<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
<url>
  <loc>https://help.kennasecurity.com/hc/en-us</loc>
  <lastmod>2026-01-15T20:29:28Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/201294445-Using-Threat-Trends</loc>
  <lastmod>2024-05-22T13:35:57Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/201483415-Keyboard-Shortcuts</loc>
  <lastmod>2024-05-22T13:27:53Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/201921738-Creating-a-Custom-Field-in-Cisco-Vulnerability-Management</loc>
  <lastmod>2024-09-10T11:55:59Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/201921758-Managing-a-Custom-Field</loc>
  <lastmod>2024-09-11T16:09:32Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/201921798-Using-Asset-Tags</loc>
  <lastmod>2024-09-10T11:55:54Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/201921878-Can-Cisco-Vulnerability-Management-import-vulnerabilities-discovered-via-manual-assessments</loc>
  <lastmod>2024-05-22T13:27:53Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/201921968-Auto-Closing-Vulnerabilities</loc>
  <lastmod>2024-09-10T11:50:25Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/201922018-How-can-Cisco-Vulnerability-Management-connect-to-security-applications-or-on-premises-tools-that-are-protected-by-a-firewall</loc>
  <lastmod>2025-07-07T23:08:58Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/201922028-What-is-a-connector-API-vs-File-based</loc>
  <lastmod>2025-07-07T23:08:58Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/201922068-Reporting-on-Asset-and-Vulnerability-Information</loc>
  <lastmod>2024-09-10T11:56:02Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/201922158-Custom-Role-Based-Access-Control</loc>
  <lastmod>2024-09-10T11:50:20Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/201922288-Using-the-Dashboard-to-manage-risk-meters</loc>
  <lastmod>2024-09-10T11:50:16Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/201922308-Quick-Filtering-of-Asset-Vulnerability-Content</loc>
  <lastmod>2024-09-10T11:50:22Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/201922338-We-have-a-SIEM-tool-in-place-why-would-we-need-Cisco-Vulnerability-Management</loc>
  <lastmod>2024-05-22T13:27:53Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/201922358-Getting-Started-with-the-API</loc>
  <lastmod>2024-10-25T17:42:16Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/201922408-What-is-a-Risk-Meter</loc>
  <lastmod>2024-09-10T11:56:00Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/201922428-Creating-False-Positive-and-Risk-Accepted-Workflows-in-Cisco-Vulnerability-Management</loc>
  <lastmod>2024-09-10T11:56:01Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/201932377-Upgrading-Your-Account-Application-Security-Module-and-Vulnerability-Intelligence</loc>
  <lastmod>2024-07-30T14:51:24Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/202010278-Risk-Meter-Reporting</loc>
  <lastmod>2024-05-22T13:35:57Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/202316078-Getting-Started-with-Cisco-Vulnerability-Management</loc>
  <lastmod>2024-09-10T11:50:20Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/202325979-Rapid7-Nexpose-On-Premises-Connector</loc>
  <lastmod>2025-07-07T23:08:58Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/204075615-Tips-Tricks-for-the-Cisco-Vulnerability-Management-Power-User</loc>
  <lastmod>2024-09-10T11:50:25Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/204133049-How-is-a-risk-meter-score-determined</loc>
  <lastmod>2024-05-22T13:35:57Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/204368699-Adding-Two-Factor-Authentication</loc>
  <lastmod>2024-05-22T13:27:53Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/205190795-How-Cisco-Vulnerability-Management-Normalizes-Vulnerability-Data-from-Multiple-Sources</loc>
  <lastmod>2024-05-22T13:27:53Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/205581819-Cisco-Vulnerability-Management-Release-Notes-and-Bug-Fixes</loc>
  <lastmod>2025-07-17T20:42:02Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/205951296-ServiceNow-Ticketing-Integration</loc>
  <lastmod>2025-07-07T23:08:58Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/206014356-WhiteHat-Sentinel-Source-Connectors</loc>
  <lastmod>2025-07-07T23:08:58Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/206280593-Cisco-Vulnerability-Management-Search-Terms</loc>
  <lastmod>2025-02-04T19:47:29Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/206379845-Why-don-t-I-see-all-of-my-assets</loc>
  <lastmod>2024-09-10T11:55:54Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/207718873-Setting-Asset-Inactivity-Limits</loc>
  <lastmod>2024-05-22T13:35:57Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/208062936-Simple-and-Complex-Search-Query-Examples</loc>
  <lastmod>2024-09-07T13:21:43Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/208213873-Implementation-Success-Guide</loc>
  <lastmod>2024-08-21T14:40:48Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/210242813-Fixes-and-Top-Fix-Groups</loc>
  <lastmod>2024-09-10T11:50:24Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/212752466-Exporting-data-from-Cisco-Vulnerability-Management</loc>
  <lastmod>2024-09-27T20:42:00Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/212869003-Understanding-Locator-Order</loc>
  <lastmod>2024-09-10T11:50:28Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/213152666-SAML-Support-in-Cisco-Vulnerability-Management-for-Single-Sign-On</loc>
  <lastmod>2024-06-04T14:03:25Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/213587066-Role-Permissions-101</loc>
  <lastmod>2024-05-22T13:27:53Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/214315206-Subdomain-IP-Whitelisting</loc>
  <lastmod>2024-05-22T13:27:53Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/218101443-Report-Subscriptions</loc>
  <lastmod>2024-09-10T11:56:02Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/115000268243-How-is-Mean-Time-to-Remediate-Calculated</loc>
  <lastmod>2024-05-22T13:27:53Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/115001476366-Asset-Scoring-in-Cisco-Vulnerability-Management</loc>
  <lastmod>2024-05-22T13:35:57Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/115003831926-How-can-I-create-risk-meters-for-infrastructure-vs-application-remediation-teams</loc>
  <lastmod>2024-05-22T13:35:57Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/115003855806-General-Guidelines-when-using-vulnerability-based-Risk-Meters</loc>
  <lastmod>2024-05-22T13:35:57Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/115004188463-How-do-I-show-the-number-of-licenses-I-am-using-against-my-license-count</loc>
  <lastmod>2024-09-10T11:50:28Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/115004190206-JIRA-Ticketing-Integration</loc>
  <lastmod>2025-07-07T23:08:58Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/115004451566-How-to-import-data-from-CSV</loc>
  <lastmod>2024-09-10T11:56:01Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/115004975866-ServiceNow-CMDB-Connector</loc>
  <lastmod>2025-07-07T23:08:58Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/115005210726-Using-Reporting-Templates</loc>
  <lastmod>2024-09-10T11:55:59Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/115005523863-QualysGuard-Vulnerability-Management</loc>
  <lastmod>2025-07-07T23:08:58Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/360000435003-Predicted-Exploits</loc>
  <lastmod>2024-09-10T11:56:02Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/360000482906-BlackDuck-Hub-Connector</loc>
  <lastmod>2025-07-07T23:08:58Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/360000862303-Asset-Prioritization-In-Cisco-Vulnerability-Management</loc>
  <lastmod>2024-05-22T13:35:57Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/360001009426-How-do-I-know-what-has-changed-in-the-API</loc>
  <lastmod>2024-04-18T17:06:04Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/360001035086-Fix-Reporting-Unique-Count-vs-Total-Count</loc>
  <lastmod>2024-09-10T11:50:24Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/360001138963-Veracode-Connectors-API-and-XML</loc>
  <lastmod>2025-07-07T23:08:58Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/360001240466-Acunetix360-Connector</loc>
  <lastmod>2025-07-15T23:30:56Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/360018335691-Tenable-SC-formerly-Security-Center-Connector</loc>
  <lastmod>2025-10-16T16:34:09Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/360019087511-Using-the-Cisco-Vulnerability-Management-Home-Page</loc>
  <lastmod>2024-09-10T11:57:31Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/360019591092-Nessus-API-Importer</loc>
  <lastmod>2025-10-20T18:23:41Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/360021484671-Application-Security-Module</loc>
  <lastmod>2024-09-10T11:57:31Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/360022931051-Why-is-it-hard-to-recreate-historical-reporting-numbers</loc>
  <lastmod>2024-05-22T13:27:53Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/360024793932-How-is-my-industry-determined-for-the-Benchmarking-Graph</loc>
  <lastmod>2024-05-22T13:35:57Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/360026160592-Vulnerability-Scoring-in-Cisco-Vulnerability-Management</loc>
  <lastmod>2024-10-11T12:21:37Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/360026413111-Data-Importer-JSON-Connector</loc>
  <lastmod>2025-07-07T23:08:58Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/360027506632-Cisco-Vulnerability-Management-and-PCI-Compliance</loc>
  <lastmod>2024-09-11T20:39:24Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/360029047771-Setting-Up-the-Agent</loc>
  <lastmod>2025-07-07T23:08:58Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/360029111331-API-Key-Generation-and-Permissions</loc>
  <lastmod>2025-01-29T19:20:51Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/360029817811-Cherwell-Ticketing-Connector</loc>
  <lastmod>2025-07-07T23:08:58Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/360029820811-Reporting-on-your-True-Risk-Score</loc>
  <lastmod>2024-09-10T11:50:23Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/360030658612-Audit-Logs</loc>
  <lastmod>2024-10-11T12:20:01Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/360032143311-Getting-data-into-Cisco-Vulnerability-Management-without-a-connector</loc>
  <lastmod>2025-07-07T23:08:58Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/360036320311-Risk-Meter-Dashboard-Overview</loc>
  <lastmod>2024-09-10T11:56:00Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/360036896731-Cisco-Vulnerability-Management-Cisco-US-Holiday-Calendar</loc>
  <lastmod>2026-01-15T20:29:28Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/360042421952-Cisco-Vulnerability-Intelligence-formerly-Kenna-VI</loc>
  <lastmod>2024-09-10T11:55:58Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/360042683071-Managing-Risk-Based-SLAs</loc>
  <lastmod>2025-05-19T21:00:41Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/360042857791-CrowdStrike-Connector-with-Spotlight</loc>
  <lastmod>2025-07-07T23:08:58Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/360042862311-April-2020-Power-User-Webinar-All-Things-Assets-Part-1</loc>
  <lastmod>2023-05-02T21:42:16Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/360043727171-Query-Syntax-Changes-June-2020</loc>
  <lastmod>2024-05-23T13:35:36Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/360044365871-Tanium-Comply-File-Based-Connector</loc>
  <lastmod>2025-07-07T23:08:58Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/360044579271-Creating-an-Effective-Change-Management-Strategy</loc>
  <lastmod>2024-05-22T13:27:53Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/360044665731-Asset-Status</loc>
  <lastmod>2024-09-10T11:50:28Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/360044778272-May-2020-Power-User-Webinar-All-Things-Assets-Part-2</loc>
  <lastmod>2023-05-02T21:43:04Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/360045221931-June-2020-Power-User-Webinar-All-Things-Assets-Part-3</loc>
  <lastmod>2023-05-02T21:48:04Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/360046968872-Getting-Started-with-Hierarchical-Risk-Meters</loc>
  <lastmod>2024-09-10T13:06:28Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/360047229572-Tokenized-Search-Terms</loc>
  <lastmod>2024-05-23T13:35:36Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/360048680251-August-2020-Power-User-Webinar-All-Things-Risk-Meters-Part-1</loc>
  <lastmod>2023-05-02T21:53:55Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/360049795492-September-2020-Power-User-Webinar-All-Things-Risk-Meters-Part-2</loc>
  <lastmod>2023-05-02T21:54:24Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/360051584791-October-2020-Power-User-Webinar-All-Things-Vulnerabilities</loc>
  <lastmod>2023-05-02T21:55:09Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/360051882851-Support-Info</loc>
  <lastmod>2024-05-22T13:27:53Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/360053128492-Sonatype-Connector</loc>
  <lastmod>2025-07-07T23:08:58Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/360054630232-Date-Syntax-Searches-Simple-date-searches-and-relative-date-searches</loc>
  <lastmod>2024-05-23T13:35:36Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/360054838671-December-2020-Power-User-Webinar-Best-Practices-for-Remediation</loc>
  <lastmod>2023-05-02T21:55:44Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/360055162251-Creating-Zendesk-Credentials</loc>
  <lastmod>2024-09-10T11:56:03Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/360055257872-Cisco-Vulnerability-Management-Support-Resources</loc>
  <lastmod>2024-05-22T13:27:53Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/360055259492-Submit-a-Sensational-Support-Ticket</loc>
  <lastmod>2024-09-10T11:55:56Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/360055501972-Cisco-Vulnerability-Management-Connector-Migration</loc>
  <lastmod>2025-07-07T23:08:58Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/360055502232-QualysWAS-Connector</loc>
  <lastmod>2025-07-07T23:08:58Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/360056630171-February-2021-Power-User-Webinar-Getting-the-Most-out-of-Data-Exports</loc>
  <lastmod>2023-05-02T21:59:43Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/360057303312--Archived-Cisco-Vulnerability-Management-Release-Notes</loc>
  <lastmod>2024-08-14T16:26:00Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/360057303591-Cisco-Status-Page</loc>
  <lastmod>2024-05-22T13:27:53Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/360057979031-Setting-up-the-Virtual-Tunnel</loc>
  <lastmod>2025-07-07T23:08:58Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/360058255132-Why-Risk-Based-Scoring</loc>
  <lastmod>2024-09-10T11:56:03Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/360059491611-March-2021-Power-User-Webinar-A-Race-Against-the-Bad-Guys-Using-Risk-Based-SLAs</loc>
  <lastmod>2023-05-02T22:00:33Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/360061052232-Prisma-Cloud-Connector</loc>
  <lastmod>2025-07-07T23:08:58Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/360061213492-How-to-Troubleshoot-Invalid-Search-Queries</loc>
  <lastmod>2024-06-04T14:04:26Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/360061266472-May-2021-Power-User-Webinar-Click-it-and-Ticket-Using-Kenna-with-Ticketing-Systems</loc>
  <lastmod>2023-05-02T22:01:18Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/360061267812-Asset-Purge-Period-Setting</loc>
  <lastmod>2024-05-22T13:35:57Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/360061623331-Why-don-t-I-see-all-assets-requiring-a-fix-in-Top-Fixes</loc>
  <lastmod>2024-05-22T13:27:53Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/4402070116116-Understanding-Vulnerability-Asset-and-Risk-Meter-Scoring</loc>
  <lastmod>2024-05-22T13:27:53Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/4402070423700-Why-Do-Some-Informational-Findings-Have-a-Score-of-Zero-and-Can-They-be-Adjusted</loc>
  <lastmod>2024-09-10T11:55:58Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/4402072747412-CVE-Score-Changes-Change-History-and-Transparency</loc>
  <lastmod>2024-05-22T13:27:53Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/4402073008660-How-do-I-Create-Edit-and-Delete-a-Risk-Meter</loc>
  <lastmod>2024-09-10T12:38:37Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/4402077700372-Cisco-Vulnerability-Management-s-Glossary-of-Acronyms</loc>
  <lastmod>2024-09-10T11:50:19Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/4402081522836-Custom-Branding-Adding-your-logo</loc>
  <lastmod>2024-09-10T13:10:14Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/4402411658260-Guidelines-for-using-Tag-Reset-and-Tag-Purge</loc>
  <lastmod>2025-07-07T23:08:58Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/4402418133396-Why-is-the-risk-meter-score-not-updating-on-the-Dashboard-or-Reports</loc>
  <lastmod>2025-10-10T19:50:29Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/4404928344468-August-2021-Power-User-Webinar-Kenna-s-Modern-Vulnerability-Management-Model-That-s-Some-Next-Level-Shift</loc>
  <lastmod>2023-05-02T22:02:03Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/4405055529236-Understanding-Multiple-Roles-per-User</loc>
  <lastmod>2024-05-22T13:27:53Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/4405101034644-Risk-Meters-for-Maintenance-and-Administration</loc>
  <lastmod>2024-05-22T13:35:57Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/4405103231380-What-happens-when-a-connector-is-deleted</loc>
  <lastmod>2025-07-07T23:08:58Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/4405109966228-Why-Two-Different-Users-May-See-Different-Asset-Vulnerability-Counts</loc>
  <lastmod>2024-05-22T13:35:57Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/4405288309524-How-to-Run-a-Connector-Configured-via-the-Agent</loc>
  <lastmod>2025-07-07T23:08:58Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/4405296082068-Importing-Prisma-Alerts-into-Cisco-Vulnerability-Management-via-the-Data-Importer</loc>
  <lastmod>2025-07-07T23:08:58Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/4406047590292-Netsparker-Connector-XML-File-Connector</loc>
  <lastmod>2025-07-07T23:08:58Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/4406049957652-MicroFocus-WebInspect-XML-Connector</loc>
  <lastmod>2025-07-07T23:08:58Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/4406056953876-BugCrowd-Connector</loc>
  <lastmod>2025-07-07T23:08:58Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/4406074693396-HackerOne-Connector</loc>
  <lastmod>2025-07-07T23:08:58Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/4406604203796-Checkmarx-Connector-API-and-XML</loc>
  <lastmod>2025-07-07T23:08:58Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/4407249464084-Implications-of-Deleting-Users</loc>
  <lastmod>2024-05-22T13:27:53Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/4407644895508-Zed-Attack-Proxy-OWASP-ZAP-XML-Connector</loc>
  <lastmod>2025-07-07T23:08:58Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/4408715317524-HCL-AppScan-XML-Connector-Standard-Cloud</loc>
  <lastmod>2025-07-07T23:08:58Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/4408715590548-HCL-AppScan-Enterprise-Connector-API</loc>
  <lastmod>2025-07-07T23:08:58Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/4408723429012-AppSpider-Connector-Page-XML-Connector-fka-NTO-Spider</loc>
  <lastmod>2025-07-07T23:08:58Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/4408785723668-BMC-Remedy-Ticketing-Integration</loc>
  <lastmod>2025-07-07T23:08:58Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/4410493385108-OpenVAS-Connector</loc>
  <lastmod>2025-07-07T23:08:58Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/4410497132820-Outpost24-Outscan-HIAB-Connector</loc>
  <lastmod>2025-07-07T23:08:58Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/4410514754836-Beyond-AVDS-Connector</loc>
  <lastmod>2025-07-07T23:08:58Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/4410859596436-November-2021-Power-User-Webinar-Uncovering-Kenna-s-APIs-Part-1</loc>
  <lastmod>2023-05-02T22:03:01Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/4411981399060-W3AF-Connector-Page</loc>
  <lastmod>2025-07-07T23:08:58Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/4411981773588-Tripwire-IP360-API-Connector-Page</loc>
  <lastmod>2025-07-07T23:08:58Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/4411989209876-Tenable-io-Connector</loc>
  <lastmod>2025-07-07T23:08:58Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/4413567084052-BurpSuite-Pro-Connector</loc>
  <lastmod>2025-07-07T23:08:58Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/4415671585684-Fortify-MicroFocus-SCA-Connector-Page</loc>
  <lastmod>2025-07-07T23:08:58Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/4416218468884-Qualys-AssetView-Connector</loc>
  <lastmod>2025-07-07T23:08:58Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/4416353530644-Cisco-Vulnerability-Management-User-Training-Videos</loc>
  <lastmod>2024-04-18T17:07:21Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/4416628232212-What-are-Application-Security-Module-Stacks</loc>
  <lastmod>2024-09-10T11:50:22Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/4416688624020-nMap-Connector</loc>
  <lastmod>2025-07-07T23:08:58Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/4416910652948-January-2022-Power-User-Webinar-Getting-Our-Hands-Dirty-With-Kenna-s-Super-Clean-APIs-Part-2</loc>
  <lastmod>2023-05-02T21:31:12Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/4417080920340-Hosted-Toolkit</loc>
  <lastmod>2025-07-07T23:08:58Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/4418253193876-Nessus-API-Importer-vs-Tenable-io-Connector-Comparison-Chart</loc>
  <lastmod>2025-07-07T23:08:58Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/4423833962516-Tenable-io-Asset-Ingestion-Limit</loc>
  <lastmod>2025-07-07T23:08:58Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/4498199030292-The-Connector-Toolkit</loc>
  <lastmod>2025-07-16T16:31:44Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/5082009843732-March-2022-Power-User-Webinar-Hello-from-the-Support-Side</loc>
  <lastmod>2023-05-02T22:04:17Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/5437591177108-March-2022-Webinar-8-Biggest-VM-Implementation-Pitfalls-And-How-to-Avoid-Them</loc>
  <lastmod>2023-05-02T21:29:11Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/6070215358100-April-2022-Power-User-Webinar-The-Magic-of-the-Kenna-Data-Importer</loc>
  <lastmod>2023-05-02T21:39:10Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/6429538551444-May-2022-Power-User-Webinar-Tool-It-Yourself-with-the-Kenna-Toolkit</loc>
  <lastmod>2023-05-02T21:39:48Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/7200294889108-June-2022-Power-User-Webinar-GitHub-Actions-to-Run-Kenna-Toolkit-Tasks</loc>
  <lastmod>2023-05-02T20:35:06Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/7259228771604-Creating-a-Custom-Field-in-the-Application-Security-Module</loc>
  <lastmod>2024-09-10T11:50:19Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/8435814363540-Managing-Application-Name-Changes-in-the-Application-Security-Module</loc>
  <lastmod>2024-04-18T16:34:50Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/8442898349332-Explore-Page-Column-Descriptions</loc>
  <lastmod>2024-05-22T13:27:53Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/8463604865428-August-2022-Power-User-Webinar-Fixology-The-Data-Science-of-Top-Fixes</loc>
  <lastmod>2023-05-02T21:33:55Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/9617582790548-License-Entitlement-FAQ</loc>
  <lastmod>2024-09-10T11:50:18Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/9742195315860-September-2022-Power-User-Webinar-To-Allow-or-Not-to-Allow-the-Risk</loc>
  <lastmod>2023-05-02T21:33:20Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/9817598738196-Microsoft-Defender-Vulnerability-Management-and-Microsoft-Defender-for-Endpoint-Connector</loc>
  <lastmod>2025-07-07T23:08:58Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/10007333180564-Setting-up-Microsoft-Azure-as-part-of-Configuring-Microsoft-Defender</loc>
  <lastmod>2025-07-07T23:08:58Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/10670799988116-Remediation-Analytics-and-Scoring</loc>
  <lastmod>2024-05-22T13:35:57Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/10739211431828-November-2022-Power-User-Webinar-Benefits-of-a-Kenna-Health-Check</loc>
  <lastmod>2023-05-02T21:32:26Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/10829825985940-Zero-Day-Vulnerability-Intelligence-powered-by-Talos</loc>
  <lastmod>2024-09-10T11:57:30Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/11032436158740-The-Cisco-Community</loc>
  <lastmod>2024-05-22T13:27:53Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/13099804122004-Navigating-Groups-in-Vulnerability-Management-Explore</loc>
  <lastmod>2024-09-10T11:56:05Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/13591592723092-February-2023-Power-User-Webinar-Kenna-vs-Vulnerabilities-What-s-the-Score</loc>
  <lastmod>2023-05-02T21:38:33Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/13780208521620-Connectors-Index</loc>
  <lastmod>2025-07-15T23:11:57Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/15711337274004-Vulnerability-Assessment-with-Cisco-Secure-Endpoint</loc>
  <lastmod>2025-07-17T20:34:24Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/16498427481364-April-2023-Power-User-Webinar-All-About-Assets</loc>
  <lastmod>2023-06-13T22:28:08Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/16498690622740-May-2023-Power-User-Webinar-Kenna-vs-Vulnerabilities-All-Things-Vulnerabilities</loc>
  <lastmod>2023-06-13T22:30:10Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/17162938868884-Toolkit-Cylera-Connector</loc>
  <lastmod>2025-07-15T23:30:22Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/17307064701716-Welcome-to-the-Kenna-Customer-Experience-Video</loc>
  <lastmod>2023-07-11T21:15:18Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/17307243972116-Why-Kenna-Video</loc>
  <lastmod>2023-07-11T21:15:18Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/17307319886100-Basic-Navigation-Video</loc>
  <lastmod>2023-07-11T21:15:18Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/17307486512788-Cisco-Vulnerability-Management-FAQ</loc>
  <lastmod>2024-06-12T18:45:18Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/17307580445076-Connectors-Video</loc>
  <lastmod>2023-07-11T21:17:02Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/17307679242004-Ingesting-Data-without-a-Connector-Video</loc>
  <lastmod>2023-07-11T21:17:02Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/17307723718420-Security-and-Access-Considerations-Video</loc>
  <lastmod>2023-07-11T21:15:18Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/17307761471764-Intro-to-the-Kenna-Risk-Score-Video</loc>
  <lastmod>2023-07-11T21:15:18Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/17307835825684-Working-with-Vulnerabilities-Video</loc>
  <lastmod>2023-07-11T21:17:02Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/17307857116436-Vulnerability-Risk-Scoring-and-Data-Science-Video</loc>
  <lastmod>2023-07-11T21:15:18Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/17307953174036-Working-with-Assets-Video</loc>
  <lastmod>2023-07-11T21:17:02Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/17307959268628-Ingesting-and-Handling-Assets-Video</loc>
  <lastmod>2023-07-11T21:17:02Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/17308001484052-Working-with-Fixes-Video</loc>
  <lastmod>2023-07-11T21:17:02Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/17308081329428-Search-Panel-Basics-Video</loc>
  <lastmod>2023-07-11T21:17:02Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/17308088622740-Custom-Search-Queries-Video</loc>
  <lastmod>2023-07-11T21:17:02Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/17308190916372-Creating-and-Editing-Risk-Meters-Video</loc>
  <lastmod>2023-07-11T21:17:02Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/17308210764692-Types-of-Risk-Meters-Video</loc>
  <lastmod>2023-07-11T21:17:02Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/17308275085460-Benefits-of-Risk-Meters-Top-Fixes-Video</loc>
  <lastmod>2023-07-11T21:17:02Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/17308344962580-Benefits-of-Risk-Meters-Reporting-Video</loc>
  <lastmod>2023-07-11T21:17:02Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/17308386103956-Organizing-Views-with-Dashboards-Video</loc>
  <lastmod>2023-07-11T21:17:02Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/17308431567508-Kenna-AppSec-Video</loc>
  <lastmod>2023-07-11T21:17:13Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/17308488055700-Kenna-AppSec-Custom-Fields-Video</loc>
  <lastmod>2023-07-11T21:17:13Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/17308523103252-Data-Exports-Video</loc>
  <lastmod>2023-07-11T21:17:02Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/17308588510356-API-Documentation-Video</loc>
  <lastmod>2023-07-11T21:17:02Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/17308632783764-Settings-Menu-Personal-Account-Options-Video</loc>
  <lastmod>2023-07-11T21:15:40Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/17308675251476-Help-Center-and-Release-Notes-Video</loc>
  <lastmod>2023-07-11T21:15:18Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/17308752767124-Admin-Settings-Menu-User-Management</loc>
  <lastmod>2023-07-11T21:15:40Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/17308815110036-Admin-Settings-Menu-Creating-and-Managing-API-Keys-Video</loc>
  <lastmod>2023-07-11T21:15:40Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/17308899475988-Admin-Settings-Menu-Custom-Fields-Video</loc>
  <lastmod>2023-07-11T21:15:40Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/17308966262804-Admin-Settings-Menu-Asset-Settings-Video</loc>
  <lastmod>2023-07-11T21:15:40Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/17309131249812-Admin-Settings-Menu-Risk-Based-SLAs-Video</loc>
  <lastmod>2023-07-11T21:15:40Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/17309192026260-Best-Practices-for-Organizing-Users-Roles-and-Dashboards-Video</loc>
  <lastmod>2023-09-18T18:20:00Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/17309256986388-How-to-Mature-Your-Vulnerability-Management-Program-Video</loc>
  <lastmod>2023-07-11T21:18:06Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/17309335361812-Risk-Based-SLAs-Video</loc>
  <lastmod>2023-07-11T21:18:06Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/17309362523028-Best-Practices-for-Ticketing-Video</loc>
  <lastmod>2023-07-11T21:18:06Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/17309460952596-Best-Practices-for-Using-the-Kenna-API-Video</loc>
  <lastmod>2023-07-11T21:18:06Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/17309518389396-Best-Practices-for-Data-Exports-Video</loc>
  <lastmod>2023-07-11T21:18:06Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/18971718218132-Toolkit-AWS-Inspector-V2</loc>
  <lastmod>2025-07-15T23:30:46Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/18971858954516-Toolkit-Wiz-Connector</loc>
  <lastmod>2025-07-15T23:30:06Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/18972055549588-Toolkit-Snyk-V2-Connector</loc>
  <lastmod>2025-07-15T23:30:34Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/19742801026580-Vulnerability-Statuses</loc>
  <lastmod>2024-09-10T11:50:23Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/20747279647764-The-Forescout-Connector</loc>
  <lastmod>2025-07-07T23:08:58Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/21171398252180-Managing-the-Status-of-Application-Security-Module-Findings</loc>
  <lastmod>2024-09-10T11:50:23Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/21414424758676-Rapid7-InsightVM-Cloud-Connector</loc>
  <lastmod>2025-07-07T23:08:58Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/22957629674772-Migrating-to-the-Rapid7-InsightVM-from-a-Nexpose-Connector-in-Cisco-Vulnerability-Management</loc>
  <lastmod>2025-07-07T23:08:58Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/23797424264084-Managing-Connectors</loc>
  <lastmod>2025-07-07T23:08:58Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/23994497482772-The-Tanium-Connect-Connector</loc>
  <lastmod>2025-07-07T23:08:58Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/26868563991188-Using-the-Vulnerability-Management-Explore-page</loc>
  <lastmod>2024-08-28T16:09:28Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/26870546995220-Using-the-Search-Filters-on-the-Vulnerability-Management-Explore-page</loc>
  <lastmod>2024-09-10T11:55:55Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/35226673392020-March-2025-Cisco-Vulnerability-Management-Roadmap-and-Research-Spotlight-Webinar</loc>
  <lastmod>2025-03-18T17:01:19Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/35458472937620-Deprecated-Vulnerability-Solution</loc>
  <lastmod>2025-03-07T21:55:16Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/articles/39171636493588-Toolkit-Synack</loc>
  <lastmod>2025-07-15T23:31:07Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/sections/200319578-Cisco-Vulnerability-Management-Basics</loc>
  <lastmod>2026-01-15T20:29:28Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/sections/200319588-Security-Tool-Vulnerability-Scanner-Connectors</loc>
  <lastmod>2025-10-20T18:23:41Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/sections/200319648-Assets-Dashboards-Risk-Meters</loc>
  <lastmod>2025-10-10T19:50:29Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/sections/201304916-Webinars</loc>
  <lastmod>2025-07-07T23:29:48Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/sections/360010561292-Searching-Filtering</loc>
  <lastmod>2025-07-07T23:29:48Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/sections/360010673731-Guides</loc>
  <lastmod>2025-07-17T20:42:02Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/sections/17307142557716-Training-Videos</loc>
  <lastmod>2025-07-07T23:29:48Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/sections/17309561379860-Intro-to-Cisco-Vulnerability-Management</loc>
  <lastmod>2023-08-16T17:31:15Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/sections/17309581610644-Settings-Menu</loc>
  <lastmod>2023-07-11T21:15:40Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/sections/17309608963220-Kenna-AppSec</loc>
  <lastmod>2023-07-11T21:17:13Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/sections/17309617501204-Ingesting-and-Working-with-Data</loc>
  <lastmod>2023-07-11T21:17:01Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/sections/17309637231380-Best-Practices</loc>
  <lastmod>2023-09-18T18:20:00Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/sections/39110143391124-Connectors</loc>
  <lastmod>2025-07-16T16:31:44Z</lastmod>
</url>
<url>
  <loc>https://help.kennasecurity.com/hc/en-us/categories/200114098-General</loc>
  <lastmod>2026-01-15T20:29:28Z</lastmod>
</url>
</urlset>
