<?xml version="1.0" encoding="utf-8" ?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
        
            <url><loc>http://????.unm.edu/index.html</loc><lastmod>2026-02-17</lastmod></url><url><loc>http://????.unm.edu/about.html</loc><lastmod>2026-02-17</lastmod></url><url><loc>http://????.unm.edu/contact-information.html</loc><lastmod>2026-02-17</lastmod></url><url><loc>http://????.unm.edu/frequently-asked-questions.html</loc><lastmod>2026-02-17</lastmod></url><url><loc>http://????.unm.edu/sitemap.xml</loc><lastmod>2026-02-17</lastmod></url><url><loc>http://????.unm.edu/access-denied.html</loc><lastmod>2026-02-17</lastmod></url><url><loc>http://????.unm.edu/deceptive-site-ahead.html</loc><lastmod>2026-02-17</lastmod></url><url><loc>http://????.unm.edu/deceptive-site-ahead-b1td.html</loc><lastmod>2026-02-17</lastmod></url><url><loc>http://????.unm.edu/services-catalog-dev.html</loc><lastmod>2026-02-17</lastmod></url><url><loc>http://????.unm.edu/service-catalog.html</loc><lastmod>2026-02-17</lastmod></url><url><loc>http://????.unm.edu/frequently-asked-questions-dev.html</loc><lastmod>2026-02-17</lastmod></url><url><loc>http://????.unm.edu/areas/information-security/program-v-2-0.html</loc><lastmod>2026-02-17</lastmod></url><url><loc>http://????.unm.edu/areas/information-security/program-components.html</loc><lastmod>2026-02-17</lastmod></url><url><loc>http://????.unm.edu/areas/information-security/advisories/index.html</loc><lastmod>2026-02-17</lastmod></url><url><loc>http://????.unm.edu/areas/information-security/guidelines/host-naming-convention-endpoints.html</loc><lastmod>2026-02-17</lastmod></url><url><loc>http://????.unm.edu/areas/information-security/guidelines/host-naming-convention-iot.html</loc><lastmod>2026-02-17</lastmod></url><url><loc>http://????.unm.edu/areas/information-security/guidelines/host-naming-convention-printers.html</loc><lastmod>2026-02-17</lastmod></url><url><loc>http://????.unm.edu/areas/information-security/guidelines/host-naming-convention-servers.html</loc><lastmod>2026-02-17</lastmod></url><url><loc>http://????.unm.edu/areas/information-security/guidelines/patch-management.html</loc><lastmod>2026-02-17</lastmod></url><url><loc>http://????.unm.edu/areas/information-security/guidelines/vulnerability-remediation.html</loc><lastmod>2026-02-17</lastmod></url><url><loc>http://????.unm.edu/areas/information-security/guidelines/wildcard-x509-ssltls-certificates.html</loc><lastmod>2026-02-17</lastmod></url><url><loc>http://????.unm.edu/areas/information-security/guidelines/working-with-unm-data.html</loc><lastmod>2026-02-17</lastmod></url><url><loc>http://????.unm.edu/areas/information-security/guidelines/index.html</loc><lastmod>2026-02-17</lastmod></url><url><loc>http://????.unm.edu/areas/information-security/guidelines/continuous-inventory-and-control-of-hardware-assets.html</loc><lastmod>2026-02-17</lastmod></url><url><loc>http://????.unm.edu/areas/information-security/guidelines/continuous-inventory-and-control-of-software-assets.html</loc><lastmod>2026-02-17</lastmod></url><url><loc>http://????.unm.edu/areas/information-security/guidelines/continuous-vulnerability-management.html</loc><lastmod>2026-02-17</lastmod></url><url><loc>http://????.unm.edu/areas/information-security/guidelines/controlled-use-of-administrative-privileges.html</loc><lastmod>2026-02-17</lastmod></url><url><loc>http://????.unm.edu/areas/information-security/guidelines/secure-configuration-for-servers.html</loc><lastmod>2026-02-17</lastmod></url><url><loc>http://????.unm.edu/areas/information-security/guidelines/maintenance-monitoring-and-analysis-of-audit-logs.html</loc><lastmod>2026-02-17</lastmod></url><url><loc>http://????.unm.edu/areas/information-security/guidelines/malware-defenses.html</loc><lastmod>2026-02-17</lastmod></url><url><loc>http://????.unm.edu/areas/information-security/guidelines/least-permissive-control-of-network-ports-protocols-and-services.html</loc><lastmod>2026-02-17</lastmod></url><url><loc>http://????.unm.edu/areas/information-security/guidelines/data-recovery-capabilities.html</loc><lastmod>2026-02-17</lastmod></url><url><loc>http://????.unm.edu/areas/information-security/guidelines/secure-configuration-for-network-devices.html</loc><lastmod>2026-02-17</lastmod></url><url><loc>http://????.unm.edu/areas/information-security/guidelines/data-protection.html</loc><lastmod>2026-02-17</lastmod></url><url><loc>http://????.unm.edu/areas/information-security/guidelines/controlled-access-based-on-the-need-to-know.html</loc><lastmod>2026-02-17</lastmod></url><url><loc>http://????.unm.edu/areas/information-security/guidelines/x-509-certificate-lifecycle-management.html</loc><lastmod>2026-02-17</lastmod></url><url><loc>http://????.unm.edu/areas/information-security/guidelines/guidelines-drafts.html</loc><lastmod>2026-02-17</lastmod></url><url><loc>http://????.unm.edu/areas/information-security/services/index.html</loc><lastmod>2026-02-17</lastmod></url><url><loc>http://????.unm.edu/areas/information-security/services/request-types.html</loc><lastmod>2026-02-17</lastmod></url><url><loc>http://????.unm.edu/areas/information-security/standards/index.html</loc><lastmod>2026-02-17</lastmod></url><url><loc>http://????.unm.edu/areas/information-security/standards/account-security-standard.html</loc><lastmod>2026-02-17</lastmod></url><url><loc>http://????.unm.edu/areas/information-security/training/tenable-security-center-dashboards.html</loc><lastmod>2026-02-17</lastmod></url><url><loc>http://????.unm.edu/areas/information-security/training/tenable-security-center-analysis.html</loc><lastmod>2026-02-17</lastmod></url><url><loc>http://????.unm.edu/areas/information-security/training/tenable-security-center-help.unm.html</loc><lastmod>2026-02-17</lastmod></url><url><loc>http://????.unm.edu/areas/information-security/training/tenable-security-center-saml-authentication.html</loc><lastmod>2026-02-17</lastmod></url><url><loc>http://????.unm.edu/areas/privacy-compliance-and-risk/index.html</loc><lastmod>2026-02-17</lastmod></url><url><loc>http://????.unm.edu/areas/privacy-compliance-and-risk/fair-information.html</loc><lastmod>2026-02-17</lastmod></url><url><loc>http://????.unm.edu/areas/privacy-compliance-and-risk/services/index.html</loc><lastmod>2026-02-17</lastmod></url><url><loc>http://????.unm.edu/areas/privacy-compliance-and-risk/services/purchasing-risk-assessment.html</loc><lastmod>2026-02-17</lastmod></url><url><loc>http://????.unm.edu/forms/index.html</loc><lastmod>2026-02-17</lastmod></url><url><loc>http://????.unm.edu/how-to/index.html</loc><lastmod>2026-02-17</lastmod></url><url><loc>http://????.unm.edu/phish-bowl/index.html</loc><lastmod>2026-02-17</lastmod></url><url><loc>http://????.unm.edu/programs/information-security/information-security-program.html</loc><lastmod>2026-02-17</lastmod></url><url><loc>http://????.unm.edu/programs/information-security/index.html</loc><lastmod>2026-02-17</lastmod></url><url><loc>http://????.unm.edu/programs/information-security/awareness-management-program-component.html</loc><lastmod>2026-02-17</lastmod></url><url><loc>http://????.unm.edu/programs/information-security/event-management-program-component.html</loc><lastmod>2026-02-17</lastmod></url><url><loc>http://????.unm.edu/programs/information-security/incident-management-program-component.html</loc><lastmod>2026-02-17</lastmod></url><url><loc>http://????.unm.edu/programs/information-security/risk-management-program-component.html</loc><lastmod>2026-02-17</lastmod></url><url><loc>http://????.unm.edu/programs/information-security/vulnerability-management-program-component.html</loc><lastmod>2026-02-17</lastmod></url><url><loc>http://????.unm.edu/development/frequently-asked-questions-old-20240430.html</loc><lastmod>2026-02-17</lastmod></url><url><loc>http://????.unm.edu/development/index.html</loc><lastmod>2026-02-17</lastmod></url><url><loc>http://????.unm.edu/development/frequently-asked-questions-v2-copy.html</loc><lastmod>2026-02-17</lastmod></url><url><loc>http://????.unm.edu/development/request-types-v2.html</loc><lastmod>2026-02-17</lastmod></url></urlset>