<?xml version="1.0" encoding="UTF-8"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1"><url><loc>https://docs.tripl-i.com/blog/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/blog/2026/02/08/linkedin-post/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/blog/2026/04/02/linkedin-post/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/blog/ai-change-manager-risk-assessment/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/blog/archive/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/blog/authors/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/blog/cmdb-that-knows-your-vulnerabilities/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/blog/discovery-vs-service-mapping/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/blog/network-segmentation-visibility/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/blog/one-platform-zero-gaps/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/blog/tags/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/blog/tags/ai/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/blog/tags/aiops/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/blog/tags/change-management/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/blog/tags/cmdb/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/blog/tags/compliance/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/blog/tags/discovery/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/blog/tags/infrastructure/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/blog/tags/itsm/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/blog/tags/natural-language/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/blog/tags/network-security/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/blog/tags/product-update/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/blog/tags/search/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/blog/tags/security/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/blog/tags/service-management/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/blog/tags/service-mapping/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/blog/tags/vulnerability-management/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/blog/tags/xurrent/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/blog/tags/zero-trust/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/blog/talk-to-your-cmdb/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/search/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/ai-chatbot/conversation-examples/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/ai-chatbot/overview/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/ai-chatbot/tips-and-best-practices/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/demo-guide/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/demo-guide/business-service-analyzer/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/demo-guide/business-service-analyzer/infrastructure-analysis/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/demo-guide/business-service-analyzer/pattern-based-discovery/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/demo-guide/exploring-cmdb/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/demo-guide/exploring-cmdb/exploring-server/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/demo-guide/exploring-cmdb/exploring-workstation/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/getting-started/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/integrations/XURRENT-DOC-ASSESSMENT/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/integrations/xurrent/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/intro/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/modules/ai-change-manager/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/modules/ai-use-cases/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/modules/asset-management/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/modules/asset-management/company-management/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/modules/asset-management/cost-center-stockroom/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/modules/asset-management/device-aging/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/modules/asset-management/lifecycle-management/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/modules/asset-management/site-management/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/modules/asset-management/warranty-management/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/modules/business-service-analyzer/overview/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/modules/business-service-analyzer/user-guide/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/modules/cmdb/ai-import/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/modules/cmdb/ci-relationships/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/modules/cmdb/hardware-management/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/modules/cmdb/overview/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/modules/cmdb/software-management/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/modules/compliance/attestations/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/modules/compliance/controls-assessments/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/modules/compliance/frameworks/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/modules/compliance/overview/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/modules/compliance/policies/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/modules/discovery/agent-deployment/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/modules/discovery/credential-management/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/modules/discovery/cyberark-integration/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/modules/discovery/discovery-logs/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/modules/discovery/discovery-patterns/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/modules/discovery/kubernetes-scanning/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/modules/discovery/mssql-database-discovery/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/modules/discovery/mysql-database-discovery/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/modules/discovery/network-scanning/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/modules/discovery/oracle-database-discovery/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/modules/discovery/overview/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/modules/discovery/postgresql-database-discovery/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/modules/discovery/scheduling/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/modules/discovery/server-scanning/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/modules/discovery/snmp-scanner/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/modules/discovery/storage-scanning/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/modules/discovery/troubleshooting/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/modules/discovery/vcenter-scanner/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/modules/event-management/ai-analysis/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/modules/event-management/automation-rules/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/modules/event-management/event-correlation/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/modules/event-management/event-sources/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/modules/event-management/notification-channels/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/modules/event-management/overview/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/modules/event-management/sla-management/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/modules/network-segmentation/overview/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/modules/network-segmentation/quick-start/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/modules/network-segmentation/zone-configuration/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/modules/reporting/ai-analytics/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/modules/reporting/custom-reports/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/modules/reporting/dashboard-builder/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/modules/reporting/overview/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/modules/reporting/report-scheduling/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/modules/reporting/report-templates/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/modules/sam/license-management/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/modules/security-management/network-ioc-scanning/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/modules/security-management/overview/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/modules/security-management/security-events/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/modules/security-management/software-policies/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/modules/security-management/threat-intelligence/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/modules/service-mapping/overview/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/modules/vulnerability-management/overview/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/modules/vulnerability-management/remediation-tasks/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/release-history/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/security/best-practices/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/security/compliance/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/security/data-storage-and-access/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/security/encryption/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/security/multi-factor-authentication/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/security/overview/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/technical/ai-import-technical-reference/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/user-guide/authentication/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/user-guide/authentication/single-sign-on/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/user-guide/business-service-analyzer/analyze-infrastructure/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/user-guide/business-service-analyzer/analyze-service-manual-entry/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/user-guide/business-service-analyzer/analyze-service-using-patterns/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/user-guide/business-service-analyzer/overview/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/user-guide/cmdb/ai-insights/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/user-guide/cmdb/ci-details/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/user-guide/cmdb/ci-list/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/user-guide/cmdb/ci-relationships/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/user-guide/cmdb/ci-workbench/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/user-guide/cmdb/global-infrastructure-workbench/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/user-guide/installing-scanners/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/user-guide/performing-scanning/credentials-requirements/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/user-guide/performing-scanning/discovery-requirements/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/user-guide/performing-scanning/scanner-guide/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/user-guide/performing-scanning/scanner-security/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/user-guide/performing-scanning/snmp-scanning-reference/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/user-guide/performing-scanning/ssh-scanning-reference/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/user-guide/performing-scanning/vcenter-scanning-reference/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/user-guide/performing-scanning/wmi-scanning-reference/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/user-guide/vulnerability-management/active-vulnerabilities/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/user-guide/vulnerability-management/cpe-dictionary/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/user-guide/vulnerability-management/cve-database/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/docs/user-guide/vulnerability-management/kb-cve-mappings/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://docs.tripl-i.com/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url></urlset>