<?xml version='1.0' encoding='UTF-8'?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1"><url><loc>https://support.holmsecurity.com/knowledge/how-can-holm-security-be-used-with-azure-sentinel</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-see-if-an-authenticated-web-application-scan-was-successful-or-not</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-set-up-authenticated-scanning</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-install-a-scanner-appliance-in-azure</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/what-are-the-recommended-settings-for-scanning-scada-environments</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/2026-28-1-a-more-intuitive-security-center-experience</loc><lastmod>2026-01-28</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/where-do-i-find-my-microsoft-365-credentials</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/what-do-i-need-to-prepare-for-the-first-installation-of-onprem</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-set-up-soap-api-scanning</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-set-up-a-single-sign-on-with-one-login</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/what-do-the-different-values-and-information-for-vulnerabilities-in-vulnerability-tests-mean</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-exclude-ports-from-a-network-scan</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-create-a-template-without-the-ignored/disabled-vulnerabilities</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/what-do-the-different-user-roles-mean</loc><lastmod>2026-02-13</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-set-up-single-sign-on-with-adfs</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-create-a-web-application</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-run-an-authenticated-web-application-scan</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-share-scans-and-schedules-with-teams</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-add-ipv6-addresses-and-networks-to-assets</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-apply-a-filter-for-a-unified-assets</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-does-holm-security-protect-our-data</loc><lastmod>2026-02-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-configure-a-scanner-appliance-for-cellular-network-connections</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-check-if-my-smtp-sms-settings-are-configured-correctly</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/ai-big-industry-moves-take-on-cybercrime-critical-zero-days</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-does-the-webhooks-integration-work</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/cisco-ios-xe-software-web-ui-privilege-escalation-vulnerability</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/what-k8s-plugin-are-supported</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-add-multiple-rules-in-a-unified</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-to-overview-all-open-ports-for-network-assets</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-are-names-displayed-in-unified-assets</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/2025-05-16</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-schedule-a-scan-for-multiple-web-applications</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/what-information-is-shared-with-holm-security-when-using-onprem</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-solve-common-connection-lost-issue-with-the-azure-scanner-appliance</loc><lastmod>2026-03-17</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-perform-a-scan-that-only-runs-once</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-avoid-unwanted-login-attempts-when-performing-a-scan-saas</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/boost-your-web-scans</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-does-the-device-agent-deployment-token-work</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-set-up-the-azure-active-directory-integration</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-integrate-with-webhooks</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-scan-my-cloud-environment</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-get-started-with-vulnerability-manager</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/which-integrations-are-supported</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-create-a-report-for-your-assets</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-apply-a-filter-for-a-view</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-download-reports</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/what-are-the-system-requirements-for-a-scanner-appliance</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-does-the-network-discovery-work</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/pp-tasks-v2</loc><lastmod>2025-11-27</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/what-cloud-services-are-supported-for-aws</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-integrate-with-jira</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/2025-10-14-kubernetes-security-extends-visibility-and-vulnerability-detection</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-disable-2fa-two-factor-authentication-for-an-organizer-user</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-are-tickets-created</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/what-is-the-self-signed-certificate</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/what-is-awareness-email-training-and-why-it-is-important</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/react2shell-exposes-servers-to-remote-code-execution</loc><lastmod>2025-12-05</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-integrate-with-ibm-qradar</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/i-cannot-add-new-assets-nor-perform-scans-in-security-center-for-onprem</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/what-are-the-oracle-cost-saving-plugins</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/2025-03-05</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/what-are-the-general-basics-for-setting-up-a-network-scan</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/pp-partner-resources-v2</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/system-operating-status</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-anonymize-a-phishing-simulation/assessment</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-exclude-ip-addresses-in-a-network-scan</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-create/schedule-a-remediation-report</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/2026-3-26-clearer-vulnerability-insights-and-smarter-scans-to-power-your-workflows</loc><lastmod>2026-03-25</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/a-powerful-new-partner-portal</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/critical-sharepoint-vulnerability-immediate-action-required</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/where-do-i-see-vulnerabilities-that-are-disabled-or-ignored</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/what-is-unification-unified-assets</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-install-a-scanner-appliance-1</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/critical-zero-day-vulnerability-google-chrome-use-after-free</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-can-i-use-powershell-to-add-emails-to-users-safe-sender-list</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/does-holm-security-perform-penetration-testing</loc><lastmod>2026-03-20</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/which-common-vulnerability-scoring-system-cvss-version-is-used</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/pp-account-managment-v2</loc><lastmod>2025-11-27</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/march-2026-security-update-rapid-fire-intrusions-and-infrastructure-attacks-mark-a-turning-point-for-defenders</loc><lastmod>2026-03-04</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-change-the-primary-superuser</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-find-disabled-vulnerability-tests</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/new-features-improve-clarity-and-enhance-collaboration</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/why-does-an-application-crash-during-a-scan</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-set-a-default-sender-for-email-notifications</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-does-the-rest-api-scanning-work</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/nis2-compliance</loc><lastmod>2026-02-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-enable-tracking-of-individual-recipients</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/what-are-the-supported-systems-and-requirements</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-search-for-a-device-agent-in-security-center</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-does-the-communication-with-the-scanner-appliance-work</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-domain-management-works-phishing-awareness-training</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-view-tags-and-teams-permissions-in-a-widget</loc><lastmod>2025-12-05</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-to-configure-a-scanner-appliance-for-holm-security-vmp-onprem</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-import-a-template-for-phishing-and-awareness-training</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-remove-the-ignored-state-on-a-device-vulnerability</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-integrate-with-beyondtrust</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/release-2024-10-16</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-scan-a-cluster-to-find-assets</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-does-asset-names-work</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-migrate-from-the-legacy-dashboard-to-the-new-dashboard</loc><lastmod>2025-12-10</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-we-calculate-the-severity-of-each-individual-recipient</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-does-custom-content-work-in-the-web-application-profile</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-get-a-kubernetes-api-access-token</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/what-cloud-services-are-supported-for-google-cloud</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/what-are-the-default-credentials-for-onprem</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-make-sure-i-scan-all-relevant-web-applications</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/what-are-the-external-attack-surface-management-capabilities</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-create/schedule-a-patch-report</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/what-features-do-i-get-access-to-when-configuring-the-sms-gateway</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-view-vulnerabilities-on-my-devices</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-divide-scans-among-several-scanner-appliances</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-are-platform-software-and-vulnerability-tests-updated</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/product-name-changes</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/what-cloud-services-are-supported-for-azure</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-set-up-a-rest-api-scan</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-create-a-comparison-report-template</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/where-do-i-find-details-for-contacting-the-support</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-share-scan-results-safely</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-whitelist-the-reply-to-email-address-1</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/kb-404</loc><image:image><image:loc>https://www.holmsecurity.com/hubfs/Holm%20Security%20logos/Press%20Material%20-%20Holm%20Security%20Logo%20Yellow.png</image:loc><image:caption>PressMaterialHolmSecurityLogoYellow</image:caption><image:title>PressMaterialHolmSecurityLogoYellow</image:title></image:image><image:image><image:loc>https://www.holmsecurity.com/hubfs/Website%20material/Images/Wallpaper_2.jpeg</image:loc><image:caption>Wallpaper2</image:caption><image:title>Wallpaper2</image:title></image:image><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/pp-mssp-report-v2</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/what-is-the-difference-between-discovery-basic-full-scan-type</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-create-an-industry-benchmark-widget</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/what-widgets-are-available-on-the-dashboard</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-create-a-profile-to-only-scan-react2shell-vulnerability-cve-2025-55182</loc><lastmod>2025-12-09</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-make-exception-in-admin-tools-pro-for-joomla</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/september-2025-security-update-data-breaches-spread-while-ai-battles-ai</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-create-a-web-application-from-the-catalog</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/improved-account-management-trial-support-in-organizer</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-make-a-custom-rule-for-exclusion-of-urls-for-the-web-application-scanner</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/what-are-the-sources-used-for-known-exploits</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-review-the-configuration-used-for-a-scan</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-does-holm-security-support-detection-of-the-spring4shell-vulnerability</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-create-a-cloud-scanning-profile</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-discover-new-assets</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-enable-notifications-for-scanner-appliances</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/what-does-the-scan-profile-settings-mean-1</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-blacklist-file-types-for-web-applications</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-set-up-authentication-for-kubernetes</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-set-up-single-sign-on-with-microsoft-entra-id</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-get-started-with-users</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-create/schedule-a-compliance-report</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-plan-a-rollout-for-a-large-it-environment</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/what-does-the-different-settings-for-crawl-scope-mean</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-does-the-detected-vs-fixed-widget-work</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-troubleshoot-sso-with-microsoft-entra-id</loc><lastmod>2026-03-06</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-the-account-risk-score-and-asset-risk-score-work</loc><lastmod>2025-12-10</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-run-an-asv-scan-used-for-quarterly-reporting</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/critical-vulnerability-in-palo-alto-os-command-injection-cve-2024-3400</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/pp-partner-kit-v2</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-find-the-sitemap-of-scanned-applications</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/2024-12-10</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/what-is-cisas-known-exploited-vulnerabilities-catalog</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-view-and-filter-vulnerabilites-on-assets</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/new-vulnerability-severity-levels-coming-q1-2023</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge</loc><image:image><image:loc>https://www.holmsecurity.com/hubfs/Website%20material/Font%20Awesome%20Icons%20-%20Light/Yellow/yellow%20icon%20microchip.svg</image:loc><image:caption>yellowiconmicrochip</image:caption><image:title>yellowiconmicrochip</image:title></image:image><image:image><image:loc>https://www.holmsecurity.com/hubfs/Website%20material/Font%20Awesome%20Icons%20-%20Light/Yellow/yellow%20icon%20list%20check.svg</image:loc><image:caption>yellowiconlistcheck</image:caption><image:title>yellowiconlistcheck</image:title></image:image><image:image><image:loc>https://www.holmsecurity.com/hubfs/Website%20material/Font%20Awesome%20Icons%20-%20Light/Yellow/yellow%20icon%20file%20chart%20columns.svg</image:loc><image:caption>yellowiconfilechartcolumns</image:caption><image:title>yellowiconfilechartcolumns</image:title></image:image><image:image><image:loc>https://www.holmsecurity.com/hubfs/Website%20material/Font%20Awesome%20Icons%20-%20Light/Yellow/yellow%20icon%20memo%20circle%20check%20light.svg</image:loc><image:caption>yellowiconmemocirclechecklight</image:caption><image:title>yellowiconmemocirclechecklight</image:title></image:image><image:image><image:loc>https://www.holmsecurity.com/hubfs/Website%20material/Font%20Awesome%20Icons%20-%20Light/Yellow%20icon%20party%20horn%20light.svg</image:loc><image:caption>Yellowiconpartyhornlight</image:caption><image:title>Yellowiconpartyhornlight</image:title></image:image><image:image><image:loc>https://www.holmsecurity.com/hubfs/Website%20material/Font%20Awesome%20Icons%20-%20Light/Yellow/yellow%20icon%20globe.svg</image:loc><image:caption>yellowiconglobe</image:caption><image:title>yellowiconglobe</image:title></image:image><image:image><image:loc>https://www.holmsecurity.com/hubfs/Website%20material/Font%20Awesome%20Icons%20-%20Light/Yellow/yellow%20icon%20rocket%20launch.svg</image:loc><image:caption>yellowiconrocketlaunch</image:caption><image:title>yellowiconrocketlaunch</image:title></image:image><image:image><image:loc>https://www.holmsecurity.com/hubfs/Website%20material/Font%20Awesome%20Icons%20-%20Light/Yellow/yellow%20icon%20chart%20network.svg</image:loc><image:caption>yellowiconchartnetwork</image:caption><image:title>yellowiconchartnetwork</image:title></image:image><image:image><image:loc>https://www.holmsecurity.com/hubfs/Website%20material/Images/Web%20Application%20Security_v2.png</image:loc><image:caption>WebApplicationSecurityv2</image:caption><image:title>WebApplicationSecurityv2</image:title></image:image><image:image><image:loc>https://www.holmsecurity.com/hubfs/Website%20material/Font%20Awesome%20Icons%20-%20Light/Yellow/server-light.svg</image:loc><image:caption>serverlight</image:caption><image:title>serverlight</image:title></image:image><image:image><image:loc>https://www.holmsecurity.com/hubfs/Website%20material/Font%20Awesome%20Icons%20-%20Light/Yellow/yellow%20icon%20shield%20check%20light.svg</image:loc><image:caption>yellowiconshieldchecklight</image:caption><image:title>yellowiconshieldchecklight</image:title></image:image><image:image><image:loc>https://www.holmsecurity.com/hubfs/Website%20material/Images/API%20Security_v2.png</image:loc><image:caption>APISecurityv2</image:caption><image:title>APISecurityv2</image:title></image:image><image:image><image:loc>https://www.holmsecurity.com/hubfs/Website%20material/Images/System%20&amp;%20Network%20Security_v2.png</image:loc><image:caption>SystemNetworkSecurityv2</image:caption><image:title>SystemNetworkSecurityv2</image:title></image:image><image:image><image:loc>https://www.holmsecurity.com/hubfs/Website%20material/Font%20Awesome%20Icons%20-%20Light/Yellow/yellow%20icon%20radar%20light.svg</image:loc><image:caption>yellowiconradarlight</image:caption><image:title>yellowiconradarlight</image:title></image:image><image:image><image:loc>https://www.holmsecurity.com/hubfs/Website%20material/Font%20Awesome%20Icons%20-%20Light/Yellow/yellow%20icon%20circle%20info.svg</image:loc><image:caption>yellowiconcircleinfo</image:caption><image:title>yellowiconcircleinfo</image:title></image:image><image:image><image:loc>https://www.holmsecurity.com/hubfs/Website%20material/Font%20Awesome%20Icons%20-%20Light/Yellow/yellow%20icon%20warning.svg</image:loc><image:caption>yellowiconwarning</image:caption><image:title>yellowiconwarning</image:title></image:image><image:image><image:loc>https://www.holmsecurity.com/hubfs/Website%20material/Font%20Awesome%20Icons%20-%20Light/Yellow/handshake-angle-light-full.svg</image:loc><image:caption>handshakeanglelightfull</image:caption><image:title>handshakeanglelightfull</image:title></image:image><image:image><image:loc>https://www.holmsecurity.com/hubfs/Website%20material/Font%20Awesome%20Icons%20-%20Light/Yellow/yellow%20icon%20credit%20card.svg</image:loc><image:caption>yellowiconcreditcard</image:caption><image:title>yellowiconcreditcard</image:title></image:image><image:image><image:loc>https://www.holmsecurity.com/hubfs/Website%20material/Images/Phishing%20Simulation%20&amp;%20Awareness%20Training_v2.png</image:loc><image:caption>PhishingSimulationAwarenessTrainingv2</image:caption><image:title>PhishingSimulationAwarenessTrainingv2</image:title></image:image><image:image><image:loc>https://www.holmsecurity.com/hubfs/Website%20material/Images/Cloud%20Security_v2.png</image:loc><image:caption>CloudSecurityv2</image:caption><image:title>CloudSecurityv2</image:title></image:image><image:image><image:loc>https://www.holmsecurity.com/hubfs/Holm%20Security%20logos/Press%20Material%20-%20Holm%20Security%20Logo%20Yellow.png</image:loc><image:caption>PressMaterialHolmSecurityLogoYellow</image:caption><image:title>PressMaterialHolmSecurityLogoYellow</image:title></image:image><image:image><image:loc>https://www.holmsecurity.com/hubfs/Website%20material/Font%20Awesome%20Icons%20-%20Light/Yellow/yellow%20icon%20gears.svg</image:loc><image:caption>yellowicongears</image:caption><image:title>yellowicongears</image:title></image:image><image:image><image:loc>https://www.holmsecurity.com/hubfs/Website%20material/Font%20Awesome%20Icons%20-%20Light/Yellow/Yellow%20icon%20bell.svg</image:loc><image:caption>Yellowiconbell</image:caption><image:title>Yellowiconbell</image:title></image:image><image:image><image:loc>https://www.holmsecurity.com/hubfs/Website%20material/Images/Wallpaper_2.jpeg</image:loc><image:caption>Wallpaper2</image:caption><image:title>Wallpaper2</image:title></image:image><image:image><image:loc>https://www.holmsecurity.com/hubfs/Website%20material/Font%20Awesome%20Icons%20-%20Light/Yellow/yellow%20icon%20repeat-light.svg</image:loc><image:caption>yellowiconrepeatlight</image:caption><image:title>yellowiconrepeatlight</image:title></image:image><image:image><image:loc>https://www.holmsecurity.com/hubfs/Website%20material/Font%20Awesome%20Icons%20-%20Light/Yellow/yellow%20icon%20megaphone.svg</image:loc><image:caption>yellowiconmegaphone</image:caption><image:title>yellowiconmegaphone</image:title></image:image><image:image><image:loc>https://www.holmsecurity.com/hubfs/Knowledge%20Base/Dashboard%20icon.svg</image:loc><image:caption>Dashboardicon</image:caption><image:title>Dashboardicon</image:title></image:image><image:image><image:loc>https://www.holmsecurity.com/hubfs/Website%20material/Font%20Awesome%20Icons%20-%20Light/Yellow/yellow%20icon%20puzzle%20light.svg</image:loc><image:caption>yellowiconpuzzlelight</image:caption><image:title>yellowiconpuzzlelight</image:title></image:image><image:image><image:loc>https://www.holmsecurity.com/hubfs/Website%20material/Font%20Awesome%20Icons%20-%20Light/Yellow/yellow%20icon%20user%20group.svg</image:loc><image:caption>yellowiconusergroup</image:caption><image:title>yellowiconusergroup</image:title></image:image><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-create-a-remediation-rule</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-does-holm-security-detect-the-operating-system-of-the-host-scanned</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/what-does-mean-time-to-resolution-mean</loc><lastmod>2026-03-03</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/where-do-i-find-the-scada/ot-scanning-profile</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-does-holm-security-support-detection-for-goanywhere-mft-cve-2024-0204</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/what-is-the-difference-between-tcp-and-udp</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/release-notes-2024-04-24-dashboard</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-apply-a-tag-to-a-recipient</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-to-get-started-with-holm-security-vmp-onprem</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/why-is-my-scan-not-progressing</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/pp-logging-out-v2</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/what-are-the-different-filtration-options-for-device-agent</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/what-are-the-most-important-things-to-consider-when-setting-up-a-new-large-account</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-install-a-scanner-appliance-in-aws</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-create-a-remote-support-session-in-my-on-prem-environment</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/open-source-licensing</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-start-a-scan-from-the-assets-view</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/newly-discovered-critical-codeigniter4-flaw-requires-immediate-action</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-get-started-assessing-my-microsoft365-environment</loc><lastmod>2026-03-25</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-find-network-assets-using-the-mac-address</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-to-overview-all-identified-software-applications-across-assets</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-share-a-dashboard-view</loc><lastmod>2025-12-10</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/licensing-policy</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/what-permissions-are-required-to-scan-my-aws-environment</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-assign-the-asset-ownership-to-teams</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/what-permissions-are-supported-for-custom-roles</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-whitelist-a-domain-in-office-365</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-to-filter-out-devices-based-on-e.g.-account-username</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-create-a-new-user-in-organizer</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-overview-scan-schedules</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-assign-permission-to-organizer-users-of-who-have-access-to-what-customers</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/february-2026-security-update-ai-driven-attacks-surge-alongside-ot-targeting-and-critical-vulnerabilities</loc><lastmod>2026-02-03</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/what-is-metasploit-exploit-database</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-find-assignment-group-id-and-user-id-in-servicenow</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-create-a-scanner-appliance-group</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/what-are-the-requirements-to-run-onprem</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-to-create-a-report-of-your-device-assets</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/iso-27001-certificate</loc><lastmod>2026-02-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-administrate-onprem-platform</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/can-i-manually-create-tickets</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-setup-header-injections</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-set-up-teams</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-archive-and-restore-a-phishing-template</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-can-i-speed-up-web-app-scans</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-white-label-security-center-accounts-under-organizer</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-record-a-login-sequence-using-the-web-recorder-plugin</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/what-are-the-general-basics-for-device-agent</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-create-a-new-view-for-my-assets</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/secure-with-holm-security-badge</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-set-up-a-new-security-center-account-in-organizer</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-view-the-vulnerability-trend-for-an-asset</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-generate-my-topdesk-integration-application-password</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-optimize-scans-for-sensitive-environments</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/what-are-the-general-requirements-and-best-practices-for-assessments-of-larger-networks</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-install-the-device-agent-on-windows-manually/-gpo-group-policy-objects</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-apply-will-not-fix</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-interpret-kubernetes-vulnerabilities</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-install-a-device-agent-automatically-via-intune</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-solve-the-on-prem-login-issue-impersonation-via-firefox</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-apply-usage-limits-on-my-security-center-accounts</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-create-a-remediation-ticket-for-a-vulnerability-in-vm</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/why-did-my-scan-end-up-in-an-error</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/why-are-some-domains-blocked</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-use-the-sitemap-to-run-faster-web-app-api-assessments</loc><lastmod>2026-01-28</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-configure-nat-mode-for-my-scanner-appliance</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/pci-dss-asv-certified</loc><lastmod>2026-02-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-get-started-with-domain-asset-discovery</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-does-threat-score-work</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/information-for-service-providers</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/what-firewall-settings-are-required-when-scanning-using-external-scanners</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-create-a-monitoring-profile</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-prioritize-and-structure-vulnerabilities</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-group-recipients</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/pp-column-managment-v2</loc><lastmod>2025-11-27</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-integrate-with-splunk</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-find-how-many-cloud-resources-im-using</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/what-are-the-google-cloud-cost-saving-plugins</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/what-type-of-devices-can-be-disrupted-by-scans</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/2026-2-26-frictionless-dashboards-streamlined-access-control</loc><lastmod>2026-02-11</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/what-is-phishing</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/why-are-my-installed-applications-being-processed</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-exclude-one-or-more-urls-from-being-scanned</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/migrating-assets-owners-to-teams</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-convert-the-holm-security-scanner-appliance-ova-image-from-sha256-to-sha1</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-organize-my-assets</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-does-teams-permission-works</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-enable-two-factor-authentication</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-share-a-link-to-a-filtered-view</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-add-hosts-to-the-web-application-catalog</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/what-services-does-the-network-scanner-try-to-brute-force</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-run-a-scan-with-potentially-dangerous-test</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-get-started-with-asset-manager</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-restrict-login-based-on-the-users-ip</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/what-is-exploit-db-database</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/terms-conditions-2</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-scan-for-zerologon-vulnerability</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/what-is-the-difference-between-the-different-scan-types</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/what-web-scan-profiles-are-available</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/pp-navigation-menu-v2</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-to-work-with-lifecycle-management</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-schedule-a-scan-for-an-web-app</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-setup-an-integration-with-microsoft-teams</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-does-the-support-for-finding-vulnerabilities-in-javascript-libraries-work</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-fetch-vulnerability-information-for-a-single-asset-using-the-platform-api</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/multiple-important-improvements-to-unified-vulnerabilities</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-change-business-impact-on-assets</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-meassure-the-number-of-user-phishing/fraud-reports-in-office-365</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-create-a-policy-profile</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-connect-the-device-agent-using-proxy-on-scanner-appliance</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-does-holm-security-support-detection-of-the-log4j-log4shell-vulnerability</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/march-2025-security-news-cyber-warfare-heats-up-across-europe</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/what-are-the-general-basics-for-the-scanner-appliance</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/solution-applied-automatic-fix-verification</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-create-a-new-view</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-set-up-a-policy-scan</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-configure-onprem-to-use-a-static-ip</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/what-are-the-know-limitation-within-the</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-exclude-form-methods-in-web-application-scans</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/what-is-the-news-feed-bell-icon</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/what-ports-are-included-in-the-different-scan-levels</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-blacklist-css-selectors</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-optimize-scans-for-a-small-amount-of-ip-addresses</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/what-is-the-vulnerability-check-kev-list</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-use-attack-surface-management-asm</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-run-an-authenticated-web-application-scan-using-htlm-form</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-use-the-scanner-appliance-proxy</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-filter-on-tags-in-vulnerability-manager</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/october-2025-security-update-septembers-biggest-ransomware-ai-and-vulnerability-exploits</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/what-is-a-tag-and-how-does-it-work-1</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/which-virtualization-platforms-does-the-general-ova-image-support</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-does-tags-work</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-find-superseded-microsoft-patches</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-set-up-a-custom-domain-user-account-for-authenticated-scans</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/list-of-sub-processors</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-integrate-with-microsoft-teams</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-clone-a-dashboard</loc><lastmod>2026-02-12</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/pp-dashboard-mssp-v2</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-create-a-security-center-account-in-onprem</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-create-a-phishing-awareness-training-report</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/terms-conditions-3</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-create-a-web-application-scan-profile</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/july-2025-security-update-nation-state-attacks-and-cyber-security-as-integral-defense-are-the-new-norm</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-setup-a-scan-blackout-window</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/may-2025-security-update-new-flaws-big-industry-moves</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/what-is-policy-scanning-and-what-are-the-requirements-for-policy-scanning</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/what-does-the-different-statuses-mean</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/what-is-the-difference-between-tcp-syn-and-tcp-syn-ack-in-a-scan-profile</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-see-vulnerabilities-connected-to-a-host-or-web-app-in-vulnerability-manager-1</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/what-is-the-general-basics-for-the-web-app-crawler-and-scanner-1</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/why-did-a-network-scan-not-find-any-hosts-alive/active</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-does-a-device-agents-life-cycle-and-status-work</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-see-if-an-authenticated-network-scan-was-successful-or-not</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-create-a-new-tag-pat</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-enable-active-exploitation-for-network-scans</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/what-do-the-definitions/vocabulary-mean</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/what-is-holm-security-device-agent</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-unignore/bring-back-an-ignored-vulnerability</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-set-up-single-sign-on-with-okta</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/what-are-the-system-requirements-for-the-device-agent</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/what-permissions-does-the-topdesk-integration-need</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/what-is-the-behavior-for-tickets-and-vulnerability-status-when-ignoring-vulnerabilities</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-run-a-simulated-pci-dss-compliance-scan-using-holm-security</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-are-tickets-closed</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/does-holm-security-perform-vulnerability-assessments</loc><lastmod>2026-03-20</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-create/schedule-a-system-network-scanning-report</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/what-are-potentially-dangerous-test-and-tests-that-perform-active-break-in-attempts</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-download-a-scan-result-report-as-a-csv-file</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-use-header-injections-in-a-web-application-scan</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-create-a-new-dashboard</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/unified-vulnerabilities</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-see-where-a-device-agent-vulnerability-is-detected</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/what-is-the-impact-of-powershell-commands-in-authenticated-network-scans</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-optimize-scans</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-re-register-an-existing-scanner-appliance</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/owasp-2013-vs.-owasp-2017</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-create-a-report-in-vulnerability-manager</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/pp-partner-support-v2</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/what-are-the-different-scan-statuses</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-are-we-protecting-your-scan-credentials</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-deploy-a-new-device-agent</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/what-methods-is-used-to-detect-vulnerabilities</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-schedule-a-network-scan</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-export-statistics-from-the-api</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/what-personal-data-does-holm-security-process</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-is-the-overall-business-risk-calculated</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-get-started-with-api-scanning</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/2025-08-14-new-improvements-reduce-bottlenecks</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/pp-reseller-report-v2</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/ivanti-connect-secure-cve-2023-46805-cve-2024-21887</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/what-are-the-aws-cost-saving-plugins</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-integrate-with-slack</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/does-the-device-agent-support-golden-image-installation</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/what-are-the-general-basics-for-setting-up-a-web-application-scan</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-to-check-for-vendor/product-coverage</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/what-is-best-practice-for-network-scan-targets</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/cyberhive-ecso</loc><lastmod>2026-02-28</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-optimize-scans-reaching-the-24-hour-limit</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-integrate-with-topdesk</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/what-impact-will-network-scans-have-on-my-network-and-devices</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-run-an-authenticated-web-application-scan-using-http-basic-authentication</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-should-i-backup-holm-security-on-prem</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/2025-11-21-smarter-detection-enhanced-webhook-integration-more-for-an-easier-workflow</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/eu-tech-map</loc><lastmod>2026-02-28</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-add-account-name-for-white-labeling-in-emails</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/where-do-i-find-my-microsoft-azure-credentials</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-bulk-update-business-impact-on-network-assets</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/what-are-the-sources-for-holm-securitys-vulnerability-tests</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/release-notes-2024-04-24-additional-features</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/pp-company-information-v2</loc><lastmod>2025-11-27</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-turn-off-the-digest-report</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-review-the-detection-information-for-a-vulnerability-in-vulnerability-manager</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-discover-and-monitor-domain-assets</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-apply-a-tag-to-an-asset</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-troubleshoot-onprem-in-case-something-is-not-working</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-to-check-if-plus-addressing-is-enabled-in-microsoft-365</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-install-a-scanner-appliance-in-google-cloud</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-troubleshoot-device-agents-not-connecting</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-does-the</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/what-are-the-azure-cost-saving-plugins</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/what-does-auto-and-manual-mean-for-reports</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-create-tickets-manually</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-is-average-severity-calculated</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-get-started-with-tags</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/what-general-information-is-available-on-the-device-agent</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-scan-for-backported-patches</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/what-is-the-general-basics-for-creating-a-report</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-is-onprem-updated-to-a-new-version</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-set-up-monitoring-of-email-blacklists</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-send-a-report</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-scan-a-kubernetes-k8s-cluster</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/what-is-policy-scanning</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-change-the-internal-ips-docker-network-on-the-scanner-appliance</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/kb-search-results</loc><image:image><image:loc>https://www.holmsecurity.com/hubfs/Website%20material/Images/Wallpaper_2.jpeg</image:loc><image:caption>Wallpaper2</image:caption><image:title>Wallpaper2</image:title></image:image><image:image><image:loc>https://www.holmsecurity.com/hubfs/Holm%20Security%20logos/Press%20Material%20-%20Holm%20Security%20Logo%20Yellow.png</image:loc><image:caption>PressMaterialHolmSecurityLogoYellow</image:caption><image:title>PressMaterialHolmSecurityLogoYellow</image:title></image:image><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-does-the-vulnerability-tests-page-work</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/does-holm-security-share-audit-and-compliance-reports</loc><lastmod>2026-03-20</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-does-vulnerability-notes-work</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-change-the-retention-time-for-the-activity-log</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/what-is-the-difference-between-disabling-and-ignoring-vulnerabilities</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-integrate-with-servicenow</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-configure-a-scan-profile-for-authenticated-scanning</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-get-started-with-phishing-and-awareness-training</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-is-the-risk-score-on-assets-calculated</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-create-a-user-role-for-reporting-only</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-is-the-industry-benchmark-calculated</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/path-traversal-vulnerability</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-set-up-notifications-through-webhooks</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-conversations-work</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/does-the-device-agent-need-outbound-network-access</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/pp-logging-in-v2</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-does-the-activity-log-work</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-are-tickets-reopened</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-are-tickets-updated</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/what-does-the-network-scan-profile-settings-mean</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-create-a-polish-financial-supervision-authority</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-to-interpret-the-severity-and-risk-trend-on-recipients</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/what-are-the-network-configuration-requirements-for-on-prem</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-add-network-assets-from-an-ip-range</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-set-up-an-api-token</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-are-unified-assets-tracked</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/august-2025-security-update-ai-cybercrime-and-regulation-the-new-norm</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-create-a-system-network-scanning-report-template</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/what-are-the-data-retention-policies</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-to-create-a-web-training-template</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/which-placeholders-are-available-for-the-webhooks-integration</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-setup-an-integration-with-azure-sentinel</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-upload-my-own-certificate-to-be-used-in-onprem</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com</loc><video:video><video:thumbnail_loc>https://www.holmsecurity.com/hubfs/Website%20material/SP_hero_video.mp4/medium.jpg</video:thumbnail_loc><video:title>SP_hero_video</video:title><video:description>SP_hero_video</video:description><video:content_loc>https://www.holmsecurity.com/hubfs/Website%20material/SP_hero_video.mp4</video:content_loc><video:duration>10</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live></video:video><image:image><image:loc>https://www.holmsecurity.com/hubfs/Website%20base%20images/en_flag-white.svg</image:loc><image:caption>enflagwhite</image:caption><image:title>enflagwhite</image:title></image:image><image:image><image:loc>https://www.holmsecurity.com/hubfs/Website%20base%20images/da_flag.svg</image:loc><image:caption>daflag</image:caption><image:title>daflag</image:title></image:image><image:image><image:loc>https://www.holmsecurity.com/hubfs/Website%20base%20images/poland_flag.svg</image:loc><image:caption>polandflag</image:caption><image:title>polandflag</image:title></image:image><image:image><image:loc>https://www.holmsecurity.com/hubfs/Website%20base%20images/uae_flag.svg</image:loc><image:caption>uaeflag</image:caption><image:title>uaeflag</image:title></image:image><image:image><image:loc>https://www.holmsecurity.com/hubfs/Website%20base%20images/icons/Badges_white.png</image:loc><image:caption>Badgeswhite</image:caption><image:title>Badgeswhite</image:title></image:image><image:image><image:loc>https://www.holmsecurity.com/hubfs/Website%20base%20images/en_flag.svg</image:loc><image:caption>enflag</image:caption><image:title>enflag</image:title></image:image><image:image><image:loc>https://www.holmsecurity.com/hubfs/Website%20base%20images/fr-be_flag.svg</image:loc><image:caption>frbeflag</image:caption><image:title>frbeflag</image:title></image:image><image:image><image:loc>https://www.holmsecurity.com/hubfs/Website%20material/Font%20Awesome%20Icons%20-%20Light/Yellow/yellow%20icon%20envelope%20open%20text%20light.svg</image:loc><image:caption>yellowiconenvelopeopentextlight</image:caption><image:title>yellowiconenvelopeopentextlight</image:title></image:image><image:image><image:loc>https://www.holmsecurity.com/hubfs/Website%20base%20images/sv_flag.svg</image:loc><image:caption>svflag</image:caption><image:title>svflag</image:title></image:image><image:image><image:loc>https://www.holmsecurity.com/hubfs/Website%20material/Font%20Awesome%20Icons%20-%20Light/comment-lines-light-blue.svg</image:loc><image:caption>commentlineslightblue</image:caption><image:title>commentlineslightblue</image:title></image:image><image:image><image:loc>https://www.holmsecurity.com/hubfs/Website%20base%20images/fi_flag.svg</image:loc><image:caption>fiflag</image:caption><image:title>fiflag</image:title></image:image><image:image><image:loc>https://www.holmsecurity.com/hubfs/Website%20base%20images/en-gb_flag.svg</image:loc><image:caption>engbflag</image:caption><image:title>engbflag</image:title></image:image><image:image><image:loc>https://www.holmsecurity.com/hubfs/Website%20material/Font%20Awesome%20Icons%20-%20Light/right-to-bracket-white.svg</image:loc><image:caption>righttobracketwhite</image:caption><image:title>righttobracketwhite</image:title></image:image><image:image><image:loc>https://www.holmsecurity.com/hubfs/Website%20material/Font%20Awesome%20Icons%20-%20Light/right-to-bracket-blue.svg</image:loc><image:caption>righttobracketblue</image:caption><image:title>righttobracketblue</image:title></image:image><image:image><image:loc>https://www.holmsecurity.com/hubfs/Website%20base%20images/no_flag.svg</image:loc><image:caption>noflag</image:caption><image:title>noflag</image:title></image:image><image:image><image:loc>https://www.holmsecurity.com/hubfs/Website%20base%20images/nl_flag.svg</image:loc><image:caption>nlflag</image:caption><image:title>nlflag</image:title></image:image><image:image><image:loc>https://www.holmsecurity.com/hubfs/Website%20base%20images/de-de_flag.svg</image:loc><image:caption>dedeflag</image:caption><image:title>dedeflag</image:title></image:image><image:image><image:loc>https://www.holmsecurity.com/hubfs/Website%20material/Font%20Awesome%20Icons%20-%20Light/comment-lines-light-full%20-%20white.svg</image:loc><image:caption>commentlineslightfullwhite</image:caption><image:title>commentlineslightfullwhite</image:title></image:image><image:image><image:loc>https://www.holmsecurity.com/hubfs/Website%20base%20images/Featured%20images/Holm%20Security%20Next-Gen%20Vulnerability%20Management%20Featured%20Image.png</image:loc><image:caption>HolmSecurityNextGenVulnerabilityManagementFeaturedImage</image:caption><image:title>HolmSecurityNextGenVulnerabilityManagementFeaturedImage</image:title></image:image><image:image><image:loc>https://www.holmsecurity.com/hubfs/Website%20base%20images/en-my_flag.svg</image:loc><image:caption>enmyflag</image:caption><image:title>enmyflag</image:title></image:image><image:image><image:loc>https://www.holmsecurity.com/hubfs/Holm%20Security%20logos/Products/Holm%20Security%20VMP.png</image:loc><image:caption>HolmSecurityVMP</image:caption><image:title>HolmSecurityVMP</image:title></image:image><image:image><image:loc>https://www.holmsecurity.com/hubfs/Website%20base%20images/en-in_flag.svg</image:loc><image:caption>eninflag</image:caption><image:title>eninflag</image:title></image:image><lastmod>2025-12-30</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-often-are-unified-assets-updated</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-create-a-network-scan-profile</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/who-is-the-ciso</loc><lastmod>2026-02-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/november-2025-security-update-cybercrime-scales-with-cross-border-infrastructure</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-import-email-recipients</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-manage-multiple-security-center-accounts-in-onprem</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-troubleshoot-servicenow-integration-issues</loc><lastmod>2026-03-09</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/what-are-internet-facing-assets</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/what-happens-when-the-scanner-appliance-scans-itself</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/april-2026-security-update-evasion</loc><lastmod>2026-03-27</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-change-settings-for-the-digest-report</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-view-and-export-account-statistics-within-organizer</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/oracle-zero-day-in-its-e-business-suite-ebs-exploited-by-clop-group</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/what-data-is-available-historically-for-each-widget</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-delete-a-view</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/cybernoden</loc><lastmod>2026-02-28</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/2024-03-18-scan-optimization-safety</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/what-authentication-methods-does-the-web-app-scanner-have</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-can-teams-and-permissions-be-used-for-remediation</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-manage-the-device-agnet-using-the-api</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-export-cloud-results-to-csv</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-create-a-unified-tag</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-run-a-network-scan-for-brute-force-only</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-make-mass-changes-and-imports-to-assets</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-scan-a-network-target-using-hostnames</loc><lastmod>2026-03-24</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-run-a-connectivity-test-for-the-scanner-appliance</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-set-dashboard-permissions-for-teams</loc><lastmod>2025-12-10</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/what-cloud-services-are-supported-for-microsoft-365</loc><lastmod>2026-03-25</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/2024-10-16-industry-benchmark</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/what-type-of-devices-are-scanned</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/what-does-the-web-server-setting-do-when-configuring-a-network-scan</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-solve-common-problems-in-version-7.0.3-build-on-vcenter-1</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-export-recipients-from-phishing-awareness-training</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-enable-potential-vulnerabilities</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-retrieve-a-new-license-for-onprem</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-to-make-cluster-reachable-from-the-appliance</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-get-started-with-continious</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/2024-01-31-beyond-trust-integration-and-oracle-cloud-scanning-support</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-improve-the-accuracy-when-scanning-web-servers</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/2024-09-16</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-create-one-or-more-network-assets</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-many-scans-can-i-run-on-a-scanner-appliance</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/support-opening-hours</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-reset-my-password-for-security-center</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/release-notes-2023-10-11</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-install-a-device-agent-automatically-via-ecm-old-sccm</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/2025-10-9-easily-manage-device-agent-vulnerabilities-and-more</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-activate-javascript-support-in-the-web-scan-engine</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-set-up-a-phishing-and-awareness-assessment</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-assign-roles-and-permissions-using-teams</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/what-is-the-difference-between-active-inactive-hosts</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/actively-exploited-cisco-asa-and-ftd-hit-via-two-zero-day-flaws</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-solve-common-problems-in-versions-5.5-of-vmware-vsphere-esxi</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-create/schedule-a-web-application-scanning-report</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-add-an-spf-record-when-using-my-own-email-address</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-set-up-single-sign-on</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/what-do-the-different-statistics-mean</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-add-a-user</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/why-cant-i-login-to-my-organizer-account</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-add-a-custom-image-to-my-profile</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-are-opened-emails-tracked</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-run-an-authenticated-web-application-scan-using-htlm-dynamic-form</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-bring-back-a-disabled-vulnerability</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/what-is-euvd-kev-list</loc><lastmod>2026-03-16</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-create-custom-roles</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/where-can-i-find-information-about-how-to-remediate-multiple-vulnerabilities-with-one-mitigation</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/where-can-i-find-the-scanid</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-avoid-unwanted-login-attempts-when-performing-a-scan-on-prem</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-check-if-a-domain-is-available-within-the-phishing-and-awareness-training</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/2024-02-21-new-enhancements-to-phishing-awareness-training-api-scanning-and-unified-vulnerabilities-assets</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/impersonation-failed-problem</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-import-assets-from-a-csv-file</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-does-the-license-limit-work</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-scan-multiple-domains-in-web-app-scanning</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/january-2026-security-update-new-developments-keep-organizations-on-edge-into-2026</loc><lastmod>2026-01-02</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-solve-issues-with-the-guest-operating-system-in-vmware-6.5</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-create-a-new-tag</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-create-reports-in-unified-vulnerabilities</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/where-do-i-find-my-oracle-credentials</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/pp-dashboard-reseller-v2</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/where-do-i-find-my-access-key-id-and-secret-access-key</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/december-2025-security-update-public-and-private-sectors-reminded-that-cyber-hygiene-is-a-non-negotiable</loc><lastmod>2025-12-02</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/pp-table-filter-builder-v2</loc><lastmod>2025-11-27</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/what-are-advanced-vulnerability-plugins</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-configure-onprem-from-the-first-start-up</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-are-hostnames-and-ip-addresses-determined-in-network-scans</loc><lastmod>2026-03-03</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/where-can-i-find-the-api-documentation</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/critical-vulnerabilities-in-connectwise-screenconnect-cve-2024-1708-cve-2024-1709</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/what-is-the-checklist-before-sending-out-a-phishing-simulation</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/where-do-i-find-my-google-cloud-credentials</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/new-version-available-for-on-premise-holm-security-vmp</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-setup-static-route-configuration-for-on-prem-appliance</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/why-is-my-appliance-busy-but-not-connected</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/what-are-weak-cipher-suites-and-how-do-i-fix-them</loc><lastmod>2026-03-03</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/is-data-posted-in-forms-stored</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-set-up-single-sign-on-with-google-workspace</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/2023-11-01-remediate-multiple-vulnerabilities-with-one-mitigation</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-does-the-security-look-for-onprem</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/exploit-prediction-scoring-system-epss</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-to-troubleshoot-scanner-appliance-from-security-center</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/device-agent-anti-virus-hips-exclusion-and-whitelisting</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-make-a-sleep-action-in-the-chromium-web-recorder</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-get-started-with-policy-scanning</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/pp-tags-manager-v2</loc><lastmod>2025-11-27</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/what-cloud-services-are-supported-for-oracle</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/does-holm-security-share-vulnerability-assessment-reports</loc><lastmod>2026-03-20</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/2024-06-release-notes-tags-and-teams</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-does-the-scan-safety-mechanism-work</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-does-authenticated-networks-scans-work</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/why-are-my-website-forms-spammed</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/2025-09-11-a-seamless-workflow-with-powerful-tools</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-configure-the-onprem-https-proxy</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-low-probability-tests-work-and-how-can-i-turn-them-off</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/what-are-the-firewall-settings-for-scanner-appliance</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/what-does-the-different-settings-for-phishing-awareness-training-mean</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-solve-common-problems-in-version-5.5-of-vmware-vsphere-esxi</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-check-the-onprem-health-status</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-ignore-or-disable-vulnerabilities</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-does-holm-security-support-detection-of-the-microsoft-outlook-2013/2016-privilege-escalation-vulnerability-cve-2023-23397</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/2025-17-12-your-dashboard-is-now-a-strategic-command-center</loc><lastmod>2025-12-16</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-add-a-new-widget</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-whitelist-phishing-sendouts-in-g-suite</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-create-a-web-application-report-template</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-configure-the-bot-token</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-get-started-with-remediation</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-find-my-microsoft-teams-url</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-configure-ntp-for-the-scanner-appliance</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/when-are-assets-created</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/ip-addresses-and-subnets-quick-reference</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-analyze-the-result-of-a-policy-scan</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-overview-my-account-usage</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/vsphere-deployment-issue-the-ovf-package-is-invalid-and-cannot-be-deployed</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/introducing-the-next-generation-of-vulnerability-remediation</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-unify-web-application-assets</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/which-placeholders-are-available-for-integrations</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-reset-the-search-filter-for-a-view</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/what-is-bounce-exclusion-strings-and-how-does-it-work</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-set-up-an-email-integration-for-remediation</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/what-are-the-general-basics-for-cloud-scan</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-create-a-phishing-awareness-training-template</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-create-views-in-remediation</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/cloud-services-scanning-and-compliance-audit</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/what-are-the-different-filtration-options-for-unified-vulnerabilities</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/what-scan-profiles-exist-within-the-security-center</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/what-types-of-template-reports-does</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-create-a-comparison-report</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/what-is-the-digest-report</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/can-i-install-vmware-tools-on-the-scanner-appliance</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-to-scan-for-known-exploits-and-ransomware</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-define-threshold-for-compliance-reports</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-get-a-report-with-ports-opened-on-your-assets</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-business-impact-is-inherited-from-tags</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-clone-a-team</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-include-or-exclude-a-specific-vulnerability-in-a-scan</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-reboot-the-scanner-appliance</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-configure-white-labeling-for-digest-reports</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-manage-my-account-password-policy</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/security-newsletter-october-2024</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-ignore-a-device-agent-vulnerability</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/which-network-assets-counts-toward-a-license</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/why-do-i-see-a-checksum-error-when-deploying-image-using-vmware-ova</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-troubleshoot-topdesk-integration-issues</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/what-is-owasp-top-10</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-optimize-scans-for-large-medium-sized-networks</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/dpo-data-protection-officer</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-export-list-views-in-csv-format</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/what-data-does-the-device-agent-collect</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/april-2025-security-news-geopolitics-and-exploited-vulnerabilities-fill-headlines</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/what-are-the-tests-that-perform-active-login-attempts</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-solve-common-problems-in-version-7.0.3-build-on-vcenter</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-setup-input-parsers-in-a-web-app-scanning</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-validate-the-checksum-of-my-scanner-appliance-image</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-delegate-asset-responsibilities-to-my-users</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/how-do-i-share-diagnostic-package-from-onprem-in-case-something-is-not-working</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://support.holmsecurity.com/knowledge/remediation-and-device-agent-updates-keep-your-workflow-efficient</loc><lastmod>2025-11-26</lastmod></url></urlset>