<?xml version="1.0" encoding="UTF-8"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1"><url><loc>https://www.365insights.blog/blog</loc><lastmod>2025-12-14T17:27:39.000Z</lastmod><priority>0.5</priority></url><url><loc>https://www.365insights.blog</loc><lastmod>2025-12-14T17:27:39.000Z</lastmod><priority>1.0</priority></url><url><loc>https://www.365insights.blog/tips-for-manda-tenant-to-tenant-migration</loc><lastmod>2025-12-14T17:27:39.000Z</lastmod><priority>0.5</priority></url><url><loc>https://www.365insights.blog/microsoft-365-exchange-online-domain-transfers-validation-phase-part-ii</loc><lastmod>2025-12-14T17:27:39.000Z</lastmod><priority>0.5</priority></url><url><loc>https://www.365insights.blog/best-practices-for-microsoft-365-domain-moves</loc><lastmod>2025-12-14T17:27:39.000Z</lastmod><priority>0.5</priority></url><url><loc>https://www.365insights.blog/httpspractical365comexploring-microsoft-solutions-for-multi-tenant-management</loc><lastmod>2025-12-14T17:27:39.000Z</lastmod><priority>0.5</priority></url><url><loc>https://www.365insights.blog/identity-threat-prevention-essentials-in-itdr</loc><lastmod>2025-12-14T17:27:39.000Z</lastmod><priority>0.5</priority></url><url><loc>https://www.365insights.blog/protecting-ad-against-compromise-new-teams-features-and-microsofts-greg-taylor-joins-us-to-talk-tec-the-practical-365-podcast-s4-e1</loc><lastmod>2025-12-14T17:27:39.000Z</lastmod><priority>0.5</priority></url><url><loc>https://www.365insights.blog/microsoft-365-exchange-online-domain-transfers-strategy-phase</loc><lastmod>2025-12-14T17:27:39.000Z</lastmod><priority>0.5</priority></url><url><loc>https://www.365insights.blog/how-to-build-a-stronger-identity-security-posture-with-itdr-strategies</loc><lastmod>2025-12-14T17:27:39.000Z</lastmod><priority>0.5</priority></url><url><loc>https://www.365insights.blog/five-reasons-to-leverage-saas-for-all-your-tenant-to-tenant-and-active-directory-hybrid-migration-projects</loc><lastmod>2025-12-14T17:27:39.000Z</lastmod><priority>0.5</priority></url><url><loc>https://www.365insights.blog/unpacking-microsofts-2025-digital-defense-report-10-key-takeaways-for-msps</loc><lastmod>2025-12-14T17:27:39.000Z</lastmod><priority>0.5</priority></url><url><loc>https://www.365insights.blog/7-best-sharepoint-backup-solutions-for-msps-secure-microsoft-365-data</loc><lastmod>2025-12-14T17:27:39.000Z</lastmod><priority>0.5</priority></url><url><loc>https://www.365insights.blog/new-silicon-with-racks-ai-infrastructure-announcements-from-microsoft-ignite-2023</loc><lastmod>2025-12-14T17:27:39.000Z</lastmod><priority>0.5</priority></url><url><loc>https://www.365insights.blog/about</loc><lastmod>2025-12-14T17:27:39.000Z</lastmod><priority>0.5</priority></url><url><loc>https://www.365insights.blog/podcasts</loc><lastmod>2025-12-14T17:27:39.000Z</lastmod><priority>0.5</priority></url><url><loc>https://www.365insights.blog/the-story-behind-syncro-snapshot</loc><lastmod>2025-12-14T17:27:39.000Z</lastmod><priority>0.5</priority></url><url><loc>https://www.365insights.blog/rethinking-password-security-key-takeaways-from-nists-2024-guidelines</loc><lastmod>2025-12-14T17:27:39.000Z</lastmod><priority>0.5</priority></url><url><loc>https://www.365insights.blog/microsoft-365-exchange-online-domain-transfers-validation-phase-part-i</loc><lastmod>2025-12-14T17:27:39.000Z</lastmod><priority>0.5</priority></url><url><loc>https://www.365insights.blog/microsoft-on-protecting-identity-the-core-of-your-digital-ecosystem-the-practical-365-podcast-s4-e18</loc><lastmod>2025-12-14T17:27:39.000Z</lastmod><priority>0.5</priority></url><url><loc>https://www.365insights.blog/exchange-online-changes-copilot-viva-plus-identity-migration-with-becky-cross-the-practical-365-podcast-s4-e14</loc><lastmod>2025-12-14T17:27:39.000Z</lastmod><priority>0.5</priority></url><url><loc>https://www.365insights.blog/has-the-hafnium-attack-made-on-premises-exchange-too-risky-to-maintain</loc><lastmod>2025-12-14T17:27:39.000Z</lastmod><priority>0.5</priority></url><url><loc>https://www.365insights.blog/a-solutions-guide-to-new-directory-synchronization-capabilities-offered-in-quest-on-demand-migration</loc><lastmod>2025-12-14T17:27:39.000Z</lastmod><priority>0.5</priority></url><url><loc>https://www.365insights.blog/mastering-itdr-response-insights-from-microsofts-andy-jaw-the-practical-365-podcast-s4-e20</loc><lastmod>2025-12-14T17:27:39.000Z</lastmod><priority>0.5</priority></url><url><loc>https://www.365insights.blog/navigating-microsofts-new-csp-security-requirements-and-how-syncro-can-help</loc><lastmod>2025-12-14T17:27:39.000Z</lastmod><priority>0.5</priority></url><url><loc>https://www.365insights.blog/the-sophos-state-of-ransomware-2023-report</loc><lastmod>2025-12-14T17:27:39.000Z</lastmod><priority>0.5</priority></url><url><loc>https://www.365insights.blog/microsoft-teams-backup-complete-guide-for-msps-it-leaders-and-compliance</loc><lastmod>2025-12-14T17:27:39.000Z</lastmod><priority>0.5</priority></url><url><loc>https://www.365insights.blog/notes-from-the-field-on-finding-use-cases-and-business-value-from-ai-the-practical-365-podcast-s4-e9</loc><lastmod>2025-12-14T17:27:39.000Z</lastmod><priority>0.5</priority></url><url><loc>https://www.365insights.blog/celebrating-25-years-of-active-directory</loc><lastmod>2025-12-14T17:27:39.000Z</lastmod><priority>0.5</priority></url><url><loc>https://www.365insights.blog/blog-post</loc><lastmod>2025-12-14T17:27:39.000Z</lastmod><priority>0.5</priority></url><url><loc>https://www.365insights.blog/microsoft-365-exchange-online-domain-transfers-analysis-phase</loc><lastmod>2025-12-14T17:27:39.000Z</lastmod><priority>0.5</priority></url><url><loc>https://www.365insights.blog/an-insiders-look-into-storm-0558-with-microsofts-alex-weinert</loc><lastmod>2025-12-14T17:27:39.000Z</lastmod><priority>0.5</priority></url><url><loc>https://www.365insights.blog/recap-of-the-experts-conference-2023-insights-from-alex-crowthers-keynote</loc><lastmod>2025-12-14T17:27:39.000Z</lastmod><priority>0.5</priority></url><url><loc>https://www.365insights.blog/excel-calculators-for-streamlined-exchange-mailbox-and-onedrive-migrations</loc><lastmod>2025-12-14T17:27:39.000Z</lastmod><priority>0.5</priority></url><url><loc>https://www.365insights.blog/five-pitfalls-to-avoid-during-a-microsoft-365-cross-tenant-migration</loc><lastmod>2025-12-14T17:27:39.000Z</lastmod><priority>0.5</priority></url><url><loc>https://www.365insights.blog/what-is-cybersecurity-mesh-architecture-and-why-should-you-care</loc><lastmod>2025-12-14T17:27:39.000Z</lastmod><priority>0.5</priority></url><url><loc>https://www.365insights.blog/managing-manda-cyber-security-risks</loc><lastmod>2025-12-14T17:27:39.000Z</lastmod><priority>0.5</priority></url><url><loc>https://www.365insights.blog/httpspractical365comheard-at-tec-mastering-the-art-of-power-bi-migrations-using-development-pipelines</loc><lastmod>2025-12-14T17:27:39.000Z</lastmod><priority>0.5</priority></url><url><loc>https://www.365insights.blog/microsoft-teams-unbundled-in-europe-ad-cybersecurity-tips-from-justin-kohler-and-the-latest-news-the-practical-365-podcast-s4-e3</loc><lastmod>2025-12-14T17:27:39.000Z</lastmod><priority>0.5</priority></url><url><loc>https://www.365insights.blog/rmm-20-why-msps-need-xmm-to-master-microsoft-365-cloud-and-identity</loc><lastmod>2025-12-14T17:27:39.000Z</lastmod><priority>0.5</priority></url><url><loc>https://www.365insights.blog/the-essential-role-of-promptbooks-in-microsoft-copilot-for-security</loc><lastmod>2025-12-14T17:27:39.000Z</lastmod><priority>0.5</priority></url><url><loc>https://www.365insights.blog/cyber-roundtable-with-microsofts-alex-weinert-on-storm-0558-and-identity-protection-plus-the-new-teams-and-exchange-security-the-practical-365-podcast</loc><lastmod>2025-12-14T17:27:39.000Z</lastmod><priority>0.5</priority></url><url><loc>https://www.365insights.blog/microsoft-security-copilot-ais-role-in-revolutionizing-cybersecurity-the-practical-365-podcast-s4-e29</loc><lastmod>2025-12-14T17:27:39.000Z</lastmod><priority>0.5</priority></url><url><loc>https://www.365insights.blog/5-tips-for-planning-an-exchange-online-migration</loc><lastmod>2025-12-14T17:27:39.000Z</lastmod><priority>0.5</priority></url><url><loc>https://www.365insights.blog/why-iam-leaders-must-prioritize-identity-threat-detection-and-response-in-2024</loc><lastmod>2025-12-14T17:27:39.000Z</lastmod><priority>0.5</priority></url><url><loc>https://www.365insights.blog/how-to-convert-azure-b2b-guest-users-to-members-while-maintaining-user-collaboration-post</loc><lastmod>2025-12-14T17:27:39.000Z</lastmod><priority>0.5</priority></url><url><loc>https://www.365insights.blog/five-best-practices-for-microsoft-365-exchange-online-domain-transfers</loc><lastmod>2025-12-14T17:27:39.000Z</lastmod><priority>0.5</priority></url><url><loc>https://www.365insights.blog/mastering-promptbooks-in-microsoft-copilot-for-security-best-practices-key-takeaways-and-pro-tips</loc><lastmod>2025-12-14T17:27:39.000Z</lastmod><priority>0.5</priority></url><url><loc>https://www.365insights.blog/beware-the-shadows-of-active-directory-cyber-security-horror-stories-with-sean-metcalf-the-practical-365-podcast-s4-e7</loc><lastmod>2025-12-14T17:27:39.000Z</lastmod><priority>0.5</priority></url><url><loc>https://www.365insights.blog/cloud-security-news-ai-copilots-and-more-the-practical-365-podcast-s4-e16</loc><lastmod>2025-12-14T17:27:39.000Z</lastmod><priority>0.5</priority></url><url><loc>https://www.365insights.blog/the-truth-about-tenant-to-tenant-teams-migrations</loc><lastmod>2025-12-14T17:27:39.000Z</lastmod><priority>0.5</priority></url><url><loc>https://www.365insights.blog/the-resilient-evolution-of-active-directory-its-alive-and-kicking</loc><lastmod>2025-12-14T17:27:39.000Z</lastmod><priority>0.5</priority></url><url><loc>https://www.365insights.blog/resilience-and-generative-ai-key-takeaways-from-black-hat-usa-2023</loc><lastmod>2025-12-14T17:27:39.000Z</lastmod><priority>0.5</priority></url><url><loc>https://www.365insights.blog/secure-that-active-directory-migration</loc><lastmod>2025-12-14T17:27:39.000Z</lastmod><priority>0.5</priority></url><url><loc>https://www.365insights.blog/entra-conditional-access-explained-policies-features-and-benefits</loc><lastmod>2025-12-14T17:27:39.000Z</lastmod><priority>0.5</priority></url><url><loc>https://www.365insights.blog/navigating-the-response-phase-of-identity-threat-detection-and-response-itdr</loc><lastmod>2025-12-14T17:27:39.000Z</lastmod><priority>0.5</priority></url><url><loc>https://www.365insights.blog/why-microsoft-365-backup-is-essential-for-every-business</loc><lastmod>2025-12-14T17:27:39.000Z</lastmod><priority>0.5</priority></url><url><loc>https://www.365insights.blog/improving-your-ad-security-with-derek-melber-the-practical-365-podcast-s04-e25</loc><lastmod>2025-12-14T17:27:39.000Z</lastmod><priority>0.5</priority></url><url><loc>https://www.365insights.blog/microsoft-365-copilot-ga-what-happened-at-tec-ignite-is-back-and-more-the-practical-365-podcast-s4-e5</loc><lastmod>2025-12-14T17:27:39.000Z</lastmod><priority>0.5</priority></url><url><loc>https://www.365insights.blog/microsoft-platform-management-5-mistakes-to-avoid-when-planning-an-exchange-online-migration</loc><lastmod>2025-12-14T17:27:39.000Z</lastmod><priority>0.5</priority></url><url><loc>https://www.365insights.blog/inside-syncro-xmm-an-introduction-to-the-companys-next-gen-it-management-platform</loc><lastmod>2025-12-14T17:27:39.000Z</lastmod><priority>0.5</priority></url><url><loc>https://www.365insights.blog/syncro-snapshot-launch-recap-a-free-zero-friction-microsoft-365-security-assessment-for-msps</loc><lastmod>2025-12-14T17:27:39.000Z</lastmod><priority>0.5</priority></url><url><loc>https://www.365insights.blog/microsofts-security-stumble-and-ad-modernization-insights-the-practical-365-podcast-s4-e22</loc><lastmod>2025-12-14T17:27:39.000Z</lastmod><priority>0.5</priority></url><url><loc>https://www.365insights.blog/the-cloud-whisperers-on-the-move-again-ep-24</loc><lastmod>2025-12-14T17:27:39.000Z</lastmod><priority>0.5</priority></url><url><loc>https://www.365insights.blog/backup-3-2-1-rule-what-it-is-why-it-matters-and-how-to-apply-it</loc><lastmod>2025-12-14T17:27:39.000Z</lastmod><priority>0.5</priority></url><url><loc>https://www.365insights.blog/ai-security-and-safety-microsoft-gives-us-their-expert-view-plus-copilot-goes-far-and-wide-the-practical-365-podcast-s4-e12</loc><lastmod>2025-12-14T17:27:39.000Z</lastmod><priority>0.5</priority></url><url><loc>https://www.365insights.blog/tenant-to-tenant-power-bi-migration</loc><lastmod>2025-12-14T17:27:39.000Z</lastmod><priority>0.5</priority></url><url><loc>https://www.365insights.blog/unlocking-the-truth-about-bring-your-own-key-byok-in-cloud-backup-and-recovery</loc><lastmod>2025-12-14T17:27:39.000Z</lastmod><priority>0.5</priority></url><url><loc>https://www.365insights.blog/5-essentials-to-strengthen-and-sustain-your-microsoft-365-security-posture</loc><lastmod>2025-12-14T17:27:39.000Z</lastmod><priority>0.5</priority></url><url><loc>https://www.365insights.blog/news</loc><lastmod>2025-12-14T17:27:39.000Z</lastmod><priority>0.5</priority></url></urlset>