<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://www.preludesecurity.com</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/internal/style-guide</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/internal/component-library</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/platform/security-control-monitoring</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/platform/security-control-validation</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/platform/integrations</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/company/careers</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/company/vision</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/get-started</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/learn</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/platform/updates</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/company/press</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/legal/privacy</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/legal/toms</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/legal/ai-user-guidelines</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/legal/data-privacy-faq</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/legal/standard-contractual-clauses</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/legal/sub-processor-list</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/info/control-monitoring</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/info/seeing-red</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/pricing</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/info/darknet</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/platform/endpoint-security</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/runtime-memory-protection</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/info/blackhat</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/legal/evaluation-terms</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/info/exposure-management</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/info/security-validation</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/info/cyber-risk</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/info/cyber-insurance-readiness</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/info/falcon</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/info/activate-your-intel-hardware-with-prelude</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/solutions/it-management</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/solutions/security-operations</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/solutions/risk-management</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/blog</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/blog/adapting-security-controls-in-the-evolving-threat-landscape</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/blog/aligning-technical-security-controls-to-nist</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/blog/announcing-additional-16-million-investment</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/blog/announcing-our-2024-partnership-with-flying-lizard-motorsports</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/blog/battling-threat-intelligence-decay</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/blog/better-security-starts-with-aggregating-your-asset-inventory</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/blog/common-mistakes-in-cybersecurity-board-reporting</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/blog/configuring-entra-id</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/blog/continuing-the-prelude-mission-through-our-24mm-series-a-financing</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/blog/continuous-threat-exposure-management-ctem-program</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/blog/crowdstrike-reduced-functionality-mode-rfm</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/blog/default-device-compliance-policy-is-actove-not-compliant-intune</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/blog/dkim-and-dmarc-settings-in-microsoft-365</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/blog/edr-prevention-policies</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/blog/essential-identity-and-access-management-metrics</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/blog/event-tracing-for-windows-etw-your-friendly-neighborhood-ipc-mechanism</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/blog/fireside-chat-with-matt-hand</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/blog/free-trial-control-monitoring</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/blog/hardening-google-workspace-email</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/blog/how-below-the-os-security-protections-work</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/blog/how-intel-hardware-capabilities-enable-better-software-security</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/blog/how-it-asset-management-enhances-syber-security</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/blog/how-to-configure-attack-surface-reduction-rules-in-microsoft-intune</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/blog/how-to-configure-disk-encryption-policy-in-microsoft-intune</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/blog/how-to-find-endpoints-not-onboarded-to-microsoft-defender-for-endpoint-mde</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/blog/how-to-find-unmanaged-and-byod-devices</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/blog/how-to-maximize-anti-phishing-settings-in-microsoft-365</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/blog/how-to-structure-entra-id-groups-for-scalable-access-management</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/blog/implementing-entra-id-groups</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/blog/introducing-our-newest-ai-capability-transforming-threat-intelligence-into-instant-threat-hunts</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/blog/introducing-support-for-vulnerability-management-tools</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/blog/intune-default-device-compliance-policy</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/blog/justify-security-control-investments</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/blog/key-risks-of-deploying-local-agents</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/blog/leveraging-entra-id-groups-in-prelude-to-visualize-your-security-posture</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/blog/make-cyber-insurance-more-than-security-theater</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/blog/microsoft-defender-passive-mode</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/blog/mitre-and-prelude-announce-partnership-to-offer-advanced-cybersecurity-for-small-and-mid-sized-organizations</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/blog/prelude-welcomes-pete-constantine-as-vp-of-product</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/blog/prelude-wins-top-infosec-innovator-award</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/blog/questions-people-are-asking-about-their-edr-tools</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/blog/sans-detection-and-response-survey</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/blog/scattered-spiders-2025-cyberattacks-on-uk-retailers</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/blog/security-question-answers</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/blog/test-driven-development-detection-engineering</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/blog/the-ritualization-of-infosec</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/blog/time-for-the-next-generation-of-endpoint-security</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/blog/turn-threat-intelligence-into-validated-protections</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/blog/understanding-conditional-access-policies-in-entra-id</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/blog/understanding-intel-hardware-security-options</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/blog/understanding-mitre-attack-mapping</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/blog/volume-shadow-copy-protection-in-crowdstrike</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/blog/what-the-fork-exploring-telemetry-gaps-in-microsofts-4688-event</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/blog/whats-the-difference-between-entra-joined-and-registered-devices</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/blog/why-cyber-insurance-claims-get-rejected</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/tag/announcements</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/tag/artificial-intelligence</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/tag/company</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/tag/control-monitoring</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/tag/control-validation</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/tag/crowdstrike</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/tag/editor-pick</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/tag/email-security</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/tag/endpoint-security</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/tag/engineering</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/tag/google</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/tag/hardware-security</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/tag/identity-access-management</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/tag/intel</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/tag/microsoft</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/tag/platform</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/tag/risk-management</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/tag/security</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/tag/security-research</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/tag/security-testing</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/tag/threat-detection</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/tag/threat-intelligence</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/tag/verified-security-tests</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/tag/vulnerability-management</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/learn/activating-your-intel-hardware-security-capabilities-with-prelude</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/learn/analysis-to-action</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/learn/authoring-verified-security-tests</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/learn/basics-of-a-verified-security-test-vst</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/learn/black-basta</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/learn/closing-the-execution-gap</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/learn/cti-to-assurance</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/learn/dissecting-tradecraft-building-robust-detections</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/learn/exposing-the-gaps-in-your-vulnerability-scans</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/learn/financial-services-firm-maximizes-control-efficacy</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/learn/fireside-chat-with-matt-hand</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/learn/how-your-edr-actually-works</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/learn/lemonade</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/learn/mitigating-the-risk-of-unmanaged-devices-with-prelude</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/learn/platform-tour</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/learn/platform-video</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/learn/republic-bank-of-chicago-drives-security-posture-visibility</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/learn/seeing-red</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/learn/understand-threats-in-prelude-detect-1-7-0</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/learn/whats-new-with-prelude-detect-160</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/learn/your-field-guide-to-control-validation</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/company/press/prelude-crowdstrike-funding-and-integration-announcement</loc>
    </url>
    <url>
        <loc>https://www.preludesecurity.com/company/press/prelude-security-introduces-industry-first-continuous-security-testing-solution-for-containers</loc>
    </url>
</urlset>