<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://blog.devensys.com/2023/06/26/la-mfa-un-gage-de-securite/</loc><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2023/06/1200x675-1.jpg</image:loc><image:title>1200x675</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2023/06/1200x675.jpg</image:loc><image:title>1200x675</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2023/06/oip.jpg</image:loc><image:title>OIP</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2023/06/ouvrez-simplement-votre-porte-avec-votre-empreinte-image_2.jpg</image:loc><image:title>ouvrez-simplement-votre-porte-avec-votre-empreinte-image_2</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2023/06/cle-porte-660x400-1.png</image:loc><image:title>cle-porte-660x400-1</image:title></image:image><lastmod>2023-06-26T14:32:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devensys.com/about/</loc><lastmod>2022-12-20T09:10:16+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://blog.devensys.com/2022/01/18/apparmor-un-outil-simple-et-gratuit-pour-securiser-vos-serveurs-linux/</loc><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/19831-image-12.png</image:loc><image:title>image-12</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/94b4f-apparmor-outil-simple-gratuit-securite-linex-server-e1642605163329.jpg</image:loc><image:title>apparmor-outil-simple-gratuit-securite-linex-server</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/2055a-image-11.png</image:loc><image:title>image-11</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/01731-image-10.png</image:loc><image:title>image-10</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/928c6-image.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/42a93-image-1.png</image:loc><image:title>image-1</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/be0f4-image-2.png</image:loc><image:title>image-2</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/2c95f-image-3.png</image:loc><image:title>image-3</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/fa449-image-4.png</image:loc><image:title>image-4</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/2ec89-image-9.png</image:loc><image:title>image-9</image:title></image:image><lastmod>2022-12-20T08:40:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devensys.com/2017/06/26/technologie-wildfire-a-permis-de-detecter-menace-dun-cv-malveillant-transmis-e-mail/</loc><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2017/06/57f8a-capture-decran-2017-08-25-a-18.19.34-1024x547-1.png</image:loc><image:title>Capture-d’écran-2017-08-25-à-18.19.34-1024x547</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2017/06/7465a-capture-decran-2017-08-25-a-18.20.03-1024x59-1.png</image:loc><image:title>Capture-d’écran-2017-08-25-à-18.20.03-1024x59</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2017/06/0ee34-capture-decran-2017-08-25-a-18.19.04-1024x773-1.png</image:loc><image:title>Capture-d’écran-2017-08-25-à-18.19.04-1024x773</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2017/06/31b7e-capture-decran-2017-08-25-a-18.18.27-1024x782-1.png</image:loc><image:title>Capture-d’écran-2017-08-25-à-18.18.27-1024x782</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2017/06/c9976-capture-decran-2017-08-25-a-18.17.48-1024x454-1.png</image:loc><image:title>Capture-d’écran-2017-08-25-à-18.17.48-1024x454</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2017/06/92902-capture-decran-2017-08-25-a-18.16.26-1024x362-1.png</image:loc><image:title>Capture-d’écran-2017-08-25-à-18.16.26-1024x362</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2017/06/53411-capture-decran-2017-08-25-a-18.13.13-1024x782-1.png</image:loc><image:title>Capture-d’écran-2017-08-25-à-18.13.13-1024x782</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/ee507-computer-1591018_1280.jpg</image:loc><image:title>computer-1591018_1280</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/a07fe-capture-decran-2017-08-25-a-18.20.03.png</image:loc><image:title>Capture d’écran 2017-08-25 à 18.20.03</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/dd54b-capture-decran-2017-08-25-a-18.19.34.png</image:loc><image:title>Capture d’écran 2017-08-25 à 18.19.34</image:title></image:image><lastmod>2022-12-19T17:39:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devensys.com/2020/04/07/construire-avec-power-apps/</loc><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2020/04/accfc-power_apps_interface_nouveau_champ-1024x630-1.png</image:loc><image:title>power_apps_interface_nouveau_champ-1024x630</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2020/04/6b655-power_apps_interface_2-1024x677-1.png</image:loc><image:title>power_apps_interface_2-1024x677</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2020/04/fc058-power_apps_interface-1024x491-1.png</image:loc><image:title>power_apps_interface-1024x491</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2020/04/6dfcc-power_apps_create_apps-1024x404-1.png</image:loc><image:title>power_apps_create_apps-1024x404</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/a6315-cover_article_construire-une-application-avec-powerapps.png</image:loc><image:title>Cover_Article_Construire-une-application-avec-PowerApps</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/9c089-power_apps_ecran_edit.png</image:loc><image:title>power_apps_ecran_edit</image:title><image:caption>Le formulaire de création / édition ne prend que quelques clics</image:caption></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/42d13-power_apps_creation_champ.png</image:loc><image:title>power_apps_creation_champ</image:title><image:caption>Création d'un champ d'option sélectionnable directement sur l'entité</image:caption></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/3565d-power_apps_create_event.png</image:loc><image:title>Power_apps_create_event</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/bef98-power_apps_cds_contact.png</image:loc><image:title>power_apps_cds_contact</image:title><image:caption>Exemple de l'entité contact</image:caption></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/29894-power_apps_cds_entites.png</image:loc><image:title>power_apps_cds_entites</image:title><image:caption>Exemples d'entités sur CDS</image:caption></image:image><lastmod>2022-12-19T17:39:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devensys.com/2018/08/28/mots-de-passe-comment-bien-les-choisir/</loc><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/c60a3-login-570317_1280.jpg</image:loc><image:title>login-570317_1280</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/0448a-login_form_psd_freebie_by_bestpsdfreebies-d4sq993.jpg</image:loc><image:title>login_image-blog-devensys</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/50a53-stress-stressed-man-upset-office-computer-fired.jpg</image:loc><image:title>upset-man-in-front-of-computer-login-blog-devensys</image:title></image:image><lastmod>2022-12-19T17:36:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devensys.com/2015/03/09/wifi-a-la-mode/</loc><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/cbe78-cartel-2242048_1280.png</image:loc><image:title>cartel-2242048_1280</image:title></image:image><lastmod>2022-12-19T17:36:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devensys.com/2019/02/25/cest-quoi-dkim/</loc><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/6b7e6-computers-3710419_1920.jpg</image:loc><image:title>computers-3710419_1920</image:title></image:image><lastmod>2022-12-19T17:36:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devensys.com/2019/02/25/cest-quoi-spf/</loc><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/7e25f-email-marketing-2362038_1280.png</image:loc><image:title>email-marketing-2362038_1280</image:title></image:image><lastmod>2022-12-19T17:36:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devensys.com/2019/07/31/next-generation-firewall-ngfw/</loc><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/62602-bg-blog-next-generation-firewall-devensys.jpg</image:loc><image:title>Bg-blog-Next-generation-firewall-devensys</image:title></image:image><lastmod>2022-12-19T17:36:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devensys.com/2020/06/07/spf-dkim-dmarc-securite-mail/</loc><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/2ac53-bg_blog_trio-gagnant-spf-dkim-dmarc_devensys.jpg</image:loc><image:title>bg_blog_trio-gagnant-SPF-DKIM-DMARC_devensys</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/63ba8-banner_blog_merox_bnr1.png</image:loc><image:title>Banner_Blog_Merox_BNR1</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/c33e2-visuel-devensys.png</image:loc><image:title>Visuel-Devensys</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/98cc5-securite-email-dkim.png</image:loc><image:title>Securite-email-dkim</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/ef7e5-securite-email-spf.png</image:loc><image:title>Securite-email-spf</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/b6694-dmarc-dkim-spf.png</image:loc><image:title>dmarc-dkim-spf</image:title></image:image><lastmod>2022-12-19T17:36:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devensys.com/2014/09/17/securite-notions-sur-le-chiffrement/</loc><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/e45a5-analytics-3088958_1920.jpg</image:loc><image:title>analytics-3088958_1920</image:title></image:image><lastmod>2022-12-19T17:36:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devensys.com/2020/02/11/protegez-votre-marque-avec-le-bimi/</loc><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/4a465-blog_bg_article_bimi_110220.jpg</image:loc><image:title>Blog_Bg_article_BIMI_110220</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/39de2-bimi-before-and-after.png</image:loc><image:title>BIMI-before-and-after</image:title></image:image><lastmod>2022-12-19T17:36:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devensys.com/2021/06/28/cnd-vs-ceh-quelle-certification-cybersecurite-ec-council-choisir/</loc><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/e2c21-cnd-vs-ceh-fomation-cybersecurite-thumb.png</image:loc><image:title>cnd-vs-ceh-fomation-cybersecurite - thumb</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/8615b-cnd-vs-ceh-fomation-cybersecurite.png</image:loc><image:title>cnd-vs-ceh-fomation-cybersecurite</image:title></image:image><lastmod>2021-11-15T16:04:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devensys.com/2021/09/02/le-csirt-cest-quoi/</loc><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/d1007-cest-quoi-csirt-cert-difference.jpg</image:loc><image:title>cest-quoi-csirt-cert-difference</image:title></image:image><lastmod>2021-11-15T16:02:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devensys.com/2018/07/15/pourquoi-creer-des-vlans/</loc><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/447bd-20200406_dvs_banniere_blog_reseauetinfrastructure.png</image:loc><image:title>20200406_DVS_Banniere_Blog_reseauEtInfrastructure</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/bf016-blog_article_vlans_devensys-1.jpg</image:loc><image:title>Blog_article_VLANS_Devensys</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/b6f7f-blog_article_vlans_2-groupe_devensys.jpg</image:loc><image:title>Blog_article_VLANS_2-groupe_Devensys</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/21cb3-blog_article_vlans_multi-groupe_devensys.jpg</image:loc><image:title>Blog_article_VLANS_multi-groupe_devensys</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/595f6-blog_article_vlans_devensys.jpg</image:loc><image:title>Blog_article_VLANS_Devensys</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/695a5-binary-2302728_1920.jpg</image:loc><image:title>binary-2302728_1920</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/35de6-action-image-blog-pourquoi-creer-des-vlans-devensys.jpg</image:loc><image:title>Action-image-blog-pourquoi-creer-des-vlans-devensys</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/d0438-vlan-etage-837x675-1.jpg</image:loc><image:title>Vlan-etage-837x675</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/95ca0-vlan-la-base.jpg</image:loc><image:title>VLAN-la-base</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/f4747-vlan.jpg</image:loc><image:title>Vlan</image:title></image:image><lastmod>2021-11-05T11:02:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devensys.com/2018/07/18/kerberos-principe-de-fonctionnement/</loc><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/21861-dvs_banniere_sso.jpg</image:loc><image:title>DVS_Banniere_SSO</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/a7590-dvs_banniere_sso.jpg</image:loc><image:title>DVS_Banniere_SSO</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/08e1e-20200406_dvs_banniere_blog_cybersecurity.png</image:loc><image:title>20200406_DVS_Banniere_Blog_Cybersecurity</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/c1e47-binary-2910663_1280.jpg</image:loc><image:title>binary-2910663_1280</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/f8de9-markus-spiske-445253-unsplash.jpg</image:loc><image:title>markus-spiske-445253-unsplash</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/936f9-schema_kerberos_7_article_devensys.jpg</image:loc><image:title>Schema_kerberos_7_article_devensys</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/03df6-schema_kerberos_6_article_devensys.jpg</image:loc><image:title>Schema_kerberos_6_article_devensys</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/47591-schema_kerberos_5_article_devensys.jpg</image:loc><image:title>Schema_kerberos_5_article_devensys</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/e083c-schema_kerberos_4_article_devensys.jpg</image:loc><image:title>Schema_kerberos_4_article_devensys</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/f0f9a-schema_kerberos_3_article_devensys.jpg</image:loc><image:title>Schema_kerberos_3_article_devensys</image:title></image:image><lastmod>2023-05-03T16:31:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devensys.com/2014/12/01/chiffrement-symetrique/</loc><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/463c2-neo.jpg</image:loc><image:title>neo</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/6f264-chiffrement-symetrique.jpeg</image:loc><image:title>chiffrement-symetrique</image:title></image:image><lastmod>2021-11-05T11:01:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devensys.com/2019/01/22/dmarc-ameliorer-sa-securite-email/</loc><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/6994d-20200406_merox_banniere_blog_decouvrir_solution.png</image:loc><image:title>20200406_MEROX_Banniere_Blog_Decouvrir_solution</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/4eb75-bg_dmarc_article_blog_devensys.jpg</image:loc><image:title>bg_DMARC_article_blog_devensys</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/919e0-schema_dmarc_comprehension-1.jpg</image:loc><image:title>schema_DMARC_comprehension</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/a5cef-schema_dmarc_comprehension.jpg</image:loc><image:title>schema_DMARC_comprehension</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/f3854-dmarc.jpg</image:loc><image:title>DMARC</image:title></image:image><lastmod>2021-07-21T13:25:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devensys.com/2014/02/05/active-directory-controler-laffichage-des-objets/</loc><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/177fb-windows.jpg</image:loc><image:title>windows</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/5a900-ad-objets-15.png</image:loc><image:title>AD-Objets-15</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/57b68-ad-objets-16.png</image:loc><image:title>AD-Objets-16</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/12f81-ad-objets-41.png</image:loc><image:title>AD-Objets-41</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/5ad7b-ad-objets-13.png</image:loc><image:title>AD-Objets-13</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/60676-ad-objets-14.png</image:loc><image:title>AD-Objets-14</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/e9a84-ad-objets-10.png</image:loc><image:title>AD-Objets-10</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/b38cc-ad-objets-11.png</image:loc><image:title>AD-Objets-11</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/2f7af-ad-objets-12.png</image:loc><image:title>AD-Objets-12</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/92a9b-ad-objets-8.png</image:loc><image:title>AD-Objets-8</image:title></image:image><lastmod>2021-07-21T13:14:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devensys.com/2018/08/19/sso-single-sign-on-c-est-quoi/</loc><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/63fb4-key-2510672_1280.jpg</image:loc><image:title>key-2510672_1280</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/619aa-comprendre-le-sso-facilement-devensys.jpg</image:loc><image:title>Comprendre-le-SSO-facilement-devensys</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/f0d89-etapes-287x300-1.png</image:loc><image:title>etapes-287x300</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/6704a-ssosinglesignon.jpeg</image:loc><image:title>SSOSingleSignOn</image:title></image:image><lastmod>2021-07-21T13:07:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devensys.com/2013/08/12/introduction-authentification-reseau-802-1x/</loc><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/900ec-padlock-690286_1920.jpg</image:loc><image:title>padlock-690286_1920</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/e4e43-surveiller-300x199-1.jpeg</image:loc><image:title>surveiller-300x199</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/5345f-passport.jpeg</image:loc><image:title>passport</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/2ae73-802.jpeg</image:loc><image:title>802</image:title></image:image><lastmod>2021-07-08T13:46:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devensys.com/2014/07/28/active-directory-presentation-des-gpo/</loc><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/39eeb-windows_server.jpg</image:loc><image:title>windows_server</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/ec793-windows_server_logo.png</image:loc><image:title>windows_server_logo</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/83b01-active-directory-gpo.png</image:loc><image:title>Active-Directory-GPO</image:title></image:image><lastmod>2021-07-08T13:44:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devensys.com/2014/09/18/defense-en-profondeur/</loc><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/09f34-tank-449772_1920.jpg</image:loc><image:title>tank-449772_1920</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/491b9-defense_profondeur.png</image:loc><image:title>defense_profondeur</image:title></image:image><lastmod>2021-07-08T13:42:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devensys.com/2014/10/24/active-directory-unite-dorganisation/</loc><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/7c2ca-windows_10_logoblue.svg-copy_windows.jpg</image:loc><image:title>Windows_10_LogoBlue.svg-copy_WINDOWS</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/50f79-active-directory-organisational-unit-17.png</image:loc><image:title>Active-Directory-Organisational-Unit-17</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/1f24e-active-directory-organisational-unit-14.png</image:loc><image:title>Active-Directory-Organisational-Unit-14</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/37dfe-active-directory-organisational-unit-15.png</image:loc><image:title>Active-Directory-Organisational-Unit-15</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/38657-active-directory-organisational-unit-16.png</image:loc><image:title>Active-Directory-Organisational-Unit-16</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/80808-active-directory-organisational-unit-12.png</image:loc><image:title>Active-Directory-Organisational-Unit-12</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/47d72-active-directory-organisational-unit-13.png</image:loc><image:title>Active-Directory-Organisational-Unit-13</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/44b44-active-directory-organisational-unit-9.png</image:loc><image:title>Active-Directory-Organisational-Unit-9</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/e3829-active-directory-organisational-unit-10.png</image:loc><image:title>Active-Directory-Organisational-Unit-10</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/39616-active-directory-organisational-unit-11.png</image:loc><image:title>Active-Directory-Organisational-Unit-11</image:title></image:image><lastmod>2021-07-08T13:40:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devensys.com/2014/12/02/les-bases-du-controle-dacces/</loc><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/199c3-login-3938430_1920.jpg</image:loc><image:title>login-3938430_1920</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/7a001-image5-22.png</image:loc><image:title>image5-22</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/88f7a-image3-18.png</image:loc><image:title>image3-18</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/4e3a2-image4-20.png</image:loc><image:title>image4-20</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/64c9e-graphique-1.png</image:loc><image:title>graphique-1</image:title></image:image><lastmod>2021-07-08T13:38:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devensys.com/2014/12/11/aaa-authentication-authorization-accounting/</loc><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/d78ff-computer-1231889_1280.jpg</image:loc><image:title>computer-1231889_1280</image:title></image:image><lastmod>2021-07-08T13:36:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devensys.com/2014/12/23/agregation-de-liens-le-concept/</loc><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/30bc9-geometric-1732847_1920.jpg</image:loc><image:title>geometric-1732847_1920</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/11ffb-aggregation-de-liens1.jpeg</image:loc><image:title>Aggregation-de-liens1</image:title></image:image><lastmod>2021-07-08T13:35:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devensys.com/2015/07/13/securite-apple-os-x-le-fruit-defendu-lest-il-vraiment/</loc><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/17c6c-apple-256268_1280.jpg</image:loc><image:title>apple-256268_1280</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/356dc-share_services-1.png</image:loc><image:title>share_services</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/37019-share_services.png</image:loc><image:title>share_services</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/dcb75-share.png</image:loc><image:title>share</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/a1668-privacy.png</image:loc><image:title>privacy</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/52508-time_machine.png</image:loc><image:title>time_machine</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/8d8ed-time_machine_enabled.png</image:loc><image:title>time_machine_enabled</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/74826-firewall_options.png</image:loc><image:title>firewall_options</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/38628-firewall_enabled.png</image:loc><image:title>firewall_enabled</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/f6094-filevault_enabled.png</image:loc><image:title>filevault_enabled</image:title></image:image><lastmod>2021-07-08T13:31:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devensys.com/2018/06/22/la-menace-rogue-access-point/</loc><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/11674-search-2951638_1920.jpg</image:loc><image:title>search-2951638_1920</image:title></image:image><lastmod>2021-07-08T13:30:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devensys.com/2018/10/04/wifi-vers-une-simplification-des-noms-de-reseaux-802-11/</loc><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/89054-icon-1480926_1280.png</image:loc><image:title>icon-1480926_1280</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/6ced0-wifi-6-blog-devensys.jpg</image:loc><image:title>wifi-6-blog-devensys</image:title></image:image><lastmod>2021-07-08T09:57:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devensys.com/2019/01/14/ameliorer-la-securite-des-emails/</loc><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/82a3d-email-3249062_1280.png</image:loc><image:title>email-3249062_1280</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/79a43-securite-email-event-2018-dec-devensys-img5.jpg</image:loc><image:title>Securite-email-event-2018-dec-devensys-img5</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/17e84-securite-email-event-2018-dec-devensys-img1.jpg</image:loc><image:title>Securite-email-event-2018-dec-devensys-img1</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/2e5a4-securite-email-event-2018-dec-devensys-img2.jpg</image:loc><image:title>Securite-email-event-2018-dec-devensys-img2</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/f3cd0-securite-email-event-2018-dec-devensys-img3.jpg</image:loc><image:title>Securite-email-event-2018-dec-devensys-img3</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/bafe7-securite-email-event-2018-dec-devensys-img4.jpg</image:loc><image:title>Securite-email-event-2018-dec-devensys-img4</image:title></image:image><lastmod>2021-07-08T09:56:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devensys.com/2019/01/16/devensys-sera-present-au-fic-2019/</loc><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/e7d2d-capture_d_ecran_2019-01-21_a_14.57.43.png</image:loc><image:title>capture_d_ecran_2019-01-21_a_14.57.43</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/9939e-fic-event.jpg</image:loc><image:title>FIC-EVENT</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/dd47c-fic-2k19.jpg</image:loc><image:title>fic 2k19</image:title></image:image><lastmod>2021-07-08T09:56:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devensys.com/2020/01/13/petit-retour-sur-une-notion-le-devsecops/</loc><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/65487-startup-photos.jpg</image:loc><image:title>startup-photos</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/0e63a-schedule-planning-startup-launching-7376.jpg</image:loc><image:title>schedule-planning-startup-launching-7376</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/db27b-devsecops.png</image:loc><image:title>devsecops</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/7c903-image.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/42d39-app_insight_dashboard.png</image:loc><image:title>app_insight_dashboard</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/929fa-azure_devops_release_management.png</image:loc><image:title>azure_devops_release_management</image:title><image:caption>Un exemple de release management</image:caption></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/b7b91-azure_devops_versions.png</image:loc><image:title>azure_devops_versions</image:title><image:caption>Il est important d'avoir une vision claire des artefacts validés, déployés, et de pouvoir revenir en arrière en deux clics si nécessaire</image:caption></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/07fae-azure_devops_build.png</image:loc><image:title>azure_devops_build</image:title><image:caption>Un exemple de process classique</image:caption></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/491b5-best_practices_examples.png</image:loc><image:title>best_practices_examples</image:title><image:caption>Les outils arrivent avec des centaines de règles, sur différents languages, et des exemples de bonnes pratique
Il est souvent possible de personnaliser ses propres règles</image:caption></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/deabf-azure_devops_pull_request.png</image:loc><image:title>azure_devops_pull_request</image:title><image:caption>Un exemple de retour d'analyse automatique, sur une Pull Request sur Azure DevOps.
Il est possible de construire un workflow de validation autour de ce process</image:caption></image:image><lastmod>2021-07-08T09:52:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devensys.com/2020/01/27/tour-dhorizon-de-microsoft-power-platform/</loc><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/62a85-bg_blog_microsoft_power_platform-1.jpg</image:loc><image:title>bg_blog_Microsoft_Power_Platform</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/90578-forbes_big_data.png</image:loc><image:title>forbes_big_data</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/7c7b6-power_platform_elements.png</image:loc><image:title>power_platform_elements</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/7a06c-power_platform-1.png</image:loc><image:title>power_platform</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/27c6d-power_platform.png</image:loc><image:title>power_platform</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/24f9f-power_apps_composants.png</image:loc><image:title>power_apps_composants</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/e9f1c-power_platform_exemple_power_bi_dashboard.png</image:loc><image:title>Power_Platform_exemple_Power_BI_dashboard</image:title><image:caption>Un exemple de tableau Power BI</image:caption></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/c4a67-power_platform_exemple_power_apps.png</image:loc><image:title>Power_Platform_exemple_Power_apps</image:title><image:caption>Plusieurs application sont proposées</image:caption></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/52a29-power_automate_algorithme.png</image:loc><image:title>power_automate_algorithme</image:title><image:caption>Les algorithmes Power Automate sont très visuels</image:caption></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/2df6c-power_platform_exemple_power_automate.png</image:loc><image:title>power_platform_exemple_power_automate</image:title><image:caption>Plusieurs exemples sont nativement présents</image:caption></image:image><lastmod>2021-07-08T09:51:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devensys.com/2020/02/17/cest-quoi-un-dns/</loc><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/894ca-blog-devensys-img-what-dns.jpg</image:loc><image:title>blog-devensys-img-what-dns</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/aaef4-image_article_dns_blog_devensys.jpg</image:loc><image:title>image_article_DNS_blog_Devensys</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/0d2ea-domain-2121820_1920.jpg</image:loc><image:title>domain-2121820_1920</image:title></image:image><lastmod>2021-07-08T09:47:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devensys.com/2020/02/25/automatiser-des-taches-avec-power-automate/</loc><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/dd4cf-bg_blog_microsoft_power_automate_devensys.jpg</image:loc><image:title>bg_blog_Microsoft_Power_automate_devensys</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/293aa-exemple_power_automate_integration_power_app-1.png</image:loc><image:title>exemple_power_automate_integration_power_app</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/4644f-exemple_power_automate_integration_power_app.png</image:loc><image:title>exemple_power_automate_integration_power_app</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/bcdbe-power_automate_utilisation_suivis.png</image:loc><image:title>power_automate_utilisation_suivis</image:title><image:caption>Il est possible d'analyser une historique d’exécution en détail</image:caption></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/ca770-power_automate_utilisation.png</image:loc><image:title>power_automate_utilisation</image:title><image:caption>La vue détail donne pas mal d'informations</image:caption></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/7ec39-power_apps_integration_automate_process.png</image:loc><image:title>power_apps_integration_automate_process</image:title><image:caption>Le process Power Automate lié à Power Apps</image:caption></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/c9bd1-power_apps_integration_automate.png</image:loc><image:title>power_apps_integration_automate</image:title><image:caption>Modification de l'application de base, avec ajout d'un bouton lié à mon process Power Automate</image:caption></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/d9d62-powerauto_button.png</image:loc><image:title>powerauto_button</image:title><image:caption>Exemple de bouton pour envoyer une notification</image:caption></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/78fdf-powerauto_scheduled_complex-2.png</image:loc><image:title>powerauto_scheduled_complex-2</image:title><image:caption>Le process aurait évidemment pu être améliorer avec un système d'approbation, l'ajout de conditionnel...</image:caption></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/e2566-powerauto_scheduled.png</image:loc><image:title>powerauto_scheduled</image:title><image:caption>Il est possible de programmer des actions à la seconde</image:caption></image:image><lastmod>2021-07-08T09:46:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devensys.com/2020/03/18/notions-sur-le-chiffrement/</loc><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/ad087-20200406_dvs_banniere_blog_devsecops.png</image:loc><image:title>20200406_DVS_Banniere_Blog_DevSecOps</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/f8b06-schemas_chiffrement_asymetrique_04.jpg</image:loc><image:title>schemas_chiffrement_asymetrique_04</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/d677f-schemas_chiffrement_asymetrique_1_v02.jpg</image:loc><image:title>schemas_chiffrement_asymetrique_1_v02</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/b134b-schemas_chiffrement_asymetrique_2.jpg</image:loc><image:title>schemas_chiffrement_asymetrique_2</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/42e44-schemas_chiffrement_asymetrique_3.jpg</image:loc><image:title>schemas_chiffrement_asymetrique_3</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/6409b-bg_chiffrement_asymetrique_devensys.jpg</image:loc><image:title>bg_chiffrement_asymetrique_devensys</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/a47f7-image-6.png</image:loc><image:title>image-6</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/bf216-image-5.png</image:loc><image:title>image-5</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/6a9f3-image-4.png</image:loc><image:title>image-4</image:title></image:image><image:image><image:loc>https://blog.devensys.com/wp-content/uploads/2022/12/c3636-image-3.png</image:loc><image:title>image-3</image:title></image:image><lastmod>2021-07-08T09:43:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.devensys.com</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2023-06-26T14:32:37+00:00</lastmod></url></urlset>
