<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  <url>
    <loc>https://docs.humansecurity.com/home</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/advertising/mediaguard-overview</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/advertising/mediaguard-integration-options</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/advertising/mediaguard-integration-phases</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/advertising/mediaguard-server-clusters</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/advertising/mediaguard-best-practices</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/advertising/mediaguard-troubleshooting</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/advertising/fraudsensor-overview</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/advertising/detection-tags</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/advertising/tag-types-and-environments</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/advertising/impression-sync</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/advertising/fraudsensor-parameters</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/advertising/fraudsensor-faq</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/advertising/closing-the-loop-mediaguard-and-fraudsensor</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/advertising/ivt-taxonomy</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/advertising/fs-domain-mismatch-ivt-classifications</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/advertising/fs-domain-mismatch-ivt-classifications-faq</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/advertising/click-ivt-taxonomy</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/advertising/click-defense-overview</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/advertising/metrics-media-security</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/advertising/brand-safety-web-crawler</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/advertising/understand-the-human-dashboard</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/advertising/mediaguard-dashboard</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/advertising/fraudsensor-dashboard</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/advertising/click-defense-dashboard</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/advertising/page-intelligence-dashboard</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/advertising/explore-dashboard</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/advertising/create-custom-data-views</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/advertising/schedule-reports</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/advertising/access-transaction-level-tlx-reports</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/advertising/snowflake-quickstart</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/advertising/snowflake-data-fields</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/advertising/snowflake-example-queries</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/advertising/snowflake-faq</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/advertising/dashboard-sso-okta</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/advertising/dashboard-sso-onelogin</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/advertising/integrate-malvertising-defense-for-publishers</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/advertising/integrate-malvertising-defense-for-platforms</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/advertising/about-the-malvertising-overview</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/advertising/about-the-threat-analytics-dashboard</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/advertising/about-the-threat-feed</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/advertising/about-the-threat-library</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/advertising/about-the-ad-quality-for-publishers-configuration-dashboard</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/advertising/about-the-ad-quality-analytics-dashboard</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/advertising/about-the-aq-adomain-dashboard</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/advertising/ad-quality-faq</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/advertising/malvertising-defense-faq</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/advertising/reference/about-the-reporting-api</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/advertising/reference/get-reports</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/advertising/reference/get-report-url</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/advertising/reference/about-the-mediaguard-api</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/advertising/reference/perform-lookup-request-4</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/advertising/reference/perform-lookup-request-3</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/advertising/reference/get-health-check</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/advertising/reference/submit-request</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/advertising/reference/push-result-api-overview</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/advertising/reference/get-all-creatives</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/advertising/reference/get-creative-by-id</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/overview</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/about-sightline-cyberfraud-defense</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/getting-started-with-sightline-cyberfraud-defense</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/whats-different-in-sightline-cyberfraud-defense</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/sightline-sensor-changelog</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/about-the-overview-dashboard</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/about-the-sightline-threat-tracker-dashboard</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/understanding-sightline-threat-tracker-dashboard-activity</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/about-sightline-threat-tracker-attack-profiles</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/about-the-traffic-overview-dashboard</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/about-the-precheck-activity-overview-dashboard</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/about-the-paid-traffic-trends-dashboard</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/about-the-paid-traffic-insights-dashboard</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/sightline-bot-characteristics</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/about-the-accounts-overview-dashboard</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/about-the-recent-attacks-dashboard</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/about-the-credentials-intelligence-dashboard</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/about-the-block-rate-benchmark-report</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/create-a-custom-report</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/manage-custom-reports</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/about-detection-changes</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/about-custom-dashboards</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/manage-custom-dashboards</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/investigate-account-takeover-incidents</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/investigate-fake-accounts-incidents</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/investigate-with-the-traffic-analyzer</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/about-the-traffic-analyzer</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/traffic-policy-overview</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/traffic-policy-settings</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/create-custom-traffic-policy-rules</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/account-policies</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/create-account-policy-rules</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/create-a-traffic-policy-list</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/update-a-traffic-policy-list</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/manage-traffic-policy-lists</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/create-an-account-policy-list</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/update-an-account-policy-list</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/manage-account-policy-lists</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/create-a-human-challenge</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/set-challenge-configurations</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/customize-challenge-look-feel</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/create-a-challenge-bypass-token</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/testing-native-mobile</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/manage-sightline-precheck-settings</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/customize-sightline-precheck-look-feel</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/mitigation-actions</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/alerts-notifications-actions</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/data-export-actions</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/other-actions</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/custom-actions-overview</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/set-custom-parameters</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/data-classification-enrichment</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/score-reporting</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/create-a-data-export</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/manage-data-export</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/sightline-glossary</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/getting-started-with-agentictrust</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/about-the-ai-agents-monitoring-dashboard</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/about-the-ai-visitors-overview-dashboard</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/manage-ai-agent-permissions</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/agentic-activity-priority</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/account-defender-overview</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/account-defender-use-cases</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/account-defender-prerequisites</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/getting-started-with-account-defender</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/optimizing-account-defender-detection</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/account-defender-validation</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/create-account-defender-policy-rules</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/manage-account-defender-policy-rules</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/account-defender-risk-triggers</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/about-network-events</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/data-export-action</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/email-mitigation</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/http-client-actions</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/slack-notifications</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/account-defender-troubleshooting</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/bd-overview</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/getting-started-with-bot-defender</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/top-ten-questions-during-onboarding</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/top-ten-post-onboarding-questions</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/bd-detection-overview</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/bd-detection</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/bot-defender-policy-settings</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/bot-defender-create-custom-policy-rules</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/create-a-bot-defender-policy-list</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/update-a-bot-defender-policy-list</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/manage-bot-defender-policy-lists</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/known-bots-and-crawlers</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/understanding-sightline-dashboard-activity</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/about-attack-profiles</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/bd-reporting-and-analysis</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/navigate-the-dashboard</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/dashboard-customization</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/attack-rate-benchmark-report</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/generate-reports</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/about-detection-changes-bd</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/bot-characteristics</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/investigate-the-data</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/data-export-bd</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/human-challenge-console-customization-tool</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/human-challenge</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/customize-challenge-page</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/advanced-blocking-response</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/precheck-look-and-feel</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/human-challenge-integration-testing-process</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/mobile-enforcement-verification-guide</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/bd-footprint</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/performance-impact</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/sensor</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/bd-dashboard-faq</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/bd-search-faq</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/bd-investigation-faq</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/bd-admin-faq</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/bd-faq-sensor</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/credential-intelligence-overview</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/how-to-access-the-breached-flag</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/getting-started-with-credential-intelligence</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/credential-intelligence-top-ten-questions-during-onboarding</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/credential-intelligence-top-ten-questions-post-onboarding</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/enforcer-integration-generic-guidelines</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/integrate-credential-intelligence-with-auth0-on-the-cloudflare-enforcer</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/integrate-credential-intelligence-with-auth0-on-the-fastly-enforcer</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/credential-intelligence-integration-testing</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/credential-intelligence-faq</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/credential-intelligence-dashboard</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/ping-identity-davinci-connector</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/cd-introduction</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/getting-started-with-code-defender</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/cd-glossary</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/cd-overview</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/cd-dashboard</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/audits-1</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/host-domain-application-view</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/cd-workflow</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/cd-analyzer</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/reports-cd</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/pci-dss-dashboard</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/pci-dss-inventory</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/audit-report</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/create-code-defender-policy-rules</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/manage-code-defender-policy-rules</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/cd-allowlist</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/cd-denylist</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/integrations-in-the-console</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/cd-integrations-via-support</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/cd-notifications-and-alerts</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/vendor-tagging</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/system-settings</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/cd-sensor-overview</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/cd-sensor-changelog</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/configurations</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/sensor-information-extraction</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/cd-sensor-hooks</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/cd-sensor-reports</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/cd-sensor-performance</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/cd-client-side-mitigation</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/website-risk-analyzer</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/account-settings</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/add-applications</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/manage-applications</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/rotate-server-tokens-and-cookie-keys</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/manage-users</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/role-permissions</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/sign-on-methods</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/users-provisioning</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/application-protection-pricing</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/account-protection-pricing</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/client-side-defense-pricing</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/sightline-cyberfraud-defense-usage</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/bot-defender-usage</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/account-defender-usage</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/code-defender-usage</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/credential-intelligence-usage</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/enforcer-configurations</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/auth0-integration</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/aws-s3-integration</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/datadog-integration</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/email-to-consumer</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/gcs-integration</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/http-webhook</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/okta-integration</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/slack-integration</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/splunk-integration</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/sumo-logic-integration</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/syslog-integration</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/data-schema-logs</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/data-schema-metrics</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/page-type-mapping</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/adobe-analytics</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/google-analytics</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/javascript-tag</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/improving-first-page-performance</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/use-of-cookies-web-storage</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/advanced-client-integration</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/about-enforcers</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/generic-cdn-first-party-config</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/troubleshoot-your-enforcer-configuration</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/akamai-edgeworker-changelog</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/install-the-akamai-edgeworker-enforcer-v4</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/manually-install-the-akamai-edgeworker-enforcer-v4</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/akamai-edgeworker-enforcer-v4-configuration</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/akamai-edgeworker-enforcer-v4-api</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/upgrading-to-the-akamai-edgeworker-enforcer-v4</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/supported-features</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/install-the-akamai-edgeworker-enforcer</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/akamai-edgeworker-enforcer-configuration</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/upgrading-the-enforcer</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/akamai-esi</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/akamai-esi-installation</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/akamai-esi-configuration</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/akamai-esi-first-party-configuration</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/apache-c-intro</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/apache-c-intro/apache-changelog</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/apache-c-module-configuration</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/apache-c-configuration-options</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/apache-c-first-party-config</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/whats-new-apigee</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/installation-apigee</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/configuration-apigee</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/asp-intro</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/whats-new-asp</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/asp-config-options</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/asp-first-party-configuration</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/whats-new-api-gateway-lambda-authorizer</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/installation-api-gateway-lambda-authorizer</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/api-api-gateway-lambda-authorizer</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/configuration-api-gateway-lambda-authorizer</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/aws-http-api-gateway-installation</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/aws-http-api-gateway-configuration</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/aws-http-api-gateway-whats-new</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/aws-lambdaedge-changelog</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/install-the-aws-lambdaedge-enforcer</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/manually-install-the-aws-lambdaedge-enforcer</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/api-aws-lambda-edge</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/configuration-aws-lambda-edge</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/upgrading-to-version-4-aws-lambda-edge</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/supported-features-aws</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/installing-the-enforcer-aws</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/lambda-configuration-options</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/upgrade-the-enforcer</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/whats-new-azure</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/install-the-azure-front-door-enforcer</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/manually-install-the-azure-front-door-enforcer</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/api-azure</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/configuration-azure</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/callout-enforcer</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/whats-new-callout-enforcer</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/supported-features-callout-enforcer</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/envoy-configuration</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/enforcer-configuration-1</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/advanced-configuration-2</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/docker-image</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/complete-example</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/cloudflare-changelog</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/install-the-cloudflare-enforcer</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/manually-install-the-cloudflare-enforcer</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/deploy-the-cloudflare-enforcer-for-shopify</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/cloudflare-api</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/configuration-cloudflare</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/cloudflare-config</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/upgrading-to-version-6-cloudflare</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/whats-new-edgio-edge-functions</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/installation-edgio-edge-functions</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/api-edgio-edge-functions</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/configuration-edgio-edge-functions</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/whats-new-edgio-serverless-compute</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/installation-edgio-serverless-compute</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/api-edgio-serverless-compute</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/configuration-edgio-serverless-compute</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/envoy-intro</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/envoy-intro/envoy-changelog</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/envoy-installation</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/envoy-configuration-options</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/envoy-first-party-config</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/bigipf5-intro</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/bigip5-whats-new</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/bigipf5-installation</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/bigipf5-first-party</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/bigipf5-configuration-properties</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/bigipf5-configurational-classes</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/bigipf5-additional-info</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/bigipf5-troubleshooting</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/fastly-javascript-computeedge</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/whats-new-fastly-js</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/installation-fastly-js</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/api-fastly-js</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/configuration-fastly-js</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/fastly-rust-compute-edge</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/whats-new-fce</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/supported-features-fce</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/installing-the-enforcer-fce</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/configuration-options-fce</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/fastly-vcl-changelog</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/install-the-fastly-vcl-enforcer-v12</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/manually-install-the-fastly-vcl-enforcer-v12</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/configuration-fastly-vcl-12</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/how-it-works-v12</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/upgrade-to-fastly-vcl-v12</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/install-the-fastly-vcl-enforcer-v11</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/configuration-fastly-vcl-11</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/how-it-works</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/upgrade-to-fastly-vcl-v11</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/installation-fastly-vcl</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/configuration-fastly-vcl</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/how-it-works-fastly-vcl</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/upgrade-to-fastly-vcl-v10</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/installing-the-enforcer-fastly</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/fastly-graphql-support</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/fastly-sensitive-graphql-operations</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/fastly-basic-configuration</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/fastly-customized-subroutines</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/fastly-additional-activity-handler</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/fastly-advanced-blocking-response</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/fastly-configuring-edge-dictionary</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/fastly-custom-css</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/fastly-custom-first-party-sensor-endpoint</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/fastly-custom-logo</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/fastly-custom-js-script</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/fastly-custom-parameters</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/fastly-filter-requests</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/fastly-filter-by-http-method</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/fastly-filter-by-route</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/fastly-filter-by-extension</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/fastly-filter-by-ip</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/fastly-filter-by-user-agent</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/fastly-data-enrichment</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/fastly-first-party</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/first-party-snippet</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/fastly-enforced-routes</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/fastly-login-credentials-extraction</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/fastly-modify-first-party-response</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/fastly-module-context-object</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/fastly-module-enabled</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/fastly-module-mode</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/fastly-monitored-routes</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/fastly-custom-block-page</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/fastly-sensitive-routes</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/fastly-test-block-flow</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/upgrading-the-enforcer-fastly</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/whats-new-go</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/installation-go-enforcer</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/api-go-enforcer</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/configuration-go-enforcer</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/installing-the-enforcer-go</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/supported-features-go</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/config-go</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/upgrading-the-enforcer-go</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/google-cloud-platform-gcp-callout-enforcer</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/integrate-the-gcp-callout-enforcer</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/haproxy-changelog</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/supported-software-versions</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/clone-supported-features-1</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/installation</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/configuration</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/java-intro</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/java-whats-new</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/java-installation</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/java-upgrading</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/java-basic-config</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/java-directives</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/java-advanced-config</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/java-logging</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/java-first-party-config</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/kong-plugin</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/nginx-gateway-fabric</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/nginx-gateway-fabric-enforcer-configuration-options</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/ingress-nginx-controller</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/ingress-nginx-enforcer-configuration-options</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/installation-2</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/whats-new</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/configuration-option</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/install-the-netlify-edge-function-enforcer</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/netlify-edge-function-enforcer-configurations</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/whats-new-6</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/installation-nextjs-16</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/installation-1</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/nextjs-configuration</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/nginx-intro</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/nginx-intro/nginx-c-module-changelog</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/clone-supported-features</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/installation-3</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/nginx-config</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/nginx-config-options</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/nginx-enrichment</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/nginx-c-module-first-party-config</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/nginx-docker-image</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/ingress-nginx-controller-with-human-enforcer</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/nginx-lua-module</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/nginx-lua-whats-new</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/nginx-lua-supported-features</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/nginx-lua-installing-the-enforcer</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/nginx-lua-configuration-options</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/nginx-lua-upgrading-the-enforcer</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/human-plugin-configuration</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/first-party-configuration-nginx-lua</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/enrichment</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/whats-new-node-express</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/installation-node-express</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/api-node-express</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/configuration-node-express</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/configuration-options-790-and-below-node-express</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/upgrading-node-express</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/php-intro</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/php-whats-new</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/php-upgrading</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/php-config-options</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/php-advanced-config</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/php-contributing</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/python-intro</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/whats-new-python</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/python-installation</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/required-configuration</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/configuration-options-python</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/python-upgrading</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/python-first-party-configuration</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/ruby-enforce-sdk</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/ruby-whats-new</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/ruby-installation</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/ruby-configuration</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/ruby-additional-information</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/salesforce-commerce-intro</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/salesforce-whats-new</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/importing-the-cartridge</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/registering-the-cartridge</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/importing-metadata-and-services</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/sfcc-cartridge-configure</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/using-the-cartridge</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/sfcc-scapi-considerations</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/sfcc-upgrade</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/sfcc-customized-block</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/sfcc-config-options</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/sfcc-first-party</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/varnish-changelog</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/supported-software-varnish</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/installation-varnish</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/configuration-options-varnish</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/enforcer-configuration</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/example-configuration</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/mobile-sdk-intro</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/android-sdk-changelog</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/mobile-sdk-changelog</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/expo-sdk-changelog</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/react-native-wrapper-changelog</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/testing-practices</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/integration-guide</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/how-to-upgrade-from-v3</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/native-basic-implementation</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/native-easiest-implementation</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/native-advanced-functionality</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/hybrid-app-integration</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/visionos-integration-window</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/visionos-integration-sheet</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/react-native-integration-recommended</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/react-native-integration-legacy</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/flutter-integration</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/ionic-integration</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/grpc-integration</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/expo-integration</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/how-to-verify-the-sdk-integration-in-your-app</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/how-to-test-the-sdk-in-your-app</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/ios-whats-new</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/ios-how-to-integrate-the-sdk-in-your-application-v3</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/ios-how-to-verify-the-integration-in-your-app-with-the-sdk-v3</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/ios-manual-integration-v3</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/ios-handle-block-responses-from-the-server-v3</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/ios-how-to-retry-requests-that-were-blocked-v3</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/ios-hybrid-app-support-v3</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/ios-enable-support-for-account-defender-v3</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/ios-multiple-appids-support-v3</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/ios-integration-with-react-native-v3</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/ios-integration-with-flutter-v3</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/ios-integration-with-ionic-v3</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/ios-integration-with-grpc-v3</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/ios-migrating-sdk-from-v2-to-v3</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/ios-how-to-integrate-the-sdk-in-your-application-v2</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/ios-how-to-verify-the-integration-in-your-app-with-the-sdk-v2</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/ios-callbacks-from-the-sdk-v2</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/how-to-retry-blocked-requests</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/ios-multiple-appids-support-v2</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/ios-integration-with-react-native-v2</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/ios-integration-with-grpc-v2</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/ios-migrating-sdk-from-v1-to-v2</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/ios-how-to-integrate-the-sdk-in-your-application-v1</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/ios-swift-v1</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/ios-objectivec-v1</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/ios-react-native-v1</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/ios-how-to-test-you-app-with-the-sdk</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/android-whats-new</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/android-how-to-integrate-the-sdk-in-your-application-v3</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/android-how-to-verify-the-integration-in-your-app-with-the-sdk-v3</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/android-manual-integration-v3</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/android-handle-block-responses-from-the-server-v3</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/android-how-to-retry-requests-that-were-blocked-v3</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/android-multiple-appids-support-v3</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/android-hybrid-app-support-v3</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/android-enable-support-for-account-defender-v3</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/android-integration-with-react-native-v3</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/android-integration-with-flutter-v3</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/android-integration-with-ionic-v3</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/android-integration-with-grpc-v3</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/android-migrating-sdk-from-v2-to-v3</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/android-how-to-integrate-the-sdk-in-your-application-v2</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/android-how-to-verify-the-integration-in-your-app-with-the-sdk-v2</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/android-callbacks-from-the-sdk-v2</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/android-how-to-retry-blocked-requests-v2</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/android-integration-with-react-native-v2</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/android-integration-with-grpc-v2</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/android-migrating-sdk-from-v1-to-v2</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/android-how-to-integrate-the-sdk-in-your-application-v1</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/android-sdk-react-native-integration-guide</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/xamarin-sdk</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/android-how-to-test-you-app-with-the-sdk</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/reference/about-the-applications-api</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/reference/getting-started</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/reference/authentication</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/reference/quick-reference</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/reference/get-account-infov-1</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/reference/get-account-info-2</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/reference/delete-user-datav-1</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/reference/upload-feedback</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/reference/about-the-adaptive-feedback-api</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/reference/get-alert-by-request-id</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/reference/send-alert</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/reference/get-custom-rules</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/reference/create-custom-rule</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/reference/get-rule-by-id</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/reference/update-rule-by-id</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/reference/update-field-by-rule-id</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/reference/delete-rule-by-id</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/reference/custom-rule-operators-and-conditions</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/reference/get-custom-lists</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/reference/create-custom-list</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/reference/get-custom-list</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/reference/patch-custom-list</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/reference/get-custom-list-identifiers</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/reference/create-custom-list-identifiers</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/reference/replace-custom-list-identifiers</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/reference/delete-all-custom-list-identifiers</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/reference/delete-custom-list-identifier</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/reference/upload-credentials</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/reference/get-incidents</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/reference/get-scripts</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/reference/get-allow-lists</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/reference/update-allow-lists</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/reference/get-deny-lists</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/reference/update-deny-lists</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/reference/get-cookie-report</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/reference/get-account-settings</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/reference/code-examples</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/reference/request</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/reference/get-header-inventory</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/reference/get-script-inventory</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/reference/update-header-status</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/reference/update-script-status</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/reference/get-header-audits</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/reference/get-script-audits</loc>
  </url>
  <url>
    <loc>https://docs.humansecurity.com/applications/human-customer-support</loc>
  </url>
</urlset>
