<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://techthatmattrs.net/2026/04/09/rag-is-data-access-retrieval-authorization-control/</loc><lastmod>2026-04-13T08:16:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techthatmattrs.net/2026/03/30/week-four-what-shipped-what-slipped-workflow-revealed/</loc><lastmod>2026-04-08T07:47:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techthatmattrs.net/2026/03/03/techthatmattrsrefresh/</loc><image:image><image:loc>https://techthatmattrs.net/wp-content/uploads/2026/03/f8897cef2bf65220ba99154db1512ee0a5a148dc4db2c5aa179d311479fec155-1.jpeg</image:loc><image:title>f8897cef2bf65220ba99154db1512ee0a5a148dc4db2c5aa179d311479fec155</image:title></image:image><lastmod>2026-04-08T07:45:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techthatmattrs.net/2026/04/07/practical-rag-retrieval-authorization-patterns/</loc><lastmod>2026-04-05T06:56:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techthatmattrs.net/2026/04/01/secrets-rotation-slas-blast-radius-attacker-dwell-time/</loc><lastmod>2026-03-31T03:57:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techthatmattrs.net/2026/03/05/techthatmattrs-content-index/</loc><lastmod>2026-03-30T05:18:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techthatmattrs.net/2026/03/10/shadow-agents-are-the-new-shadow-it/</loc><image:image><image:loc>https://techthatmattrs.net/wp-content/uploads/2026/03/05_90_day_action_plan.png</image:loc><image:title>05_90_day_action_plan</image:title></image:image><image:image><image:loc>https://techthatmattrs.net/wp-content/uploads/2026/03/04_framework_find_name_limit_review.png</image:loc><image:title>04_framework_find_name_limit_review</image:title></image:image><image:image><image:loc>https://techthatmattrs.net/wp-content/uploads/2026/03/02_shadow_it_vs_shadow_agents.png</image:loc><image:title>02_shadow_it_vs_shadow_agents</image:title></image:image><image:image><image:loc>https://techthatmattrs.net/wp-content/uploads/2026/03/03_real_failure_mode_shadow_agent_blast_radius.png</image:loc><image:title>03_real_failure_mode_shadow_agent_blast_radius</image:title></image:image><image:image><image:loc>https://techthatmattrs.net/wp-content/uploads/2026/03/e0a4ece7e57db27c59c5c50f107790d64e1a3b712d1a0103201e429f93301ffb.jpeg</image:loc><image:title>01_opening_claim_shadow_agents_new_shadow_it</image:title></image:image><lastmod>2026-03-30T05:15:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techthatmattrs.net/2026/03/12/90-day-agent-identity-governance-plan/</loc><image:image><image:loc>https://techthatmattrs.net/wp-content/uploads/2026/03/89cc19f079c6435ee01059e10280467c81f573e04d279fb246600e0fc03f6959.jpeg</image:loc><image:title>89cc19f079c6435ee01059e10280467c81f573e04d279fb246600e0fc03f6959</image:title></image:image><lastmod>2026-03-30T05:15:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techthatmattrs.net/2026/03/13/defending-against-modern-cyber-threats-day-in-the-life-of-security-operations/</loc><image:image><image:loc>https://techthatmattrs.net/wp-content/uploads/2026/03/cb0fdd2928089f25e643b6033b6becf53a261bad4bf420abdeb0ad1549ab2106.jpeg</image:loc><image:title>cb0fdd2928089f25e643b6033b6becf53a261bad4bf420abdeb0ad1549ab2106</image:title></image:image><lastmod>2026-03-30T05:14:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techthatmattrs.net/2026/03/16/week-two-building-content-engine-in-public/</loc><image:image><image:loc>https://techthatmattrs.net/wp-content/uploads/2026/03/a_minimalist_photograph_of_a_f.jpeg</image:loc><image:title>a_minimalist_photograph_of_a_f</image:title></image:image><lastmod>2026-03-30T05:14:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techthatmattrs.net/2026/03/17/approved-tool-expanding-agent-agentic-governance-ownership-model/</loc><image:image><image:loc>https://techthatmattrs.net/wp-content/uploads/2026/03/6bc2146167a4a9e9e2409caefee677965eda81ab8e61012e5aca17603c4cec41.jpeg</image:loc><image:title>6bc2146167a4a9e9e2409caefee677965eda81ab8e61012e5aca17603c4cec41</image:title></image:image><lastmod>2026-03-30T05:11:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techthatmattrs.net/2026/03/24/agent-inventory-and-the-agent-register/</loc><image:image><image:loc>https://techthatmattrs.net/wp-content/uploads/2026/03/a_sleek_glass-walled_tech_offi.jpeg</image:loc><image:title>a_sleek_glass-walled_tech_offi</image:title></image:image><lastmod>2026-03-30T05:09:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techthatmattrs.net/2026/03/20/stryker-cyberattack-microsoft-intune-identity-privilege-lessons/</loc><lastmod>2026-03-30T05:07:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techthatmattrs.net/2026/03/28/agents-are-identities-enterprise-ai-governance/</loc><image:image><image:loc>https://techthatmattrs.net/wp-content/uploads/2026/03/breathtaking_illustration_of_a.jpeg</image:loc><image:title>breathtaking_illustration_of_A</image:title></image:image><lastmod>2026-03-30T04:54:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techthatmattrs.net/2020/04/21/configure-windows-10-ntp-settings-time-sync-your-windows-10-machine/</loc><image:image><image:loc>https://techthatmattrs.net/wp-content/uploads/2026/03/timesync-13-2604_original.png</image:loc><image:title>timesync-13-2604_original</image:title></image:image><image:image><image:loc>https://techthatmattrs.net/wp-content/uploads/2026/03/timesync-14-3044_original.png</image:loc><image:title>timesync-14-3044_original</image:title></image:image><image:image><image:loc>https://techthatmattrs.net/wp-content/uploads/2026/03/timesync-15-2310_original.png</image:loc><image:title>timesync-15-2310_original</image:title></image:image><image:image><image:loc>https://techthatmattrs.net/wp-content/uploads/2026/03/timesync-16-3164_original.png</image:loc><image:title>timesync-16-3164_original</image:title></image:image><image:image><image:loc>https://techthatmattrs.net/wp-content/uploads/2026/03/timesync-17-3430_original.png</image:loc><image:title>timesync-17-3430_original</image:title></image:image><image:image><image:loc>https://techthatmattrs.net/wp-content/uploads/2026/03/timesync-18-3786_original.png</image:loc><image:title>timesync-18-3786_original</image:title></image:image><image:image><image:loc>https://techthatmattrs.net/wp-content/uploads/2026/03/timesync-19-3854_original.png</image:loc><image:title>timesync-19-3854_original</image:title></image:image><image:image><image:loc>https://techthatmattrs.net/wp-content/uploads/2026/03/timesync-20-4340_original.png</image:loc><image:title>timesync-20-4340_original</image:title></image:image><image:image><image:loc>https://techthatmattrs.net/wp-content/uploads/2026/03/timesync-21-4570_original.png</image:loc><image:title>timesync-21-4570_original</image:title></image:image><image:image><image:loc>https://techthatmattrs.net/wp-content/uploads/2026/03/timesync-22-1128_original.png</image:loc><image:title>timesync-22-1128_original</image:title></image:image><lastmod>2026-03-13T09:55:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techthatmattrs.net/2019/09/26/resolve-incident-investigations-automatically-with-machine-groups-in-mdatp/</loc><image:image><image:loc>https://techthatmattrs.net/wp-content/uploads/2026/03/561_original.jpg</image:loc><image:title>561_original</image:title><image:caption>Original 2019 whiteboard concept. The names have changed, but the core idea still maps to the modern Microsoft security stack.

Local AD → Microsoft Entra ID → Defender services → Microsoft Defender XDR.</image:caption></image:image><lastmod>2026-03-13T09:52:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techthatmattrs.net/about/</loc><image:image><image:loc>https://techthatmattrs.net/wp-content/uploads/2026/03/img_20230521_204922edit.png</image:loc><image:title>IMG_20230521_204922Edit</image:title><image:caption>Matt in Office</image:caption></image:image><lastmod>2026-03-06T09:33:03+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://techthatmattrs.net/2018/11/30/hybrid-ci-cd-azure-stack-devops/</loc><image:image><image:loc>https://techthatmattrs.net/wp-content/uploads/2026/03/a11b928fd5c6a20c64e59791b2c42eb0891df9502048e280172bf968c8825939.jpeg</image:loc><image:title>a11b928fd5c6a20c64e59791b2c42eb0891df9502048e280172bf968c8825939</image:title></image:image><lastmod>2026-03-06T09:20:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techthatmattrs.net/2018/11/27/differentiate-with-microsofts-azure-stack/</loc><lastmod>2026-03-06T09:16:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techthatmattrs.net/2018/12/21/create-an-s-mode-image-of-windows-10/</loc><lastmod>2026-03-06T00:09:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techthatmattrs.net</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2026-04-13T08:16:48+00:00</lastmod></url></urlset>
