<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
    
    <url>
        <loc>https://www.itblogs.ca/about-us</loc>
        <lastmod>2026-01-31</lastmod>
    </url><url>
        <loc>https://www.itblogs.ca/author/jaspreet-singh</loc>
        <lastmod>2026-01-10</lastmod>
    </url><url>
        <loc>https://www.itblogs.ca/contactus</loc>
        <lastmod>2026-01-27</lastmod>
    </url><url>
        <loc>https://www.itblogs.ca/</loc>
    </url><url>
        <loc>https://www.itblogs.ca/website/info</loc>
    </url><url>
        <loc>https://www.itblogs.ca/blog</loc>
    </url><url>
        <loc>https://www.itblogs.ca/blog/itblogsca-1</loc>
    </url><url>
        <loc>https://www.itblogs.ca/blog/news-2</loc>
    </url><url>
        <loc>https://www.itblogs.ca/blog/itblogsca-1/feed</loc>
    </url><url>
        <loc>https://www.itblogs.ca/blog/news-2/feed</loc>
    </url><url>
        <loc>https://www.itblogs.ca/blog/itblogsca-1/eid-exp-013-impossible-travel-detection-vs-vpn-behavior-deep-dive-for-security-engineers-49</loc>
    </url><url>
        <loc>https://www.itblogs.ca/blog/itblogsca-1/mfa-fatigue-attacks-in-microsoft-entra-id-a-technical-deep-dive-eid-exp-014-48</loc>
    </url><url>
        <loc>https://www.itblogs.ca/blog/itblogsca-1/conditional-access-and-named-locations-in-microsoft-entra-id-a-technical-deep-dive-lab-eid-exp-010-47</loc>
    </url><url>
        <loc>https://www.itblogs.ca/blog/itblogsca-1/hybrid-identity-security-baseline-deep-dive-into-azure-ad-connect-and-entra-id-authentication-eid-exp-009-46</loc>
    </url><url>
        <loc>https://www.itblogs.ca/blog/itblogsca-1/mfa-fatigue-attacks-in-microsoft-365-why-risk-based-conditional-access-is-non-negotiable-eid-exp-008-44</loc>
    </url><url>
        <loc>https://www.itblogs.ca/blog/itblogsca-1/block-high-risk-sign-ins-in-microsoft-entra-why-detection-isnt-security-eid-exp-007-42</loc>
    </url><url>
        <loc>https://www.itblogs.ca/blog/itblogsca-1/microsoft-entra-identity-protection-configuring-alerts-notifications-for-risky-users-and-risky-sign-ins-eid-exp-006-41</loc>
    </url><url>
        <loc>https://www.itblogs.ca/blog/itblogsca-1/enforcing-risk-remediation-in-microsoft-entra-id-making-identity-protection-actually-stop-attacks-eid-exp-005-40</loc>
    </url><url>
        <loc>https://www.itblogs.ca/blog/itblogsca-1/identity-protection-alerts-often-overlooked-why-detection-alone-does-not-prevent-compromise-in-microsoft-entra-id-39</loc>
    </url><url>
        <loc>https://www.itblogs.ca/blog/itblogsca-1/break-glass-accounts-in-microsoft-entra-id-failure-modes-detection-and-hardening-38</loc>
    </url><url>
        <loc>https://www.itblogs.ca/blog/itblogsca-1/microsoft-entra-id-sign-in-logs-a-technical-deep-dive-into-visibility-gaps-37</loc>
    </url><url>
        <loc>https://www.itblogs.ca/blog/itblogsca-1/default-microsoft-entra-id-security-is-often-overestimated-36</loc>
    </url><url>
        <loc>https://www.itblogs.ca/blog/itblogsca-1/why-device-trust-is-often-assumed-not-verified-35</loc>
    </url><url>
        <loc>https://www.itblogs.ca/blog/itblogsca-1/guest-users-the-overlooked-lateral-movement-path-in-entra-id-34</loc>
    </url><url>
        <loc>https://www.itblogs.ca/blog/itblogsca-1/break-glass-accounts-that-fail-during-real-incidents-33</loc>
    </url><url>
        <loc>https://www.itblogs.ca/blog/itblogsca-1/the-hidden-risks-of-all-users-in-conditional-access-32</loc>
    </url><url>
        <loc>https://www.itblogs.ca/blog/itblogsca-1/why-sign-in-risk-user-risk-and-why-that-matters-31</loc>
    </url><url>
        <loc>https://www.itblogs.ca/blog/itblogsca-1/how-session-cookies-bypass-mfa-entirely-30</loc>
    </url><url>
        <loc>https://www.itblogs.ca/blog/itblogsca-1/token-theft-vs-password-theft-29</loc>
    </url><url>
        <loc>https://www.itblogs.ca/blog/itblogsca-1/how-spf-dkim-and-dmarc-actually-work-together-and-why-one-alone-is-useless-28</loc>
    </url><url>
        <loc>https://www.itblogs.ca/blog/itblogsca-1/how-attackers-use-inbox-rules-and-why-most-breaches-go-unnoticed-27</loc>
    </url><url>
        <loc>https://www.itblogs.ca/blog/itblogsca-1/secure-onedrive-sharepoint-sharing-the-part-everyone-leaves-wide-open-26</loc>
    </url><url>
        <loc>https://www.itblogs.ca/blog/itblogsca-1/how-to-secure-shared-mailboxes-the-part-everyone-forgets-25</loc>
    </url><url>
        <loc>https://www.itblogs.ca/blog/itblogsca-1/safe-links-safe-attachments-the-quiet-security-features-saving-you-every-day-24</loc>
    </url><url>
        <loc>https://www.itblogs.ca/blog/itblogsca-1/how-phishing-bypasses-basic-security-and-why-smbs-are-still-getting-burned-23</loc>
    </url><url>
        <loc>https://www.itblogs.ca/blog/itblogsca-1/the-identity-security-checklist-every-smb-should-follow-before-its-too-late-22</loc>
    </url><url>
        <loc>https://www.itblogs.ca/blog/itblogsca-1/audit-and-reduce-admin-roles-microsoft-entra-id-21</loc>
    </url><url>
        <loc>https://www.itblogs.ca/blog/itblogsca-1/break-glass-accounts-microsoft-entra-id-20</loc>
    </url><url>
        <loc>https://www.itblogs.ca/blog/itblogsca-1/how-i-restrict-microsoft-365-access-by-country-19</loc>
    </url><url>
        <loc>https://www.itblogs.ca/blog/itblogsca-1/security-defaults-vs-conditional-access-when-to-switch-18</loc>
    </url><url>
        <loc>https://www.itblogs.ca/blog/itblogsca-1/mastering-security-fundamentals-17</loc>
    </url><url>
        <loc>https://www.itblogs.ca/blog/itblogsca-1/how-mfa-fatigue-attacks-actually-work-and-why-theyre-still-succeeding-16</loc>
    </url><url>
        <loc>https://www.itblogs.ca/blog/itblogsca-1/disable-legacy-authentication-microsoft-entra-id-15</loc>
    </url><url>
        <loc>https://www.itblogs.ca/blog/itblogsca-1/how-i-enable-mfa-using-conditional-access-and-disable-security-defaults-13</loc>
    </url><url>
        <loc>https://www.itblogs.ca/blog/itblogsca-1/zero-trust-isnt-a-tool-its-a-habit-i-had-to-learn-the-hard-way-10</loc>
    </url><url>
        <loc>https://www.itblogs.ca/blog/itblogsca-1/ultimate-guide-to-microsoft-entra-id-2026-my-real-world-take-on-identity-security-7</loc>
    </url><url>
        <loc>https://www.itblogs.ca/blog/itblogsca-1/certifications-wont-save-your-career-skills-will-my-honest-take-5</loc>
    </url><url>
        <loc>https://www.itblogs.ca/blog/itblogsca-1/why-it-problems-are-rarely-tool-problems-4</loc>
    </url><url>
        <loc>https://www.itblogs.ca/blog/itblogsca-1/email-security-explained-without-the-marketing-noise-3</loc>
    </url><url>
        <loc>https://www.itblogs.ca/blog/itblogsca-1/why-disabling-legacy-authentication-is-critical-for-your-security-in-2025-2</loc>
    </url><url>
        <loc>https://www.itblogs.ca/blog/itblogsca-1/zero-trust-security-explained-a-practical-guide-for-small-medium-businesses-1</loc>
    </url><url>
        <loc>https://www.itblogs.ca/blog/news-2/microsoft-entra-mfa-conditional-access-changes-14</loc>
    </url>
</urlset>