<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="/__sitemap__/style.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
    <url>
        <loc>https://defencemore.com/</loc>
    </url>
    <url>
        <loc>https://defencemore.com/about-us</loc>
    </url>
    <url>
        <loc>https://defencemore.com/blog</loc>
    </url>
    <url>
        <loc>https://defencemore.com/case-studies</loc>
    </url>
    <url>
        <loc>https://defencemore.com/contact-us</loc>
    </url>
    <url>
        <loc>https://defencemore.com/one-click-audit</loc>
    </url>
    <url>
        <loc>https://defencemore.com/our-team</loc>
    </url>
    <url>
        <loc>https://defencemore.com/blog/analysis-of-security-audit-log-in-sap</loc>
        <lastmod>2024-12-11</lastmod>
    </url>
    <url>
        <loc>https://defencemore.com/blog/are-your-systems-really-secure</loc>
        <lastmod>2023-11-21</lastmod>
    </url>
    <url>
        <loc>https://defencemore.com/blog/critical-sap-vulnerability-cve-2023-40309</loc>
        <lastmod>2024-08-07</lastmod>
    </url>
    <url>
        <loc>https://defencemore.com/blog/getting-files-from-local-pc-via-sap-gui-with-illegal-methods</loc>
        <lastmod>2024-08-06</lastmod>
    </url>
    <url>
        <loc>https://defencemore.com/blog/how-to-capture-data-changes-in-sap-security-logs</loc>
        <lastmod>2024-11-22</lastmod>
    </url>
    <url>
        <loc>https://defencemore.com/blog/listing-of-sap-open-ports</loc>
        <lastmod>2024-11-28</lastmod>
    </url>
    <url>
        <loc>https://defencemore.com/blog/sap-abap-program-authorization-group-table</loc>
        <lastmod>2025-02-20</lastmod>
    </url>
    <url>
        <loc>https://defencemore.com/blog/sap-audit-event-type-codes-for-data-updates</loc>
        <lastmod>2024-12-05</lastmod>
    </url>
    <url>
        <loc>https://defencemore.com/blog/sap-authorization-objects-and-critical-tables</loc>
        <lastmod>2024-08-21</lastmod>
    </url>
    <url>
        <loc>https://defencemore.com/blog/sap-gui-versions-from-a-security-perspective</loc>
        <lastmod>2024-08-07</lastmod>
    </url>
    <url>
        <loc>https://defencemore.com/blog/sap-security-a-guide-to-secure-and-compliant-systems</loc>
        <lastmod>2024-12-27</lastmod>
    </url>
    <url>
        <loc>https://defencemore.com/blog/sap-security-analyst</loc>
        <lastmod>2025-03-18</lastmod>
    </url>
    <url>
        <loc>https://defencemore.com/blog/the-concept-of-parameters-in-sap-systems</loc>
        <lastmod>2024-04-05</lastmod>
    </url>
    <url>
        <loc>https://defencemore.com/blog/which-sap-security-certification-is-in-most-demand-2025</loc>
        <lastmod>2025-02-24</lastmod>
    </url>
    <url>
        <loc>https://defencemore.com/case-studies/brute-force-attack-on-predefined-accounts</loc>
    </url>
    <url>
        <loc>https://defencemore.com/case-studies/critical-rfc-authorization-vulnerability</loc>
    </url>
    <url>
        <loc>https://defencemore.com/case-studies/critical-security-note</loc>
    </url>
    <url>
        <loc>https://defencemore.com/case-studies/debug-authority-check-bypass</loc>
    </url>
    <url>
        <loc>https://defencemore.com/case-studies/dynamic-parameter-manipulation</loc>
    </url>
    <url>
        <loc>https://defencemore.com/case-studies/external-program-authorization</loc>
    </url>
    <url>
        <loc>https://defencemore.com/case-studies/hana-audit-log-disabled</loc>
    </url>
    <url>
        <loc>https://defencemore.com/case-studies/hana-backup-failure</loc>
    </url>
    <url>
        <loc>https://defencemore.com/case-studies/hana-brute-force-attack</loc>
    </url>
    <url>
        <loc>https://defencemore.com/case-studies/hana-privilege-escalation</loc>
    </url>
    <url>
        <loc>https://defencemore.com/case-studies/hr-module-authorization-vulnerability</loc>
    </url>
    <url>
        <loc>https://defencemore.com/case-studies/inactive-user-account-reactivation</loc>
    </url>
    <url>
        <loc>https://defencemore.com/case-studies/insecure-abap-code</loc>
    </url>
    <url>
        <loc>https://defencemore.com/case-studies/insecure-password-configuration</loc>
    </url>
    <url>
        <loc>https://defencemore.com/case-studies/password-hash-code-theft</loc>
    </url>
    <url>
        <loc>https://defencemore.com/case-studies/rsbdcos0-program-misuse</loc>
    </url>
    <url>
        <loc>https://defencemore.com/case-studies/sap-all-authorization-profile-misuse</loc>
    </url>
    <url>
        <loc>https://defencemore.com/case-studies/saprouter-config-modification</loc>
    </url>
    <url>
        <loc>https://defencemore.com/case-studies/saprouter-logging-disabled</loc>
    </url>
    <url>
        <loc>https://defencemore.com/case-studies/security-audit-log-disabled</loc>
    </url>
    <url>
        <loc>https://defencemore.com/case-studies/system-authorization-profile-misuse</loc>
    </url>
    <url>
        <loc>https://defencemore.com/case-studies/weak-password-length</loc>
    </url>
</urlset>
<!-- XML Sitemap generated by @nuxtjs/sitemap v6.0.0-beta.1 at 2026-04-03T17:43:29.714Z -->