<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://sdtslmn.blog/2026/02/21/vmware-dictionary-1-vmkernel/</loc><lastmod>2026-02-21T12:20:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://sdtslmn.blog/vmware-dictionary/</loc><lastmod>2026-02-21T12:10:45+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://sdtslmn.blog/2025/08/14/azure-digital-twin-series-1-what-is-azure-digital-twins/</loc><image:image><image:loc>https://sdtslmn.blog/wp-content/uploads/2025/08/create-a-high-resolution-highly-detailed-image-of-a-dynamic-digital.png</image:loc><image:title>create-a-high-resolution-highly-detailed-image-of-a-dynamic-digital</image:title></image:image><image:image><image:loc>https://sdtslmn.blog/wp-content/uploads/2025/08/image-3.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://sdtslmn.blog/wp-content/uploads/2025/08/image-2.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://sdtslmn.blog/wp-content/uploads/2025/08/image-1.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://sdtslmn.blog/wp-content/uploads/2025/08/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-08-14T06:00:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://sdtslmn.blog/2024/09/07/boosting-incident-response-capabilities-with-azure-a-practical-guide/</loc><image:image><image:loc>https://sdtslmn.blog/wp-content/uploads/2024/09/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2024-09-07T07:01:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://sdtslmn.blog/about-me-card/</loc><lastmod>2024-08-30T10:02:07+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://sdtslmn.blog/2024/07/14/achieving-it-ot-convergence-with-azure-cloud/</loc><image:image><image:loc>https://sdtslmn.blog/wp-content/uploads/2024/07/create-an-industrial-scene-showcasing-the-convergence-of-information-technology.png</image:loc><image:title>create-an-industrial-scene-showcasing-the-convergence-of-information-technology</image:title></image:image><lastmod>2024-07-14T04:16:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://sdtslmn.blog/2024/01/29/administering-vmware-using-powershell-3-advanced-powercli-scripting-for-vmware/</loc><lastmod>2024-01-29T13:46:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://sdtslmn.blog/2023/11/03/busting-cloud-myths-true-nature-of-cloud-design/</loc><image:image><image:loc>https://sdtslmn.blog/wp-content/uploads/2023/11/dallc2b7e-2023-11-02-07.39.56-photo-of-a-cloudy-sky-with-a-magnifying-glass-hovering-above-revealing-digital-circuits-and-lines-within-the-cloud-representing-the-technology-behin.png</image:loc><image:title>DALL·E 2023-11-02 07.39.56 - Photo of a cloudy sky with a magnifying glass hovering above, revealing digital circuits and lines within the cloud, representing the technology behin</image:title></image:image><image:image><image:loc>https://sdtslmn.blog/wp-content/uploads/2023/11/111.png</image:loc><image:title>111</image:title></image:image><lastmod>2023-11-03T16:51:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://sdtslmn.blog/2023/03/13/aws-and-the-12-factor-app-methodology-maximizing-efficiency-and-scalability/</loc><image:image><image:loc>https://sdtslmn.blog/wp-content/uploads/2023/03/drawing2.png</image:loc><image:title>drawing2</image:title></image:image><lastmod>2023-07-01T13:17:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://sdtslmn.blog/2023/07/01/how-to-secure-virtual-machines-in-azure/</loc><lastmod>2023-07-01T13:13:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://sdtslmn.blog/2023/06/08/azure-qa-1-what-is-azure-linux-vm-agent/</loc><lastmod>2023-06-08T14:53:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://sdtslmn.blog/2023/06/09/administering-vmware-using-powershell2-essential-powercli-cmdlets-for-efficient-vmware-management/</loc><lastmod>2023-06-08T14:30:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://sdtslmn.blog/2023/06/08/mastering-vmware-administration-with-powershell-an-introduction/</loc><lastmod>2023-06-08T13:23:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://sdtslmn.blog/powershell/</loc><lastmod>2023-06-08T13:17:24+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://sdtslmn.blog/2023/04/11/a-beginners-guide-to-azure-functions/</loc><lastmod>2023-04-11T07:59:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://sdtslmn.blog/2023/04/10/introduction-to-containerization-and-azure-container-services-1/</loc><lastmod>2023-04-10T11:51:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://sdtslmn.blog/2023/04/06/administering-azure-cloud-using-powershell-2-setting-up-your-environment-installing-azure-powershell/</loc><lastmod>2023-04-06T15:11:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://sdtslmn.blog/2023/03/26/administering-azure-cloud-using-powershell-1-introduction-to-azure-cloud-and-powershell/</loc><lastmod>2023-03-26T15:43:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://sdtslmn.blog/cybersecurity-dictionary/</loc><lastmod>2023-03-26T05:15:28+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://sdtslmn.blog/2023/02/02/protecting-windows-environment-using-powershell-1-automating-patch-management-with-powershell/</loc><lastmod>2023-03-26T05:10:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://sdtslmn.blog/2023/02/04/protecting-windows-environment-using-powershell-2-automating-patch-management-with-powershell/</loc><lastmod>2023-03-26T05:09:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://sdtslmn.blog/2023/03/04/protecting-windows-environment-using-powershell-3-using-powershell-to-protect-against-malware-and-viruses/</loc><lastmod>2023-03-26T05:09:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://sdtslmn.blog/2023/03/10/protecting-windows-environment-using-powershell-4-monitoring-and-auditing-windows-security-using-powershell/</loc><lastmod>2023-03-26T05:09:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://sdtslmn.blog/2023/03/12/protecting-windows-environment-using-powershell-5-automating-windows-security-tasks-with-powershell-scripts/</loc><lastmod>2023-03-26T05:09:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://sdtslmn.blog/2023/03/25/security-dictionary-06-network-segmentation/</loc><lastmod>2023-03-16T21:21:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://sdtslmn.blog/2023/03/17/virtual-patching-for-cybersecurity-protecting-vulnerable-systems-on-azure-platform/</loc><image:image><image:loc>https://sdtslmn.blog/wp-content/uploads/2023/03/virtualpatching.png</image:loc><image:title>virtualpatching</image:title></image:image><lastmod>2023-03-16T21:21:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://sdtslmn.blog/2023/01/10/encyclopedia-of-cybersecurity-standards-chapter-1-introduction/</loc><image:image><image:loc>https://sdtslmn.blog/wp-content/uploads/2023/01/standards.png</image:loc><image:title>standards</image:title></image:image><image:image><image:loc>https://sdtslmn.blog/wp-content/uploads/2023/01/picture1.png</image:loc><image:title>Picture1</image:title></image:image><lastmod>2023-03-13T11:19:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://sdtslmn.blog/2023/03/05/how-to-become-a-solution-architect-2-mindset/</loc><lastmod>2023-03-05T08:50:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://sdtslmn.blog/2023/01/15/how-to-become-a-solution-architect-1-skillset/</loc><image:image><image:loc>https://sdtslmn.blog/wp-content/uploads/2023/01/thearchitect.jpg</image:loc><image:title>The Architect</image:title></image:image><lastmod>2023-01-30T05:08:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://sdtslmn.blog/2023/01/20/what-is-openid-and-how-to-implement-on-azure-cloud/</loc><lastmod>2023-01-20T05:27:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://sdtslmn.blog/2023/01/13/security-dictionary-05-authorization/</loc><lastmod>2023-01-15T05:21:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://sdtslmn.blog/security-to-do-lists/</loc><lastmod>2023-01-12T22:13:46+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://sdtslmn.blog/2023/01/13/todolist-01-switch-hardening-w-commands/</loc><lastmod>2023-01-12T22:13:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://sdtslmn.blog/2023/01/12/security-dictionary-04-authentication/</loc><lastmod>2023-01-11T20:22:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://sdtslmn.blog/2023/01/11/security-dictionary-03-risk-assessment/</loc><lastmod>2023-01-11T20:22:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://sdtslmn.blog/2023/01/11/security-dictionary-02-governance/</loc><lastmod>2023-01-11T20:22:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://sdtslmn.blog/2023/01/11/security-dictionary-01-compliance/</loc><lastmod>2023-01-11T20:21:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://sdtslmn.blog</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2026-02-21T12:20:36+00:00</lastmod></url></urlset>
