<?xml version="1.0" encoding="utf-8" standalone="yes"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml"><url><loc>https://symbolsecurity.com/social/twitter/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/admin-application-help/administrators/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/settings-and-integrations/billing/</loc></url><url><loc>https://symbolsecurity.com/company/team/craig-sandman/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/application-overview/cyber-risk-score/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/guides-and-quick-help/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/troubleshooting/password-resets/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/guides-and-quick-help/users/</loc></url><url><loc>https://symbolsecurity.com/social/linkedin/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/admin-application-help/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/guides-and-quick-help/campaigns/</loc></url><url><loc>https://symbolsecurity.com/company/team/antonio-pagano/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/application-overview/</loc></url><url><loc>https://symbolsecurity.com/company/team/carlos-morales/</loc></url><url><loc>https://symbolsecurity.com/social/youtube/</loc></url><url><loc>https://symbolsecurity.com/company/team/cristian-pelaez/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/settings-and-integrations/</loc></url><url><loc>https://symbolsecurity.com/company/team/andres-martinez/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/troubleshooting/</loc></url><url><loc>https://symbolsecurity.com/company/team/samuel-pinillos/</loc></url><url><loc>https://symbolsecurity.com/company/team/daniel-muriel/</loc></url><url><loc>https://symbolsecurity.com/company/team/karolaith-orozco/</loc></url><url><loc>https://symbolsecurity.com/company/team/rafael-tamara/</loc></url><url><loc>https://symbolsecurity.com/company/team/hillary-rivera/</loc></url><url><loc>https://symbolsecurity.com/company/team/manuel-perez/</loc></url><url><loc>https://symbolsecurity.com/company/team/mario-henriquez/</loc></url><url><loc>https://symbolsecurity.com/legal/ai-transparency/</loc><lastmod>2026-04-08T00:00:00+00:00</lastmod></url><url><loc>https://symbolsecurity.com/</loc><lastmod>2026-04-08T00:00:00+00:00</lastmod></url><url><loc>https://symbolsecurity.com/legal/dpa/</loc><lastmod>2026-03-06T00:00:00+00:00</lastmod></url><url><loc>https://symbolsecurity.com/legal/eula/</loc><lastmod>2026-03-06T00:00:00+00:00</lastmod></url><url><loc>https://symbolsecurity.com/legal/reseller-terms/</loc><lastmod>2026-03-06T00:00:00+00:00</lastmod></url><url><loc>https://symbolsecurity.com/legal/privacy-policy/</loc><lastmod>2026-03-06T00:00:00+00:00</lastmod></url><url><loc>https://symbolsecurity.com/legal/services/</loc><lastmod>2026-03-06T00:00:00+00:00</lastmod></url><url><loc>https://symbolsecurity.com/blog/tag/cyber-criminals/</loc><lastmod>2026-02-28T12:04:09+00:00</lastmod></url><url><loc>https://symbolsecurity.com/blog/tag/cyber-security-awareness/</loc><lastmod>2026-02-28T12:04:09+00:00</lastmod></url><url><loc>https://symbolsecurity.com/blog/cybersecurity-threats-your-employees-must-be-ready-for-in-2026/</loc><lastmod>2026-02-28T12:04:09+00:00</lastmod></url><url><loc>https://symbolsecurity.com/blog/</loc><lastmod>2026-02-28T12:04:09+00:00</lastmod></url><url><loc>https://symbolsecurity.com/tags/</loc><lastmod>2026-02-28T12:04:09+00:00</lastmod></url><url><loc>https://symbolsecurity.com/blog/tag/cyber-risk/</loc><lastmod>2026-02-28T12:02:43+00:00</lastmod></url><url><loc>https://symbolsecurity.com/blog/tag/security-awareness-training/</loc><lastmod>2026-02-28T12:02:43+00:00</lastmod></url><url><loc>https://symbolsecurity.com/blog/security-awareness-training-cost-2026-complete-pricing-guide/</loc><lastmod>2026-02-28T12:02:43+00:00</lastmod></url><url><loc>https://symbolsecurity.com/blog/7-best-phishing-simulation-tools-in-2026-expert-reviewed/</loc><lastmod>2026-02-28T12:02:05+00:00</lastmod></url><url><loc>https://symbolsecurity.com/blog/5-best-security-awareness-training-for-non-technical-employees/</loc><lastmod>2026-02-28T12:01:21+00:00</lastmod></url><url><loc>https://symbolsecurity.com/blog/tag/cyber-awareness-training/</loc><lastmod>2026-02-28T12:01:21+00:00</lastmod></url><url><loc>https://symbolsecurity.com/blog/best-security-awareness-training-tools-for-mssps-in-2026/</loc><lastmod>2026-01-29T11:59:29+00:00</lastmod></url><url><loc>https://symbolsecurity.com/blog/tag/comparison/</loc><lastmod>2026-01-29T11:59:29+00:00</lastmod></url><url><loc>https://symbolsecurity.com/blog/5-best-security-awareness-training-tools-to-prepare-for-2026/</loc><lastmod>2026-01-29T11:58:48+00:00</lastmod></url><url><loc>https://symbolsecurity.com/blog/12-cybersecurity-statistics-every-business-needs-to-know-for-2026/</loc><lastmod>2026-01-29T11:57:37+00:00</lastmod></url><url><loc>https://symbolsecurity.com/blog/24-cybersecurity-stats-for-msps-mssps-in-2026/</loc><lastmod>2026-01-29T11:57:05+00:00</lastmod></url><url><loc>https://symbolsecurity.com/blog/6-best-infosec-iq-alternatives-for-security-training/</loc><lastmod>2026-01-29T11:07:46+00:00</lastmod></url><url><loc>https://symbolsecurity.com/blog/the-6-best-metacompliance-alternatives-for-security-awareness-training/</loc><lastmod>2026-01-08T17:11:25+00:00</lastmod></url><url><loc>https://symbolsecurity.com/blog/the-4-best-mimecast-alternatives-for-security-awareness-training/</loc><lastmod>2026-01-08T17:10:02+00:00</lastmod></url><url><loc>https://symbolsecurity.com/blog/7-best-hoxhunt-alternatives/</loc><lastmod>2026-01-08T17:08:18+00:00</lastmod></url><url><loc>https://symbolsecurity.com/blog/6-best-keepnet-labs-alternatives/</loc><lastmod>2026-01-08T17:06:05+00:00</lastmod></url><url><loc>https://symbolsecurity.com/blog/the-9-best-phin-security-alternatives-for-cybersecurity-teams/</loc><lastmod>2026-01-08T17:03:55+00:00</lastmod></url><url><loc>https://symbolsecurity.com/blog/top-5-cofense-alternatives-for-security-awareness-training/</loc><lastmod>2026-01-08T17:02:14+00:00</lastmod></url><url><loc>https://symbolsecurity.com/blog/top-4-sosafe-alternatives-for-security-training/</loc><lastmod>2025-11-11T17:14:39+00:00</lastmod></url><url><loc>https://symbolsecurity.com/blog/6-best-ninjio-alternatives-for-security-training/</loc><lastmod>2025-11-11T17:11:34+00:00</lastmod></url><url><loc>https://symbolsecurity.com/blog/the-top-7-knowbe4-alternatives-for-security-awareness-training-in-2025/</loc><lastmod>2025-11-11T16:45:22+00:00</lastmod></url><url><loc>https://symbolsecurity.com/blog/the-evolution-from-security-awareness-to-human-risk-management/</loc><lastmod>2025-10-29T14:57:47+00:00</lastmod></url><url><loc>https://symbolsecurity.com/blog/the-7-core-components-of-a-security-awareness-program-that-works/</loc><lastmod>2025-10-20T13:22:31+00:00</lastmod></url><url><loc>https://symbolsecurity.com/blog/why-a-security-awareness-program-is-non-negotiable-in-2025/</loc><lastmod>2025-10-20T13:16:08+00:00</lastmod></url><url><loc>https://symbolsecurity.com/legal/terms-and-conditions/</loc><lastmod>2025-10-16T00:00:00+00:00</lastmod></url><url><loc>https://symbolsecurity.com/blog/best-free-cybersecurity-resources-for-awareness-month-2025/</loc><lastmod>2025-10-06T18:07:52+00:00</lastmod></url><url><loc>https://symbolsecurity.com/blog/the-power-of-microlearning-in-security-awareness-training/</loc><lastmod>2025-10-02T20:27:28+00:00</lastmod></url><url><loc>https://symbolsecurity.com/blog/7-common-security-mistakes-your-employees-are-making/</loc><lastmod>2025-10-02T20:19:47+00:00</lastmod></url><url><loc>https://symbolsecurity.com/blog/10-critical-security-awareness-topics-every-employee-should-know/</loc><lastmod>2025-09-26T15:11:23+00:00</lastmod></url><url><loc>https://symbolsecurity.com/blog/what-is-an-insider-threat-a-guide-for-businesses/</loc><lastmod>2025-09-23T19:57:19+00:00</lastmod></url><url><loc>https://symbolsecurity.com/blog/benefits-of-security-awareness-training-for-organizations/</loc><lastmod>2025-09-23T19:56:50+00:00</lastmod></url><url><loc>https://symbolsecurity.com/blog/creating-your-annual-security-awareness-training-plan/</loc><lastmod>2025-09-23T19:56:07+00:00</lastmod></url><url><loc>https://symbolsecurity.com/blog/building-a-security-first-culture-beyond-the-compliance-checklist/</loc><lastmod>2025-09-22T14:54:48+00:00</lastmod></url><url><loc>https://symbolsecurity.com/blog/how-24-7-darknet-monitoring-turned-a-credential-leak-into-a-security-win/</loc><lastmod>2025-08-08T19:57:57+00:00</lastmod></url><url><loc>https://symbolsecurity.com/blog/symbol-security-and-powerpsa-partner-to-boost-msp-cyber-capabilities/</loc><lastmod>2025-03-12T15:55:32+00:00</lastmod></url><url><loc>https://symbolsecurity.com/blog/symbol-and-aura-personal-cyber/</loc><lastmod>2024-07-25T13:29:02+00:00</lastmod></url><url><loc>https://symbolsecurity.com/legal/modern-slavery-and-human-trafficking-statement/</loc><lastmod>2024-02-07T00:00:00+00:00</lastmod></url><url><loc>https://symbolsecurity.com/blog/what-is-an-authentic-security-awareness-training-program/</loc><lastmod>2023-06-14T21:30:13+00:00</lastmod></url><url><loc>https://symbolsecurity.com/blog/where-security-training-falls-short/</loc><lastmod>2023-06-14T21:30:05+00:00</lastmod></url><url><loc>https://symbolsecurity.com/blog/welcome-to-symbol-security/</loc><lastmod>2023-06-14T21:29:58+00:00</lastmod></url><url><loc>https://symbolsecurity.com/blog/top-five-ways-to-improve-your-personal-cybersecurity/</loc><lastmod>2023-06-14T21:29:49+00:00</lastmod></url><url><loc>https://symbolsecurity.com/blog/why-are-security-awareness-training-programs-doomed-to-fail/</loc><lastmod>2023-06-14T21:26:20+00:00</lastmod></url><url><loc>https://symbolsecurity.com/blog/wine-tasting-and-cyber-awareness/</loc><lastmod>2023-06-09T21:20:17+00:00</lastmod></url><url><loc>https://symbolsecurity.com/blog/winning-the-war-on-phishing-scams-wait-i-didnt-realize-i-was-in-a-war/</loc><lastmod>2021-01-01T00:00:00+00:00</lastmod></url><url><loc>https://symbolsecurity.com/blog/why-you-should-make-2020-the-year-of-cyber-security-awareness-in-your-company/</loc><lastmod>2019-12-16T11:53:21+00:00</lastmod></url><url><loc>https://symbolsecurity.com/knowledge-base/application-overview/company-schedule/data-driven-program-generation/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/guides-and-quick-help/campaigns/deprecation-of-long-campaigns-curriculums/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/admin-application-help/users/add-users-to-symbol-security/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/admin-application-help/phishing-simulation/adding-date-helpers-to-templates/</loc></url><url><loc>https://symbolsecurity.com/admin/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/admin-application-help/administrators/admin-roles-permissions/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/admin-application-help/administrators/adminuser-profile/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/settings-and-integrations/whitelisting/advanced-delivery-policies-in-microsoft-defender/</loc></url><url><loc>https://symbolsecurity.com/resources/security-awareness-calendar/april/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/admin-application-help/training/assign-training-courses-for-companies/</loc></url><url><loc>https://symbolsecurity.com/resources/security-awareness-calendar/august/</loc></url><url><loc>https://symbolsecurity.com/marketing/aura-personal-security/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/settings-and-integrations/o365m365/auto-approve-m365google-users/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/settings-and-integrations/policy-pro/automatically-generate-assessments-for-your-policies/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/settings-and-integrations/single-sign-on/azure-sso-on-symbol-security/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/application-overview/reporting/boardroom-reports-on-symbol-security/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/application-overview/users/change-symbol-security-avatar/</loc></url><url><loc>https://symbolsecurity.com/quotes/claire-hart-vp/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/application-overview/phishing-simulation/clicking-phishing-simulation-email/</loc></url><url><loc>https://symbolsecurity.com/quotes/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/admin-application-help/msp-administration/cloning-a-program-template/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/guides-and-quick-help/users/common-error-types-for-undeliverable-users/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/admin-application-help/companies/</loc></url><url><loc>https://symbolsecurity.com/company/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/admin-application-help/companies/company-groups/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/application-overview/dashboard/company-overview-home-page-statistics/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/admin-application-help/companies/company-portal-sidebar-navigation/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/application-overview/company-schedule/company-program-schedule/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/application-overview/company-schedule/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/admin-application-help/companies/companypartner-settings/</loc></url><url><loc>https://symbolsecurity.com/compare/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/settings-and-integrations/single-sign-on/configure-okta-sso/</loc></url><url><loc>https://symbolsecurity.com/contact/</loc></url><url><loc>https://symbolsecurity.com/contact/partner/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/application-overview/cyber-risk-score/corporate-cyber-risk-score/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/admin-application-help/phishing-simulation/could-i-edit-a-running-campaign/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/admin-application-help/notifications-and-preferences/customize-email-notifications-on-symbol-security/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/admin-application-help/msp-administration/customize-your-user-portal-whitelabel-feature/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/application-overview/student-portal/cyber-champs-and-symbol-gamification-how-does-it-work/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/application-overview/student-portal/cyber-champs-leaderboard-user-portal/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/admin-application-help/cyber-threat-surveillance/cyber-threat-start-now-button/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/admin-application-help/cyber-threat-surveillance/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/application-overview/cyber-threat-surveillance/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/application-overview/cyber-threat-surveillance/cyber-threat-surveillance/</loc></url><url><loc>https://symbolsecurity.com/product/cyber-threat-surveillance/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/application-overview/dashboard/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/admin-application-help/reporting/data-driven-summaries-recommendations-for-boardroom-reports/</loc></url><url><loc>https://symbolsecurity.com/quotes/david-okonkwo-compliance/</loc></url><url><loc>https://symbolsecurity.com/quotes/deana-joe-andruzzi/</loc></url><url><loc>https://symbolsecurity.com/resources/security-awareness-calendar/december/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/admin-application-help/phishing-simulation/definition-of-variables-placeholders-on-simulation-templates/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/admin-application-help/users/delete-users-from-symbol-security/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/admin-application-help/training/deleting-custom-training-assets-in-symbol-security/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/application-overview/company-schedule/delivery-settings-company-program-schedule/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/application-overview/phishing-simulation/difference-between-private-and-public-templates/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/application-overview/phishing-simulation/different-campaigns-statuses-on-symbol-security/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/application-overview/domain-and-email-threat-alerts/domain-and-email-threat-alerting-service/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/application-overview/domain-and-email-threat-alerts/</loc></url><url><loc>https://symbolsecurity.com/product/domain-threat-alerts/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/troubleshooting/phishing-simulation/domainip-whitelisting-test-in-symbol-security/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/admin-application-help/training/downloading-symbol-security-training-assets/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/admin-application-help/phishing-simulation/draft-campaigns-on-symbol/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/application-overview/phishing-simulation/dynamic-data-variables-on-simulations/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/admin-application-help/phishing-simulation/email-sending-strategies/</loc></url><url><loc>https://symbolsecurity.com/product/email-threat-alerts/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/admin-application-help/users/email-validation-for-new-users-in-symbol-security/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/troubleshooting/users/faqs-for-csv-users-import/</loc></url><url><loc>https://symbolsecurity.com/resources/security-awareness-calendar/february/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/troubleshooting/password-resets/generate-reset-password-links-for-usersadmins/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/admin-application-help/msp-administration/global-search-command-center-previous-msp-portal/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/settings-and-integrations/single-sign-on/google-sso-on-symbol-security/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/admin-application-help/phishing-simulation/how-are-emails-delivered-in-phishing-campaigns/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/application-overview/student-portal/how-could-i-download-a-certificate/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/admin-application-help/support/how-do-i-contact-symbol-security-support/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/admin-application-help/phishing-simulation/how-to-add-new-users-to-long-campaigns/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/admin-application-help/msp-administration/how-to-assign-program-templates-msps-vcisos/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/settings-and-integrations/whitelisting/how-to-bypass-spam-filtering-symbol-security/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/admin-application-help/reporting/how-to-change-summary-reports-frequency/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/application-overview/training/how-to-complete-threat-simulation-assignments/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/settings-and-integrations/phish-reporting/how-to-configure-report-a-phish-on-outlook/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/admin-application-help/phishing-simulation/how-to-create-a-campaign-on-symbol-security/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/admin-application-help/phishing-simulation/how-to-edit-long-campaigns-on-symbol/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/admin-application-help/phish-reporting/how-to-report-a-phish-on-outlook/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/admin-application-help/phishing-simulation/how-to-use-smart-training-on-campaigns/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/settings-and-integrations/msp-adminstration-api/how-to-use-the-symbol-api/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/troubleshooting/phishing-simulation/how-to-whitelist-symbol-security-urls-using-safe-links-in-microsoft-defender/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/settings-and-integrations/users/import-symbol-security-users-from-a-csv-file/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/settings-and-integrations/o365m365/invite-m365o365-managers-to-symbol-security/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/admin-application-help/administrators/invite-your-users-to-be-admins-on-symbol-security/</loc></url><url><loc>https://symbolsecurity.com/resources/security-awareness-calendar/january/</loc></url><url><loc>https://symbolsecurity.com/quotes/jason-torres-ciso/</loc></url><url><loc>https://symbolsecurity.com/resources/security-awareness-calendar/july/</loc></url><url><loc>https://symbolsecurity.com/resources/security-awareness-calendar/june/</loc></url><url><loc>https://symbolsecurity.com/quotes/karen-liu-operations/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/admin-application-help/phishing-simulation/long-campaigns-on-symbol-security-will-be-deprecated-soon/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/admin-application-help/users/m365-removal-queue/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/settings-and-integrations/o365m365/m365o365-troubleshooting/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/admin-application-help/notifications-and-preferences/manage-company-notifications/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/admin-application-help/companies/manage-leaderboard-categories/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/admin-application-help/notifications-and-preferences/manage-training-reminders/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/admin-application-help/users/manage-user-details/</loc></url><url><loc>https://symbolsecurity.com/product/managed-program-services/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/admin-application-help/companies/managing-company-products-msp-vcisos/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/admin-application-help/companies/managing-company-settingsinformation/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/settings-and-integrations/billing/managing-credit-cards-on-symbol-security/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/admin-application-help/cyber-threat-surveillance/managing-cyber-threat-keywords/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/admin-application-help/msp-administration/managing-email-blocks/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/settings-and-integrations/msp-adminstration-api/managing-msp-invoice-details/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/admin-application-help/msp-administration/msp-managing-program-templates/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/admin-application-help/phish-reporting/managing-reported-phishing-phish-alerts/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/settings-and-integrations/notifications-and-preferences/managing-user-reminders-frequency/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/settings-and-integrations/notifications-and-preferences/managing-useradmin-notifications/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/admin-application-help/users/mandatory-content-assignments/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/settings-and-integrations/msp-adminstration-api/require-mfa-to-users/</loc></url><url><loc>https://symbolsecurity.com/resources/security-awareness-calendar/march/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/admin-application-help/phishing-simulation/marking-false-positives-for-phishing-events/</loc></url><url><loc>https://symbolsecurity.com/quotes/matt-webster-harbor/</loc></url><url><loc>https://symbolsecurity.com/resources/security-awareness-calendar/may/</loc></url><url><loc>https://symbolsecurity.com/company/team/</loc></url><url><loc>https://symbolsecurity.com/quotes/michael-gray-thrive/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/admin-application-help/msp-administration/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/settings-and-integrations/msp-adminstration-api/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/admin-application-help/msp-administration/mspvciso-campaigns/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/admin-application-help/msp-administration/mspvciso-companies-management/</loc></url><url><loc>https://symbolsecurity.com/partners/mssp/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/admin-application-help/companies/new-customer-onboarding-tracker/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/admin-application-help/notifications-and-preferences/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/settings-and-integrations/notifications-and-preferences/</loc></url><url><loc>https://symbolsecurity.com/resources/security-awareness-calendar/november/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/settings-and-integrations/o365m365/</loc></url><url><loc>https://symbolsecurity.com/resources/security-awareness-calendar/october/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/guides-and-quick-help/reporting/outlook-report-a-phish-button-v2/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/admin-application-help/users/paused-users-on-symbol-security/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/admin-application-help/phish-reporting/phish-alert-reports/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/admin-application-help/phish-reporting/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/settings-and-integrations/phish-reporting/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/admin-application-help/phish-reporting/phish-reporting-and-reporting-suspicious-emails/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/admin-application-help/phishing-simulation/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/application-overview/phishing-simulation/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/troubleshooting/phishing-simulation/</loc></url><url><loc>https://symbolsecurity.com/product/phishing-simulation/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/admin-application-help/phishing-simulation/phishing-simulation-templates-overview-and-management/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/admin-application-help/policy-pro/policy-assessments-on-symbol-security/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/guides-and-quick-help/policy-pro/policy-assignments/</loc></url><url><loc>https://symbolsecurity.com/product/policy-pro/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/admin-application-help/policy-pro/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/guides-and-quick-help/policy-pro/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/settings-and-integrations/policy-pro/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/admin-application-help/policy-pro/policy-storage-integration/</loc></url><url><loc>https://symbolsecurity.com/product/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/application-overview/company-schedule/program-corrective-workflows/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/application-overview/company-schedule/program-stakeholders-in-symbol-security/</loc></url><url><loc>https://symbolsecurity.com/quotes/rachel-simmons-vp/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/admin-application-help/reporting/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/application-overview/reporting/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/guides-and-quick-help/reporting/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/admin-application-help/phishing-simulation/request-a-new-phishing-template/</loc></url><url><loc>https://symbolsecurity.com/resources/cyber-insurance-and-cybersecurity/</loc></url><url><loc>https://symbolsecurity.com/resources/cyber-secure-culture-resources/</loc></url><url><loc>https://symbolsecurity.com/resources/dark-web-exposure-report/</loc></url><url><loc>https://symbolsecurity.com/resources/domain-impersonation-scanner/</loc></url><url><loc>https://symbolsecurity.com/resources/security-awareness-training-tco-calculator/</loc></url><url><loc>https://symbolsecurity.com/resources/</loc></url><url><loc>https://symbolsecurity.com/partners/sales/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/application-overview/company-schedule/schedule-approval-workflow-in-symbol-security/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/search/</loc></url><url><loc>https://symbolsecurity.com/resources/security-awareness-calendar/</loc></url><url><loc>https://symbolsecurity.com/product/security-awareness-training/</loc></url><url><loc>https://symbolsecurity.com/resources/security-awareness-calendar/september/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/admin-application-help/administrators/setting-up-managers-and-manager-training-reminders/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/admin-application-help/phish-reporting/setting-up-microsoft-report-phishing-button-in-outlook/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/admin-application-help/phishing-simulation/short-campaigns-symbol-security/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/guides-and-quick-help/campaigns/short-campaigns-auto-refresh/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/guides-and-quick-help/sid-symbol-inbox-delivery/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/settings-and-integrations/o365m365/sid-symbol-inbox-delivery/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/settings-and-integrations/single-sign-on/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/settings-and-integrations/single-sign-on/single-sign-on-sso-configuration/</loc></url><url><loc>https://symbolsecurity.com/social/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/admin-application-help/msp-administration/steps-to-take-in-deleting-a-company-msp-vcisos/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/application-overview/student-portal/</loc></url><url><loc>https://symbolsecurity.com/quotes/sudeep-unhale-motus/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/admin-application-help/reporting/summary-report-emails/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/admin-application-help/support/</loc></url><url><loc>https://symbolsecurity.com/marketing/symbol-and-aura/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/settings-and-integrations/whitelisting/symbol-allowlisting-scripts-microsoft/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/guides-and-quick-help/sid-symbol-inbox-delivery/symbol-inbox-delivery-sid-the-secure-way-to-ensure-phishing-simulation-delivery/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/settings-and-integrations/whitelisting/symbol-security-barracuda-whitelisting-help-doc/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/application-overview/phishing-simulation/symbol-security-campaign-schedule/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/application-overview/training/symbol-security-training-assets/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/admin-application-help/training/symbol-security-training-libraries/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/settings-and-integrations/o365m365/synced-users-matching/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/settings-and-integrations/o365m365/synchronize-groups-and-managers-from-o365google/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/settings-and-integrations/o365m365/synchronize-symbol-users-with-m365entra-id/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/settings-and-integrations/o365m365/synchronize-symbol-users-with-your-google-workspace/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/application-overview/phishing-simulation/templates-click-rate/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/admin-application-help/phishing-simulation/threat-simulations-on-symbol-security/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/application-overview/reporting/track-campaign-statistics/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/application-overview/reporting/track-training-statistics/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/admin-application-help/reporting/tracking-user-activity-and-events/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/admin-application-help/training/train-your-new-users-on-symbol-security/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/admin-application-help/training/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/application-overview/training/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/admin-application-help/training/training-course-assignments/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/settings-and-integrations/notifications-and-preferences/two-factor-authentication/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/guides-and-quick-help/users/two-factor-authentication-2fa-recovery-codes/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/guides-and-quick-help/users/understanding-googleentra-id-synchronization-in-symbol-security/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/admin-application-help/administrators/updated-reporting-admin-permissions/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/admin-application-help/msp-administration/upload-custom-training-content-msp-and-vcisos-only/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/admin-application-help/users/user-limit-on-yearly-subscriptions/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/admin-application-help/phish-reporting/user-phish-alert-notifications-on-symbol/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/admin-application-help/users/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/application-overview/users/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/settings-and-integrations/users/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/troubleshooting/users/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/admin-application-help/phishing-simulation/using-custom-variables-on-phishing-campaigns/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/guides-and-quick-help/campaigns/using-phishing-simulation-landing-pages/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/settings-and-integrations/notifications-and-preferences/using-strong-passwords-on-symbol-security/</loc></url><url><loc>https://symbolsecurity.com/partners/vciso/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/admin-application-help/phishing-simulation/what-is-a-placeholder-tag/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/application-overview/phishing-simulation/whats-the-sender-name/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/settings-and-integrations/whitelisting/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/settings-and-integrations/whitelisting/whitelisting-ips-and-anti-spam-filtering/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/settings-and-integrations/whitelisting/whitelisting-symbol-ips/</loc></url><url><loc>https://symbolsecurity.com/knowledge-base/troubleshooting/phishing-simulation/why-users-are-not-receiving-phishing-emails/</loc></url></urlset>