<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
<url>
  <loc>https://support.redsentry.com/hc/en-us</loc>
  <lastmod>2026-03-16T21:34:57Z</lastmod>
</url>
<url>
  <loc>https://support.redsentry.com/hc/en-us/articles/12469048940183-How-to-Create-Your-Red-Sentry-Account</loc>
  <lastmod>2025-06-02T17:42:21Z</lastmod>
</url>
<url>
  <loc>https://support.redsentry.com/hc/en-us/articles/12495783660183-Add-Manage-Users</loc>
  <lastmod>2025-05-16T09:39:38Z</lastmod>
</url>
<url>
  <loc>https://support.redsentry.com/hc/en-us/articles/30525619585047-Creating-Quote-Request</loc>
  <lastmod>2025-08-19T13:07:24Z</lastmod>
</url>
<url>
  <loc>https://support.redsentry.com/hc/en-us/articles/30818520313367-Quote-Review-and-Sign-Off</loc>
  <lastmod>2025-11-20T08:29:49Z</lastmod>
</url>
<url>
  <loc>https://support.redsentry.com/hc/en-us/articles/31089783950999-Communications</loc>
  <lastmod>2025-11-20T10:33:25Z</lastmod>
</url>
<url>
  <loc>https://support.redsentry.com/hc/en-us/articles/31985068733335-Wireless-Pentest-Requirements</loc>
  <lastmod>2025-05-30T09:11:29Z</lastmod>
</url>
<url>
  <loc>https://support.redsentry.com/hc/en-us/articles/31985484916887-Web-Application-Pentest-Requirement</loc>
  <lastmod>2025-05-26T16:49:40Z</lastmod>
</url>
<url>
  <loc>https://support.redsentry.com/hc/en-us/articles/31989021659671-Threat-Modeling-Pentest-Requirements</loc>
  <lastmod>2025-05-30T09:12:01Z</lastmod>
</url>
<url>
  <loc>https://support.redsentry.com/hc/en-us/articles/31989362399127-Segmentation-Pentest-Requirements</loc>
  <lastmod>2025-05-30T09:12:38Z</lastmod>
</url>
<url>
  <loc>https://support.redsentry.com/hc/en-us/articles/31989598296599-Social-Engineering-Pentest-Requirements</loc>
  <lastmod>2025-05-30T09:13:15Z</lastmod>
</url>
<url>
  <loc>https://support.redsentry.com/hc/en-us/articles/31990295075479-Physical-Environment-Pentest-Requirements</loc>
  <lastmod>2025-05-30T09:13:51Z</lastmod>
</url>
<url>
  <loc>https://support.redsentry.com/hc/en-us/articles/32065099907735-Mobile-Application-Pentest-Requirements</loc>
  <lastmod>2025-05-30T09:14:39Z</lastmod>
</url>
<url>
  <loc>https://support.redsentry.com/hc/en-us/articles/32065372503959-Internal-Pentest-Requirement</loc>
  <lastmod>2025-06-11T08:43:13Z</lastmod>
</url>
<url>
  <loc>https://support.redsentry.com/hc/en-us/articles/32065512965911-Desktop-Application-Pentest-Requirements</loc>
  <lastmod>2025-05-30T09:15:49Z</lastmod>
</url>
<url>
  <loc>https://support.redsentry.com/hc/en-us/articles/32065689608343-External-Pentest-Requirements</loc>
  <lastmod>2025-05-26T16:49:15Z</lastmod>
</url>
<url>
  <loc>https://support.redsentry.com/hc/en-us/articles/32065814100887-Cloud-Pentests-Requirement</loc>
  <lastmod>2025-05-30T09:08:39Z</lastmod>
</url>
<url>
  <loc>https://support.redsentry.com/hc/en-us/articles/32066140388503-Hardware-Pentest-Requirement</loc>
  <lastmod>2025-05-30T09:04:08Z</lastmod>
</url>
<url>
  <loc>https://support.redsentry.com/hc/en-us/articles/32150097771799-Desktop-Application-Pentesting-Purpose-and-Importance</loc>
  <lastmod>2025-05-16T13:37:29Z</lastmod>
</url>
<url>
  <loc>https://support.redsentry.com/hc/en-us/articles/32150124758551-Hardware-Pentesting-Purpose-and-Importance</loc>
  <lastmod>2025-05-16T13:53:48Z</lastmod>
</url>
<url>
  <loc>https://support.redsentry.com/hc/en-us/articles/32152889036567-External-Pentesting-Purpose-and-Importance</loc>
  <lastmod>2025-06-11T08:43:45Z</lastmod>
</url>
<url>
  <loc>https://support.redsentry.com/hc/en-us/articles/32153020166039-Cloud-Pentesting-Purpose-and-Importance</loc>
  <lastmod>2025-05-16T14:01:32Z</lastmod>
</url>
<url>
  <loc>https://support.redsentry.com/hc/en-us/articles/32153263377943-Wireless-Pentesting-Purpose-and-Importance</loc>
  <lastmod>2025-05-16T14:04:19Z</lastmod>
</url>
<url>
  <loc>https://support.redsentry.com/hc/en-us/articles/32272802820503-Wireless-Pentest-Methodology</loc>
  <lastmod>2025-05-21T19:04:54Z</lastmod>
</url>
<url>
  <loc>https://support.redsentry.com/hc/en-us/articles/32287439288983-Web-Application-Pentest-Methodology</loc>
  <lastmod>2025-06-11T08:46:08Z</lastmod>
</url>
<url>
  <loc>https://support.redsentry.com/hc/en-us/articles/32313384704535-Source-Code-Pentest-Methodology</loc>
  <lastmod>2025-05-23T16:41:51Z</lastmod>
</url>
<url>
  <loc>https://support.redsentry.com/hc/en-us/articles/32313536149143-Social-Engineering-Pentest-Methodology</loc>
  <lastmod>2025-05-23T16:32:55Z</lastmod>
</url>
<url>
  <loc>https://support.redsentry.com/hc/en-us/articles/32313791086743-Mobile-Pentest-Methodology</loc>
  <lastmod>2025-05-23T16:24:35Z</lastmod>
</url>
<url>
  <loc>https://support.redsentry.com/hc/en-us/articles/32313837303447-Internal-Pentest-Methodology</loc>
  <lastmod>2025-05-26T16:50:34Z</lastmod>
</url>
<url>
  <loc>https://support.redsentry.com/hc/en-us/articles/32313940437271-General-Pentesting-Methodology</loc>
  <lastmod>2025-06-11T08:47:01Z</lastmod>
</url>
<url>
  <loc>https://support.redsentry.com/hc/en-us/articles/32314234482839-External-Pentest-Methodology</loc>
  <lastmod>2025-05-26T16:48:36Z</lastmod>
</url>
<url>
  <loc>https://support.redsentry.com/hc/en-us/articles/32314302241175-Cloud-Pentest-Methodology</loc>
  <lastmod>2025-05-23T15:39:33Z</lastmod>
</url>
<url>
  <loc>https://support.redsentry.com/hc/en-us/articles/33667548564887-Single-Sign-On-SSO-SAML-Setup</loc>
  <lastmod>2025-10-10T10:12:58Z</lastmod>
</url>
<url>
  <loc>https://support.redsentry.com/hc/en-us/articles/34342256671895-Red-Sentry-JIRA-Integration</loc>
  <lastmod>2025-09-04T12:07:44Z</lastmod>
</url>
<url>
  <loc>https://support.redsentry.com/hc/en-us/articles/35463103298199-Setting-Up-Multi-Factor-Authentication-MFA-with-an-Authenticator-App</loc>
  <lastmod>2025-10-09T04:28:27Z</lastmod>
</url>
<url>
  <loc>https://support.redsentry.com/hc/en-us/articles/35491598276119-How-to-change-MFA-method</loc>
  <lastmod>2025-10-08T15:30:28Z</lastmod>
</url>
<url>
  <loc>https://support.redsentry.com/hc/en-us/articles/35503526025495-Manage-Profile</loc>
  <lastmod>2025-10-10T11:21:59Z</lastmod>
</url>
<url>
  <loc>https://support.redsentry.com/hc/en-us/articles/36333550060823-How-to-Use-the-Pentest-Viewer-Role-to-Control-Client-Access</loc>
  <lastmod>2025-11-14T19:32:10Z</lastmod>
</url>
<url>
  <loc>https://support.redsentry.com/hc/en-us/articles/36466624237463-Project-Pentest-Status-Workflow-Guide</loc>
  <lastmod>2025-12-12T12:12:53Z</lastmod>
</url>
<url>
  <loc>https://support.redsentry.com/hc/en-us/sections/12475133935639-Getting-Started</loc>
  <lastmod>2025-10-30T05:24:14Z</lastmod>
</url>
<url>
  <loc>https://support.redsentry.com/hc/en-us/sections/12495750167063-General</loc>
  <lastmod>2026-02-27T12:12:10Z</lastmod>
</url>
<url>
  <loc>https://support.redsentry.com/hc/en-us/sections/30523365055767-Pentests</loc>
  <lastmod>2026-03-16T21:34:57Z</lastmod>
</url>
<url>
  <loc>https://support.redsentry.com/hc/en-us/sections/31984994236311-Pentest-Requirements-By-Test-Type</loc>
  <lastmod>2025-06-11T08:43:13Z</lastmod>
</url>
<url>
  <loc>https://support.redsentry.com/hc/en-us/sections/32152276158871-Pentesting-Fundamentals-Purpose</loc>
  <lastmod>2025-06-11T08:43:45Z</lastmod>
</url>
<url>
  <loc>https://support.redsentry.com/hc/en-us/sections/32270305639959-Pentesting-Methodology</loc>
  <lastmod>2025-06-11T08:47:01Z</lastmod>
</url>
<url>
  <loc>https://support.redsentry.com/hc/en-us/categories/12469053253271-Getting-Started</loc>
  <lastmod>2025-10-30T05:24:14Z</lastmod>
</url>
<url>
  <loc>https://support.redsentry.com/hc/en-us/categories/12469357034135-Knowledge-Base</loc>
  <lastmod>2026-03-16T21:34:57Z</lastmod>
</url>
</urlset>
