft-365-administration-with-the-graph/</loc><lastmod>2022-10-28T23:19:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/10/28/october-microsoft-365-webinar-resources-4/</loc><lastmod>2022-10-28T02:46:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/10/17/techwerks-18/</loc><lastmod>2022-10-18T11:51:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/10/15/need-to-know-podcast-episode-288/</loc><lastmod>2022-10-15T11:07:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/10/14/not-as-easy-is-iot/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/10/image_thumb-10.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/10/image-10.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/10/image_thumb-9.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/10/image-9.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/10/image_thumb-8.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/10/image-8.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/10/image_thumb-7.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/10/image-7.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/10/image_thumb-6.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/10/image-6.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2022-10-14T11:27:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/10/11/power-platform-payg-configuration/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/10/image_thumb-4.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/10/image-4.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/10/image_thumb-3.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/10/image-3.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/10/image_thumb-2.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/10/image-2.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/10/image_thumb-1.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/10/image-1.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/10/image_thumb.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/10/image.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2022-10-11T00:20:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/10/04/ciaops-need-to-know-microsoft-365-webinar-october-4/</loc><lastmod>2022-10-04T03:11:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/10/01/need-to-know-podcast-episode-287/</loc><lastmod>2022-10-01T11:59:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/09/23/avoid-mfa-fatigue-attacks-in-microsoft-365/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/09/image_thumb-17.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/09/image-17.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/09/image_thumb-16.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/09/image-16.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/09/image_thumb-15.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/09/image-15.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/09/image_thumb-14.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/09/image-14.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/09/image_thumb-13.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/09/image-13.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2022-09-22T21:27:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/09/22/september-microsoft-365-webinar-resources-4/</loc><lastmod>2022-09-22T03:34:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/09/20/microsoft-defender-threat-intelligence-portal/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/09/image_thumb-12.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/09/image-12.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/09/image_thumb-11.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/09/image-11.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/09/image_thumb-10.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/09/image-10.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/09/image_thumb-9.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/09/image-9.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/09/image_thumb-8.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/09/image-8.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2022-09-20T05:08:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/09/17/need-to-know-podcast-episode-286/</loc><lastmod>2022-09-16T23:43:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/09/16/edge-enhanced-security/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/09/image_thumb-7.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/09/image-7.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2022-09-15T23:08:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/09/12/techwerks-17/</loc><lastmod>2022-09-12T03:36:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/09/10/enable-storyline-in-viva-engage-and-yammer/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/09/image_thumb-6.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/09/image-6.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/09/image_thumb-5.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/09/image-5.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2022-09-09T22:53:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/09/05/what-check-with-spoofed-email-in-microsoft-365/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/09/image_thumb-1.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/09/image-1.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/09/image_thumb.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/09/image.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2022-09-06T11:18:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/09/06/new-tenant-admin-app-in-mirosoft-teams/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/09/image_thumb-4.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/09/image-4.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/09/image_thumb-3.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/09/image-3.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/09/image_thumb-2.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/09/image-2.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2022-09-05T21:20:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/09/03/need-to-know-podcast-episode-285/</loc><lastmod>2022-09-02T23:10:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/09/02/ciaops-need-to-know-microsoft-365-webinar-september-4/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/09/untitled-picture.png</image:loc><image:title>Untitled-picture.png</image:title></image:image><lastmod>2022-09-01T23:46:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/08/26/august-microsoft-365-webinar-resources-4/</loc><lastmod>2022-08-26T02:27:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/08/26/turn-on-your-adoption-score/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/08/image_thumb-6.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/08/image-6.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/08/image_thumb-5.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/08/image-5.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/08/image_thumb-4.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/08/image-4.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/08/image_thumb-3.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/08/image-3.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2022-08-26T00:41:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/08/12/inconsistent-intune-powershell-module-results/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/08/image_thumb-2.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/08/image-2.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/08/image_thumb-1.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/08/image-1.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2022-08-11T22:10:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/08/12/go-get-defender-easm/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/08/image_thumb.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/08/image.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2022-08-11T21:21:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/08/02/ciaops-need-to-know-microsoft-365-webinar-august-4/</loc><lastmod>2022-08-01T22:16:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/07/30/july-microsoft-365-webinar-resources-4/</loc><lastmod>2022-07-29T23:06:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/07/29/join-my-teams-shared-channel/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/07/image_thumb-76.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/07/image-77.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/07/image_thumb-75.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/07/image-76.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/07/image_thumb-74.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/07/image-75.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/07/image_thumb-73.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/07/image-74.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/07/image_thumb-72.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/07/image-73.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2022-07-29T09:32:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/07/26/power-automate-azure-key-vault-access-inconsistencies/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/07/image_thumb-65.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/07/image-66.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/07/image_thumb-64.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/07/image-65.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/07/image_thumb-63.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/07/image-64.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/07/image_thumb-62.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/07/image-63.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/07/image_thumb-61.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/07/image-62.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2022-07-26T11:44:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/07/25/using-powershell-to-create-teams-from-a-csv-file/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/07/image_thumb-60.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/07/image-61.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2022-07-25T00:38:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/07/23/enabling-security-defaults-will-enforce-mfa-on-external-users/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/07/image_thumb-59.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/07/image-60.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/07/image_thumb-58.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/07/image-59.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/07/image_thumb-57.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/07/image-58.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/07/image_thumb-56.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/07/image-57.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/07/image_thumb-55.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/07/image-56.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2023-04-23T17:17:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/07/22/create-a-dataverse-database-in-microsoft-teams/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/07/image_thumb-48.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/07/image-49.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/07/image_thumb-47.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/07/image-48.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/07/image_thumb-46.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/07/image-47.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/07/image_thumb-45.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/07/image-46.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/07/image_thumb-44.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/07/image-45.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2022-07-22T07:31:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/07/19/get-your-azure-invoice-emailed-to-you/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/07/image_thumb-22.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/07/image-23.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/07/image_thumb-21.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/07/image-22.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/07/image_thumb-20.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/07/image-21.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2022-07-18T23:22:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/07/14/techwers-16/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/07/image_thumb-19.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/07/image-20.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2022-07-14T00:04:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/07/14/defender-for-endpoint-device-execution-restrictions/</loc><lastmod>2022-07-13T22:14:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/07/12/microsoft-defender-for-endpoint-restrict-app-execution/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/07/image_thumb-18.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/07/image-19.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/07/image_thumb-17.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/07/image-18.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/07/image_thumb-16.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/07/image-17.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/07/image_thumb-15.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/07/image-16.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/07/image_thumb-14.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/07/image-15.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2022-07-12T04:52:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/07/11/microsoft-defender-for-endpoint-device-isolation/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/07/image_thumb-9.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/07/image-9.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/07/image_thumb-8.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/07/image-8.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/07/image_thumb-7.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/07/image-7.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/07/image_thumb-6.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/07/image-6.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/07/image_thumb-5.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/07/image-5.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2023-05-03T21:37:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/07/06/mvp-2022-23/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/07/image_thumb-1.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/07/image-1.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2022-07-06T02:41:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/07/04/bad-guys-keep-winning-part-vi/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/07/pexels-kat-wilcox-923681_thumb.jpg</image:loc><image:title>pexels-kat-wilcox-923681_thumb.jpg</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/07/pexels-kat-wilcox-923681.jpg</image:loc><image:title>pexels-kat-wilcox-923681.jpg</image:title></image:image><lastmod>2022-07-04T22:53:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/07/01/ciaops-need-to-know-microsoft-365-webinar-july-4/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/07/image_thumb.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/07/image.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2022-07-01T00:09:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/06/30/office-desktop-apps-include-windows-explorer/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/06/image_thumb-17.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/06/image-17.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/06/image_thumb-16.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/06/image-16.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/06/image_thumb-15.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/06/image-15.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/06/image_thumb-14.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/06/image-14.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/06/image_thumb-13.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/06/image-13.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2022-06-30T13:28:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/06/24/june-microsoft-365-webinar-resources-3/</loc><lastmod>2022-06-24T03:52:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/06/20/cloud-file-productivity-using-windows-quick-access/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/06/image_thumb-12.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/06/image-12.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/06/image_thumb-11.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/06/image-11.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/06/image_thumb-10.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/06/image-10.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/06/image_thumb-9.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/06/image-9.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/06/image_thumb-8.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/06/image-8.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2022-06-19T22:29:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/06/18/microsoft-defender-for-business-post-setup-wizard-recommendations/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/06/image_thumb-7.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/06/image-7.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/06/image_thumb-6.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/06/image-6.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/06/image_thumb-5.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/06/image-5.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/06/image_thumb-4.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/06/image-4.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/06/image_thumb-3.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/06/image-3.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2022-06-18T11:20:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/06/04/be-a-winner-dont-recruit-build-an-employment-system/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/06/pexels-e6b48be6a6a4-e983ad-2399840_thumb.jpg</image:loc><image:title>pexels-洋榤-郭-2399840_thumb.jpg</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/06/pexels-e6b48be6a6a4-e983ad-2399840.jpg</image:loc><image:title>pexels-洋榤-郭-2399840.jpg</image:title></image:image><lastmod>2022-06-04T00:54:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/06/02/ciaops-need-to-know-microsoft-365-webinar-june-3/</loc><lastmod>2022-06-02T00:23:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/06/01/every-business-today-is-a-software-business/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/06/pexels-pixabay-270348_thumb.jpg</image:loc><image:title>pexels-pixabay-270348_thumb.jpg</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/06/pexels-pixabay-270348.jpg</image:loc><image:title>pexels-pixabay-270348.jpg</image:title></image:image><lastmod>2022-06-01T12:23:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/05/31/we-all-need-to-automate-more/</loc><lastmod>2022-05-31T02:46:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/05/30/using-power-automate-to-send-faxes/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/05/image_thumb-5.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/05/image-5.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/05/image_thumb-4.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/05/image-4.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/05/image_thumb-3.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/05/image-3.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/05/image_thumb-2.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/05/image-2.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2022-05-29T22:07:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/05/20/may-microsoft-365-webinar-resources-3/</loc><lastmod>2022-05-20T02:45:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/05/19/displaying-a-percentage-with-two-decimal-places-in-power-automate/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/05/image_thumb-1.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/05/image-1.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/05/image_thumb.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/05/image.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2024-12-20T18:42:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/05/05/ciaops-need-to-know-microsoft-365-webinar-may-2/</loc><lastmod>2022-05-05T03:47:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/04/29/set-up-payg-for-power-platform/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/04/image_thumb-11.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/04/image-11.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/04/image_thumb-10.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/04/image-10.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/04/image_thumb-9.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/04/image-9.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/04/image_thumb-8.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/04/image-8.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/04/image_thumb-7.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/04/image-7.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2022-04-29T07:14:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/04/29/april-microsoft-365-webinar-resources-3/</loc><lastmod>2022-04-29T06:33:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/04/28/techwerks-15/</loc><lastmod>2022-04-28T02:21:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/04/25/anzac-day-2022/</loc><lastmod>2022-04-25T01:17:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/04/22/build-a-system-to-solve-staff-challenges/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/04/pexels-pixabay-163064_thumb.jpg</image:loc><image:title>pexels-pixabay-163064_thumb.jpg</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/04/pexels-pixabay-163064.jpg</image:loc><image:title>pexels-pixabay-163064.jpg</image:title></image:image><lastmod>2022-04-22T02:52:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2020/09/04/incrementing-a-sharepoint-list-column-using-power-automate-and-flow/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2020/09/image_thumb-12.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2020/09/image-12.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2020/09/image_thumb-11.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2020/09/image-11.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2020/09/image_thumb-10.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2020/09/image-10.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2020/09/image_thumb-9.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2020/09/image-9.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2020/09/image_thumb-8.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2020/09/image-8.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2022-04-24T04:05:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/04/12/ciaops-need-to-know-microsoft-365-webinar-april-3/</loc><lastmod>2022-04-11T21:58:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/04/04/teams-on-the-web-failing-to-login/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/04/2022-04-04_12-27-42_thumb.gif</image:loc><image:title>2022-04-04_12-27-42_thumb.gif</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/04/2022-04-04_12-27-42.gif</image:loc><image:title>2022-04-04_12-27-42.gif</image:title></image:image><lastmod>2022-04-04T02:43:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/04/04/removing-local-device-administrators-using-endpoint-manager/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/04/image_thumb-5.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/04/image-5.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/04/image_thumb-4.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/04/image-4.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/04/image_thumb-3.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/04/image-3.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/04/image_thumb-2.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/04/image-2.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/04/image_thumb-1.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/04/image-1.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2023-07-25T22:03:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/03/31/an-introduction-to-microsoft-defender-for-business-presentation/</loc><lastmod>2022-03-30T20:54:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/03/25/march-microsoft-365-webinar-resources-3/</loc><lastmod>2022-03-25T04:33:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/03/18/incentivising-microsoft-teams-contributions-with-power-automate/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/03/image_thumb-9.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/03/image-9.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/03/image_thumb-8.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/03/image-8.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/03/image_thumb-7.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/03/image-7.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/03/image_thumb-6.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/03/image-6.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/03/image_thumb-5.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/03/image-5.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2022-03-18T03:02:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/03/14/need-to-know-podcast-episode-284/</loc><lastmod>2022-03-14T00:27:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/02/17/need-to-know-podcast-episode-283/</loc><lastmod>2022-03-10T05:10:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/03/08/azure-ad-identity-protection-basics/</loc><lastmod>2022-03-08T02:56:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/03/07/azure-ad-access-reviews-basics/</loc><lastmod>2022-03-07T06:31:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/03/03/escalating-to-multiple-roles-using-privileged-identity-management/</loc><lastmod>2022-03-03T11:19:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/03/02/privileged-identity-management-auditing-options/</loc><lastmod>2022-03-02T02:35:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/03/01/ciaops-need-to-know-microsoft-365-webinar-march-3/</loc><lastmod>2022-03-01T03:23:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/02/28/privileged-identity-management-basics/</loc><lastmod>2022-02-28T05:21:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/02/25/automated-user-tenant-access-control/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/02/image_thumb-22.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/02/image-22.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/02/image_thumb-21.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/02/image-21.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/02/image_thumb-20.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/02/image-20.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/02/image_thumb-19.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/02/image-19.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/02/image_thumb-18.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/02/image-18.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2022-02-25T09:48:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/02/25/february-microsoft-365-webinar-resources-2/</loc><lastmod>2022-02-25T02:56:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/02/07/defender-for-endpoint-remediation-levels/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/02/image_thumb-6.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/02/image-6.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/02/image_thumb-5.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/02/image-5.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/02/image_thumb-4.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/02/image-4.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2022-02-07T10:42:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/01/20/troubleshooting-defender-for-business/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image_thumb-100.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image-100.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image_thumb-99.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image-99.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2022-02-03T03:41:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/02/03/defender-for-endpoint-server-licensing/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/02/image_thumb-3.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/02/image-3.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2022-09-01T22:54:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/02/03/web-filtering-overview-for-defender-for-endpoint/</loc><lastmod>2022-02-02T22:17:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/contact/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2019/02/person-smartphone-office-table.jpeg</image:loc><image:title>Placeholder Image</image:title></image:image><lastmod>2022-02-01T23:50:16+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://blog.ciaops.com/2022/02/02/using-defender-for-endpoint-to-protect-your-network-devices/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/02/image_thumb-2.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/02/image-2.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/02/image_thumb-1.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/02/image-1.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/02/image_thumb.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/02/image.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2022-02-01T23:29:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/02/01/ciaops-need-to-know-microsoft-365-webinar-february-2/</loc><lastmod>2022-01-31T22:27:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/01/31/custom-web-filtering-for-microsoft-defender-for-endpoint/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image_thumb-126.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image-126.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image_thumb-125.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image-125.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image_thumb-124.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image-124.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image_thumb-123.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image-123.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image_thumb-122.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image-122.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2022-01-30T23:16:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/01/28/january-microsoft-365-webinar-resources-3/</loc><lastmod>2022-01-28T03:30:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/01/27/enabling-web-filtering-with-microsoft-defender-for-business/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image_thumb-117.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image-117.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image_thumb-116.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image-116.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image_thumb-110.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image-110.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image_thumb-109.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image-109.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image_thumb-108.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image-108.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2023-04-19T23:56:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/01/27/all-the-microsoft-defender-for-endpoint-options/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image_thumb-115.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image-115.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image_thumb-114.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image-114.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image_thumb-113.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image-113.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image_thumb-112.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image-112.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image_thumb-111.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image-111.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2022-01-27T05:46:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2020/08/20/allow-administrators-to-delete-any-chat-message-in-teams/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2020/08/image_thumb-5.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2020/08/image-5.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2020/08/image_thumb-4.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2020/08/image-4.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2020/08/image_thumb-3.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2020/08/image-3.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2022-01-26T23:26:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/01/26/incident-overview-with-defender-for-business/</loc><lastmod>2022-01-26T05:36:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/01/24/offboarding-windows-10-devices-methods-with-defender-for-business/</loc><lastmod>2022-01-24T05:49:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/01/18/onboarding-windows-10-devices-to-microsoft-defender-for-business-using-endpoint-security/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image_thumb-98.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image-98.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image_thumb-97.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image-97.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image_thumb-96.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image-96.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image_thumb-95.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image-95.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image_thumb-94.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image-94.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2022-01-18T10:43:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/01/18/offboarding-devices-from-microsoft-defender-for-business-using-power-automate/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image_thumb-89.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image-89.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image_thumb-88.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image-88.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image_thumb-87.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image-87.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image_thumb-86.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image-86.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image_thumb-85.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image-85.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2022-01-18T08:34:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/01/17/get-a-list-of-devices-from-defender-for-business-into-a-sharepoint-list/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image_thumb-72.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image-72.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image_thumb-71.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image-71.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image_thumb-70.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image-70.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image_thumb-69.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image-69.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image_thumb-68.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image-68.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2022-01-18T03:10:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/01/14/offboarding-devices-from-microsoft-defender-for-business-using-an-api-with-powershell/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image_thumb-61.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image-61.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image_thumb-60.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image-60.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image_thumb-59.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image-59.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image_thumb-58.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image-58.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2022-01-14T09:43:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/01/14/offboarding-windows-10-devices-from-microsoft-defender-for-business/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image_thumb-57.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image-57.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image_thumb-56.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image-56.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image_thumb-55.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image-55.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image_thumb-54.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image-54.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image_thumb-53.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image-53.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2023-07-18T22:26:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/01/13/create-a-dynamic-group-in-azure-ad/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image_thumb-46.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image-46.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/snaghtml7d6fd8d_thumb.png</image:loc><image:title>SNAGHTML7d6fd8d_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/snaghtml7d6fd8d.png</image:loc><image:title>SNAGHTML7d6fd8d.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image_thumb-45.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image-45.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image_thumb-44.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image-44.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image_thumb-43.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image-43.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2022-01-13T11:00:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/01/13/two-easy-methods-of-onboarding-windows-10-devices-to-defender-for-business/</loc><lastmod>2022-01-13T05:12:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/01/12/onboarding-windows-10-devices-to-microsoft-defender-for-business/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image_thumb-33.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image-33.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image_thumb-32.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image-32.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image_thumb-31.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image-31.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image_thumb-30.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image-30.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image_thumb-29.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image-29.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2022-01-12T11:51:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/01/10/my-tech-books-2022/</loc><lastmod>2022-01-10T01:49:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/01/07/need-to-know-podcast-episode-282/</loc><lastmod>2022-01-07T02:54:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/01/07/my-podcasts-2022/</loc><lastmod>2022-01-06T21:43:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/01/06/my-tech-videos-2022/</loc><lastmod>2022-01-06T02:19:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/01/05/my-business-books-2022/</loc><lastmod>2022-01-05T03:12:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/01/04/my-apps-2022/</loc><lastmod>2022-01-03T23:08:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/01/03/celebrating-anniversaries-with-power-automate/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image_thumb-16.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image-16.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image_thumb-15.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image-15.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image_thumb-14.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image-14.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image_thumb-13.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image-13.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image_thumb-12.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2022/01/image-12.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2022-01-03T04:06:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/01/03/ciaops-need-to-know-microsoft-365-webinar-january-3/</loc><lastmod>2022-01-03T00:11:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/01/03/my-software-and-services-2022/</loc><lastmod>2022-01-02T22:15:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/01/02/my-gear-2022/</loc><lastmod>2022-01-02T02:58:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2022/01/01/my-stuff-2022/</loc><lastmod>2021-12-31T21:24:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/12/31/power-automate-odata-filter-failure-when-field-named-data/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/12/image_thumb-24.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/12/image-32.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/12/image_thumb-23.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/12/image-31.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/12/image_thumb-22.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/12/image-30.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2021-12-31T12:12:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/12/30/need-to-know-podcast-episode-281/</loc><lastmod>2021-12-30T03:39:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/12/24/december-microsoft-365-webinar-resources-3/</loc><lastmod>2021-12-24T01:19:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/12/21/need-to-know-podcast-episode-280/</loc><lastmod>2021-12-21T09:04:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/12/17/more-security-testing-options-with-sec-test/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/12/image_thumb-21.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/12/image-29.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2021-12-17T04:38:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/12/17/power-platform-community-december-webinar/</loc><lastmod>2021-12-17T00:46:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/12/16/defender-for-business-trial-onboarding/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/12/image_thumb-20.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/12/image-28.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/12/image-27.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/12/image_thumb-19.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/12/image-26.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/12/image-25.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/12/image_thumb-18.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/12/image-24.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/12/image-23.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/12/image_thumb-17.png</image:loc><image:title>image_thumb.png</image:title></image:image><lastmod>2021-12-16T04:14:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/12/15/ciaops-tech-dojo-january-2022/</loc><lastmod>2021-12-15T00:36:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/12/03/power-platform-community-monthly-webinar-december-2021/</loc><lastmod>2021-12-03T06:05:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/12/02/need-to-know-podcast-episode-278-2/</loc><lastmod>2021-12-02T04:28:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/12/01/ciaops-business-dojo-december/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/12/pexels-oleg-magni-861233_thumb.jpg</image:loc><image:title>pexels-oleg-magni-861233_thumb.jpg</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/12/pexels-oleg-magni-861233.jpg</image:loc><image:title>pexels-oleg-magni-861233.jpg</image:title></image:image><lastmod>2021-12-01T02:58:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/12/01/ciaops-tech-dojo-december/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/12/pexels-pixabay-46253_thumb.jpg</image:loc><image:title>pexels-pixabay-46253_thumb.jpg</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/12/pexels-pixabay-46253.jpg</image:loc><image:title>pexels-pixabay-46253.jpg</image:title></image:image><lastmod>2021-12-01T02:38:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/12/01/ciaops-need-to-know-microsoft-365-webinar-december-3/</loc><lastmod>2021-12-01T02:00:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/11/29/basic-azure-virtual-desktop-avd-remote-app-setup/</loc><lastmod>2022-11-12T20:56:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/11/29/basic-azure-virtual-desktop-avd-setup/</loc><lastmod>2022-04-18T17:32:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/11/19/november-microsoft-365-webinar-resources-3/</loc><lastmod>2021-11-19T01:37:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/11/19/better-passwordless-logins-are-here/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/11/img_1151_thumb.png</image:loc><image:title>IMG_1151_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/11/img_1151.png</image:loc><image:title>IMG_1151.png</image:title></image:image><lastmod>2021-11-18T21:58:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/11/15/need-to-know-podcast-episode-278/</loc><lastmod>2021-11-15T03:55:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/11/15/power-platform-community-november-webinar-sessions/</loc><lastmod>2021-11-14T22:02:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/11/12/power-platform-community-november-webinar/</loc><lastmod>2021-11-12T03:27:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/11/11/we-shall-remember-them-3/</loc><lastmod>2021-11-11T03:17:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/11/11/a-lot-of-talk-but-little-action-on-cyber-security/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/11/pexels-gezer-amorim-2293558_thumb.jpg</image:loc><image:title>pexels-gezer-amorim-2293558_thumb.jpg</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/11/pexels-gezer-amorim-2293558.jpg</image:loc><image:title>pexels-gezer-amorim-2293558.jpg</image:title></image:image><lastmod>2021-11-12T03:54:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/11/10/checking-microsoft-365-email-forwarding-using-powershell/</loc><lastmod>2022-01-13T23:02:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/11/05/the-extra-value-that-many-have-missed-with-microsoft-defender-for-business/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/11/image_thumb-1.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/11/image-1.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/11/image_thumb.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/11/image.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2021-11-04T13:54:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/11/04/all-the-defenders-update-2/</loc><lastmod>2021-11-04T09:55:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/11/02/need-to-know-podcast-episode-277/</loc><lastmod>2021-11-02T05:53:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/11/01/ciaops-need-to-know-microsoft-365-webinar-november-3/</loc><lastmod>2021-10-31T23:55:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/10/31/connect-to-microsoft-365-using-powershell/</loc><lastmod>2021-10-30T23:45:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/10/30/updating-powershell-for-use-with-microsoft-365/</loc><lastmod>2021-10-29T06:03:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/10/29/october-microsoft-365-webinar-resources-3/</loc><lastmod>2021-10-29T03:36:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/10/27/setting-up-powershell-for-use-with-mirosoft-365/</loc><lastmod>2021-10-27T09:24:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/10/26/techwerks-13/</loc><lastmod>2021-10-26T00:04:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/02/13/microsoft-365-mailbox-capacities-and-sizes/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/10/image_thumb-27.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/10/image-27.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/10/image_thumb-26.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/10/image-26.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/10/image_thumb-25.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/10/image-25.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/10/image_thumb-24.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/10/image-24.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/10/image_thumb-23.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/10/image-23.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2021-10-25T01:48:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/10/01/implementing-windows-defender-application-control-wdac-part-3/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/10/image_thumb-6.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/10/image-6.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/10/image_thumb-5.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/10/image-5.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/10/image_thumb-4.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/10/image-4.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/10/image_thumb-3.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/10/image-3.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/10/image_thumb-2.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/10/image-2.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2023-10-28T00:25:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/10/24/implementing-windows-defender-application-control-wdac-part-4/</loc><lastmod>2022-05-09T11:30:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/10/22/how-to-remove-a-win32-application-using-intune/</loc><lastmod>2021-10-21T23:43:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/10/22/how-to-deploy-a-win32-application-using-intune/</loc><lastmod>2021-10-21T22:31:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/10/21/need-to-know-podcast-episode-276/</loc><lastmod>2021-10-21T10:56:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/10/14/providing-feedback-on-user-reported-messages/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/10/image_thumb-19.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/10/image-19.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/10/image_thumb-18.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/10/image-18.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/10/image_thumb-17.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/10/image-17.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/10/image_thumb-16.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/10/image-16.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/10/image_thumb-15.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/10/image-15.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2021-10-15T22:24:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/10/13/need-to-know-podcast-episode-275/</loc><lastmod>2021-10-13T02:44:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/10/11/power-platform-community-monthly-webinar-november-2021/</loc><lastmod>2021-10-11T00:11:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/10/08/power-platform-community-october-webinar/</loc><lastmod>2021-10-08T05:36:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/10/06/add-taxii-threat-intelligence-feeds-to-azure-sentinel/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/10/image_thumb-14.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/10/image-14.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/10/image_thumb-13.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/10/image-13.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/10/image_thumb-12.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/10/image-12.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/10/image_thumb-11.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/10/image-11.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/10/image_thumb-10.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/10/image-10.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2022-11-02T12:05:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/10/05/intelligence-not-information/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/10/image_thumb-7.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/10/image-7.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2021-10-05T11:20:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/10/04/ciaops-need-to-know-microsoft-365-webinar-october-3/</loc><lastmod>2021-10-04T02:53:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/09/30/implementing-windows-defender-application-control-wdac-part-2/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/09/image_thumb-5.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/09/image-5.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/09/image_thumb-4.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/09/image-4.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/09/image_thumb-3.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/09/image-3.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/09/image_thumb-2.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/09/image-2.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2021-10-01T10:37:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/09/29/implementing-windows-defender-application-control-wdac-part-1/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/09/image_thumb-1.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/09/image-1.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2021-09-30T07:13:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/09/30/september-microsoft-365-webinar-resources-3/</loc><lastmod>2021-09-30T05:19:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/09/28/need-to-know-podcast-episode-274/</loc><lastmod>2021-09-28T07:02:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/09/22/restricting-user-file-downloads-in-sharepoint-online/</loc><lastmod>2021-09-22T00:03:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/09/21/allow-contribute-with-no-delete-in-sharepoint/</loc><lastmod>2021-09-21T03:48:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/09/11/testing-for-cve-2021-40444-vulnerability/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/09/image_thumb.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/09/image.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/09/test2-screen_thumb.gif</image:loc><image:title>test2-screen_thumb.gif</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/09/test2-screen.gif</image:loc><image:title>test2-screen.gif</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/09/2021-09-11_10-21-14_thumb.gif</image:loc><image:title>2021-09-11_10-21-14_thumb.gif</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/09/2021-09-11_10-21-14.gif</image:loc><image:title>2021-09-11_10-21-14.gif</image:title></image:image><lastmod>2021-09-11T01:56:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/09/07/need-to-know-podcast-episode-273/</loc><lastmod>2021-09-07T04:15:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/09/06/power-platform-community-monthly-webinar-october-2021/</loc><lastmod>2021-09-06T02:45:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/09/06/ciaops-need-to-know-microsoft-365-webinar-september-3/</loc><lastmod>2021-09-06T00:44:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/09/03/power-platform-community-september-webinar/</loc><lastmod>2021-09-03T11:15:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/09/01/all-the-guards-part-10/</loc><lastmod>2021-09-01T03:02:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/08/31/displaying-execution-path-in-windows-task-manager/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/08/image_thumb-17.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/08/image-17.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/08/image_thumb-16.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/08/image-16.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/08/image_thumb-15.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/08/image-15.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2021-08-30T21:35:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/08/30/verify-endpoint-manager-service-release/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/08/image_thumb-14.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/08/image-14.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2021-08-30T01:19:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/08/29/all-the-guards-part-8/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/08/image_thumb-13.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/08/image-13.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2021-08-29T22:23:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/08/30/all-the-guards-part-9/</loc><lastmod>2021-08-29T22:23:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/08/25/all-the-guards-part-7/</loc><lastmod>2021-08-29T01:54:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/08/28/reflecting-on-crossing-the-3000-posts-mark/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/08/image_thumb-12.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/08/image-12.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2021-09-14T07:53:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/08/27/power-platform-community-monthly-webinar-september-2021/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/08/image_thumb-11.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/08/image-11.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2021-08-27T07:04:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/08/27/august-microsoft-365-webinar-resources-3/</loc><lastmod>2024-08-19T06:25:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/08/24/all-the-guards-part-6/</loc><lastmod>2021-08-25T05:56:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/08/22/all-the-guards-part-5/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/08/image_thumb-10.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/08/image-10.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/08/image_thumb-9.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/08/image-9.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2021-08-24T07:11:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/08/23/need-to-know-podcast-episode-272/</loc><lastmod>2021-08-23T13:58:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/08/16/all-the-guards-part-4/</loc><lastmod>2024-08-14T04:13:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/08/14/all-the-guards-part-3/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/08/image_thumb-6.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/08/image-6.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2021-08-16T05:29:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/08/15/troubleshoot-windows-365-business-cloud-pc-setup-issues/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/08/image_thumb-8.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/08/image-8.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/08/image_thumb-7.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/08/image-7.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2021-08-26T21:29:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/08/11/all-the-guards-part-2/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/08/image_thumb-5.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/08/image-5.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2021-08-14T00:28:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/08/10/all-the-guards-part-1/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/08/image_thumb-4.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/08/image-4.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/08/image_thumb-3.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/08/image-3.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/08/image_thumb-2.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/08/image-2.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/08/image_thumb-1.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/08/image-1.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2021-08-19T08:31:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/08/09/check-for-cve-2021-36934/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/08/image_thumb.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/08/image.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2021-08-09T04:39:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/08/09/need-to-know-podcast-episode-271/</loc><lastmod>2021-08-09T00:07:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/08/02/secwerks-the-bug/</loc><lastmod>2021-08-01T23:29:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/08/02/ciaops-need-to-know-microsoft-365-webinar-august-3/</loc><lastmod>2021-08-01T23:00:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/07/31/testing-for-the-printnightmare-vulnerability/</loc><lastmod>2022-02-23T10:22:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/07/30/announcing-the-ciaops-patron-power-platform-community/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/07/pexels-led-supermarket-577514_thumb.jpg</image:loc><image:title>pexels-led-supermarket-577514_thumb.jpg</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/07/pexels-led-supermarket-577514.jpg</image:loc><image:title>pexels-led-supermarket-577514.jpg</image:title></image:image><lastmod>2021-07-30T07:53:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/07/30/july-microsoft-365-webinar-resources-3/</loc><lastmod>2021-07-30T07:01:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/07/27/basics-of-deploying-windows-defender-application-control-wdac-using-intune/</loc><lastmod>2023-01-27T16:01:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/07/26/basics-of-deploying-applocker-using-intune/</loc><lastmod>2021-07-26T07:44:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/07/25/power-platform-product-release/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/07/pexels-clem-onojeghuo-175711-1_thumb.jpg</image:loc><image:title>pexels-clem-onojeghuo-175711-1_thumb.jpg</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/07/pexels-clem-onojeghuo-175711-1.jpg</image:loc><image:title>pexels-clem-onojeghuo-175711-1.jpg</image:title></image:image><lastmod>2021-07-24T22:57:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/07/22/windows-defender-application-wdac-basics/</loc><lastmod>2021-07-21T23:37:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/07/20/windows-applocker-basics/</loc><lastmod>2021-07-20T11:38:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/07/16/ciaops-secwerks-1-is-now-totally-virtual/</loc><lastmod>2021-07-16T08:52:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/07/14/creating-a-file-location-with-unique-permissions-in-microsoft-teams/</loc><lastmod>2021-07-14T01:13:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/07/13/getting-message-center-information-into-teams/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/07/snaghtml210e1093_thumb.png</image:loc><image:title>SNAGHTML210e1093_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/07/snaghtml210e1093.png</image:loc><image:title>SNAGHTML210e1093.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/07/image_thumb-26.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/07/image-26.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/07/image_thumb-25.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/07/image-25.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/07/image_thumb-24.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/07/image-24.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/07/image_thumb-23.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/07/image-23.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2023-04-12T16:08:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/07/12/need-to-know-podcast-episode-270/</loc><lastmod>2021-07-12T04:37:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/07/11/syncing-m365-message-center-to-microsoft-planner/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/07/image_thumb-22.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/07/image-22.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/07/image_thumb-21.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/07/image-21.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/07/image_thumb-20.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/07/image-20.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/07/image_thumb-19.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/07/image-19.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/07/image_thumb-18.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/07/image-18.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2021-07-11T11:47:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/07/07/security-test-script-walk-through-video-update-1/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/07/image_thumb-3.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/07/image-3.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2021-07-07T04:37:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/07/06/windows-print-spooler-remote-code-execution-vulnerability-cve-2021-34527/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/07/image_thumb-2.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/07/image-2.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/07/image_thumb-1.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/07/image-1.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2021-07-09T22:44:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/07/05/ciaops-need-to-know-microsoft-365-webinar-july-3/</loc><lastmod>2021-07-05T03:38:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/07/02/security-test-script-walk-through-video/</loc><lastmod>2021-07-02T11:48:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/07/02/10-years-an-mvp/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/07/image_thumb.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/07/image.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2021-07-02T00:12:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/06/29/is-security-working-powershell-script/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/06/image_thumb-56.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/06/image-56.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/06/image_thumb-55.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/06/image-55.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/06/image_thumb-54.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/06/image-54.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/06/image_thumb-53.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/06/image-53.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/06/image_thumb-52.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/06/image-52.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2021-06-29T04:02:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/06/28/need-to-know-podcast-episode-269/</loc><lastmod>2021-06-28T04:14:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/06/25/june-microsoft-365-webinar-resources-2/</loc><lastmod>2021-06-25T06:24:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/06/19/need-to-know-podcast-episode-268/</loc><lastmod>2021-06-19T12:30:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/06/18/using-defender-for-endpoint-api-and-power-automate/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/06/image_thumb-48.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/06/image-48.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/06/image_thumb-47.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/06/image-47.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/06/image_thumb-46.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/06/image-46.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/06/image_thumb-45.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/06/image-45.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/06/image_thumb-44.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/06/image-44.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2021-06-18T01:05:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/06/10/cybercrime-reporting-poll/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/06/pexels-donald-tong-143580_thumb.jpg</image:loc><image:title>pexels-donald-tong-143580_thumb.jpg</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/06/pexels-donald-tong-143580.jpg</image:loc><image:title>pexels-donald-tong-143580.jpg</image:title></image:image><lastmod>2021-06-10T06:32:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/06/09/exchange-user-best-practices-script/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/06/image_thumb-35.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/06/image-35.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/06/image_thumb-34.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/06/image-34.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/06/image_thumb-33.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/06/image-33.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/06/image_thumb-32.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/06/image-32.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2021-06-09T02:11:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/06/07/prevent-alerts-from-discoverysearchmailbox/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/06/image_thumb-31.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/06/image-31.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/06/image_thumb-30.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/06/image-30.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/06/image_thumb-29.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/06/image-29.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2022-12-26T00:17:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/06/04/microsoft-teams-webinars-not-allowing-registrations-for-everyone/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/06/image_thumb-28.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/06/image-28.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/06/image_thumb-27.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/06/image-27.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/06/image_thumb-26.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/06/image-26.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/06/image_thumb-25.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/06/image-25.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/06/image_thumb-24.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/06/image-24.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2023-07-11T10:13:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/06/04/ciaops-need-to-know-microsoft-365-webinar-june-2/</loc><lastmod>2021-06-04T03:03:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/06/04/iamcp-video-presentation/</loc><lastmod>2021-06-03T21:52:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/06/03/ciaops-secwerks-1-registrations-now-open/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/06/pexels-pixabay-60504_thumb.jpg</image:loc><image:title>pexels-pixabay-60504_thumb.jpg</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/06/pexels-pixabay-60504.jpg</image:loc><image:title>pexels-pixabay-60504.jpg</image:title></image:image><lastmod>2021-06-03T03:30:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/06/02/i-need-help-with-windows-defender-system-guard/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/06/image_thumb-20.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/06/image-20.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/06/image_thumb-19.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/06/image-19.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/06/image_thumb-18.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/06/image-18.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/06/image_thumb-17.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/06/image-17.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/06/image_thumb-16.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/06/image-16.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2024-08-14T09:06:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/06/02/using-azure-sentinel-with-azure-lighthouse/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/06/image_thumb-9.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/06/image-9.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/06/image_thumb-8.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/06/image-8.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/06/image_thumb-7.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/06/image-7.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/06/image_thumb-6.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/06/image-6.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/06/image_thumb-5.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/06/image-5.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2021-06-01T23:43:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/05/31/missing-calendar-icon-in-microsoft-teams/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/05/image_thumb-27.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/05/image-27.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/05/image_thumb-26.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/05/image-26.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/05/image_thumb-25.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/05/image-25.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/05/image_thumb-24.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/05/image-24.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/05/image_thumb-23.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/05/image-23.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2021-05-31T07:00:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/05/29/may-microsoft-365-webinar-resources-2/</loc><lastmod>2021-05-28T22:53:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/05/24/configure-azure-lighthouse/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/05/image_thumb-22.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/05/image-22.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/05/image_thumb-21.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/05/image-21.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/05/image_thumb-20.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/05/image-20.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/05/image_thumb-19.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/05/image-19.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/05/image_thumb-18.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/05/image-18.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2024-06-20T08:05:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/05/21/register-your-interest-for-a-hands-on-deep-dive-microsoft-365-security-event/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/05/pexels-pixabay-356065_thumb.jpg</image:loc><image:title>pexels-pixabay-356065_thumb.jpg</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/05/pexels-pixabay-356065.jpg</image:loc><image:title>pexels-pixabay-356065.jpg</image:title></image:image><lastmod>2021-05-21T06:32:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/05/20/iamcp-presentation/</loc><lastmod>2021-05-20T07:16:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/05/18/need-to-know-podcast-episode-267/</loc><lastmod>2021-05-18T03:57:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/05/17/connect-to-sharepoint-pnp-using-powershell/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/05/image_thumb-13.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/05/image-13.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/05/image_thumb-12.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/05/image-12.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2021-05-17T13:14:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/05/07/the-case-of-the-missing-azure-sentinel-ingested-data/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/05/image_thumb-11.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/05/image-11.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/05/image_thumb-10.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/05/image-10.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/05/snaghtmld5b1a0_thumb.png</image:loc><image:title>SNAGHTMLd5b1a0_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/05/snaghtmld5b1a0.png</image:loc><image:title>SNAGHTMLd5b1a0.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/05/image_thumb-9.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/05/image-9.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/05/image_thumb-8.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/05/image-8.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2021-05-07T06:20:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/05/06/all-the-defenders-updated/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/05/image_thumb-2.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/05/image-2.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2021-05-06T00:36:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/05/04/microsoft-secure-score-should-be-your-security-benchmark/</loc><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/05/image_thumb-1.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/05/image-1.png</image:loc><image:title>image.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/05/image_thumb.png</image:loc><image:title>image_thumb.png</image:title></image:image><image:image><image:loc>https://blog.ciaops.com/wp-content/uploads/2021/05/image.png</image:loc><image:title>image.png</image:title></image:image><lastmod>2022-02-13T21:24:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com/2021/04/30/april-microsoft-365-webinar-resources-2/</loc><lastmod>2021-04-30T02:31:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.ciaops.com</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2026-04-03T09:13:02+00:00</lastmod></url></urlset>
