<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
<url>
  <loc>https://z3n-cybersecurity-demo.zendesk.com/hc/en-us</loc>
  <lastmod>2025-04-09T03:58:02Z</lastmod>
</url>
<url>
  <loc>https://z3n-cybersecurity-demo.zendesk.com/hc/en-us/articles/23845510608013-What-does-Lured-mean-within-the-reports</loc>
  <lastmod>2024-02-05T02:41:51Z</lastmod>
</url>
<url>
  <loc>https://z3n-cybersecurity-demo.zendesk.com/hc/en-us/articles/23845529477901-What-does-each-lured-event-type-mean</loc>
  <lastmod>2024-02-05T02:15:32Z</lastmod>
</url>
<url>
  <loc>https://z3n-cybersecurity-demo.zendesk.com/hc/en-us/articles/23845530717709-Do-I-have-to-allowlist</loc>
  <lastmod>2024-02-05T02:16:01Z</lastmod>
</url>
<url>
  <loc>https://z3n-cybersecurity-demo.zendesk.com/hc/en-us/articles/23845558656653-Why-are-the-emails-are-going-to-junk</loc>
  <lastmod>2024-02-05T02:16:44Z</lastmod>
</url>
<url>
  <loc>https://z3n-cybersecurity-demo.zendesk.com/hc/en-us/articles/23845560141837-Why-are-emails-are-going-to-Quarantine</loc>
  <lastmod>2024-02-05T02:17:20Z</lastmod>
</url>
<url>
  <loc>https://z3n-cybersecurity-demo.zendesk.com/hc/en-us/articles/23845587155469-Why-Are-my-campaigns-stuck-in-scheduled</loc>
  <lastmod>2024-02-05T02:17:45Z</lastmod>
</url>
<url>
  <loc>https://z3n-cybersecurity-demo.zendesk.com/hc/en-us/articles/23845600150925-If-I-choose-to-sign-up-as-a-client-may-I-customize-my-content-release-schedule</loc>
  <lastmod>2024-02-05T02:18:10Z</lastmod>
</url>
<url>
  <loc>https://z3n-cybersecurity-demo.zendesk.com/hc/en-us/articles/23845622837005-How-do-I-Launch-a-phishing-campaign</loc>
  <lastmod>2024-02-05T02:20:40Z</lastmod>
</url>
<url>
  <loc>https://z3n-cybersecurity-demo.zendesk.com/hc/en-us/articles/23845646442125-Phish-Reports-Dashboard</loc>
  <lastmod>2024-02-05T02:42:35Z</lastmod>
</url>
<url>
  <loc>https://z3n-cybersecurity-demo.zendesk.com/hc/en-us/articles/23845719360013-Phishing-Insights</loc>
  <lastmod>2024-02-05T02:42:15Z</lastmod>
</url>
<url>
  <loc>https://z3n-cybersecurity-demo.zendesk.com/hc/en-us/articles/23845753064845-Phishing-Campaigns</loc>
  <lastmod>2024-02-05T02:27:20Z</lastmod>
</url>
<url>
  <loc>https://z3n-cybersecurity-demo.zendesk.com/hc/en-us/sections/18525857620365-End-to-End-Feature-Guides</loc>
  <lastmod>2024-02-05T02:42:35Z</lastmod>
</url>
<url>
  <loc>https://z3n-cybersecurity-demo.zendesk.com/hc/en-us/sections/18526149549709-FAQs</loc>
  <lastmod>2024-02-05T02:41:51Z</lastmod>
</url>
<url>
  <loc>https://z3n-cybersecurity-demo.zendesk.com/hc/en-us/sections/23845614642445-Reporting-Insights</loc>
  <lastmod>2024-02-05T02:42:35Z</lastmod>
</url>
<url>
  <loc>https://z3n-cybersecurity-demo.zendesk.com/hc/en-us/sections/23845729055373-Campaign-Management</loc>
  <lastmod>2024-02-05T02:27:20Z</lastmod>
</url>
<url>
  <loc>https://z3n-cybersecurity-demo.zendesk.com/hc/en-us/categories/18525840668941-General</loc>
  <lastmod>2024-02-05T02:42:35Z</lastmod>
</url>
</urlset>
